Administrator Guide

ICMPv6 message types
Who are you request (139)
Who are you reply (140)
Mtrace response (200)
Mtrace messages (201)
NOTE: The Dell EMC Networking OS does not suppress the following ICMPv6 message types:
Packet too big (2)
Echo request (128)
Multicast listener query (130)
Multicast listener report (131)
Multicast listener done (132)
Router solicitation (133)
Router advertisement (134)
Neighbor solicitation (135)
Neighbor advertisement (136)
Redirect (137)
Router renumbering (138)
MLD v2 listener report (143)
Duplicate Address Request (157)
Duplicate Address Confirmation (158)
Dell EMC Networking OS Security Hardening
The security of a network consists of multiple factors. Apart from access to the device, best practices, and implementing various security
features, security also lies with the integrity of the device. If the software itself is compromised, all of the aforementioned methods
become ineffective.
The Dell EMC Networking OS is enhanced verify whether the OS image and the startup configuration file are altered before loading. This
section explains how to configure OS image and startup configuration verification.
Dell EMC Networking OS Image Verification
Dell EMC Networking OS comes with the OS image verification and the startup configuration verification features. When enabled, these
features check the integrity of The OS image and the startup configuration that the system uses while the system reboots and loads only
if they are intact.
Important Points to Remember
The OS image verification feature is disabled by default on the Dell EMC Networking OS.
The OS image verification feature is supported for images stored in the local system only.
The OS image verification feature is not supported when the fastboot or the warmboot features are enabled on the system.
If OS image verification fails after a reload, the system does not load the startup configuration. The System displays an appropriate
error message until the no verified boot command is used on the system.
After you enable The OS image verification feature, the system prompts you to enter The OS image hash when you upgrade the Dell
EMC Networking OS to a later version. The system checks if your hash matches with The OS image hash only after reloading.
After enabling The OS image verification feature, use the verified boot hash command to verify and store the hash value. If
you don’t store the hash value, you cannot reboot the device until you verify The OS image hash.
Enabling and Configuring OS Image Hash Verification
To enable and configure Dell EMC Networking OS image hash verification, follow these steps:
1. Enable the OS image hash verification feature.
CONFIGURATION mode
Security
705