Dell EMC SmartFabric OS10 Security Best Practices Guide

March 2021

Notes, cautions, and warnings

ℹ️ NOTE: A NOTE indicates important information that helps you make better use of your product.

⚠️ CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

⚠️ WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

OS10 security best practices

This document provides a set of recommendations for securing switches that run Dell EMC SmartFabric OS10. For detailed configuration, see the Dell EMC SmartFabric OS10 User Guide.

You can find Dell EMC documentation at https://www.dell.com/support/.

Applicability

The recommendations that are provided in this document apply up to Dell EMC SmartFabric OS10.5.x.x.

On first boot

When you boot the switch for the first time, the system performs Zero-touch deployment (ZTD). ZTD automates OS10 image upgrade, runs a CLI batch file to configure the switch, and runs post-ZTD scripts to perform additional functions. ZTD is enabled by default on the system. If you do not use ZTD, you may disable ZTD using the ztd cancel command. After first login to OS10, change the default password and upgrade OS10 to the latest version which may contain new features and security fixes.

Change the default CLI password

Rationale: When you log in to the switch for the first time, the system prompts you to enter a username to enter the command-line interface. To log in to OS10 for the first time, enter admin as the username and the password. Change the default admin password after your first login to something secure or create at least one OS10 user with the sysadmin role and delete the default admin username. The system saves the new password for future logins. After you change the password using the CLI, use the write memory command to save the configuration.

Configuration:

OS10% configure terminal
% Error: ZTD is in progress (configuration is locked).
OS10# ztd cancel
OS10% configure terminal
OS10(config)# username admin password new-password role sysadmin
OS10(config)# exit
OS10# write memory

To delete the default admin user name, log in to a different account with the sysadmin role, and do the following:

OS10(config)# no username admin

Use the following command to view the details of all users configured on the system:

OS10# show running-configuration users

Change the default linuxadmin password

Rationale: You use the Linux shell for troubleshooting and diagnostic purposes. After the first OS10 login, enter linuxadmin for both the default Linux shell username and password and change the default linuxadmin password. The system saves the new password for future logins. After you change the password using the CLI, use the write memory command to save the configuration.

Configuration:

OS10% configure terminal
OS10(config)# system-user linuxadmin password {clear-text-password | hashed-password}
OS10(config)# exit
OS10# write memory

Disable the linuxadmin account

If you do not want your users to access the Linux shell, disable the linuxadmin account.

Configuration:

OS10(config)# system-user linuxadmin disable
OS10(config)# exit
OS10# write memory

Disable access to Linux commands

Rationale: Even if you disable the linuxadmin user, users can access Linux commands using the system command. To disable access to Linux commands completely, use the system-cli command.

Configuration:

OS10(config)# system-cli disable
OS10(config)# exit
OS10# write memory

Disable unused interfaces

Rationale: To prevent unauthorized users from connecting to your network on front-end interfaces, disable the interfaces that you are not using.

Configuration:

OS10(config)# interface range ethernet 1/1/10-1/1/32
OS10(conf-range-eth1/1/10-1/1/32)# shutdown
OS10(conf-range-eth1/1/10-1/1/32)# end
OS10# write memory

Enable bootloader protection

Rationale: To prevent unauthorized users with malicious intent from accessing your switch, protect the bootloader using a GRUB password.

Configuration:

OS10# boot protect enable username username password password
OS10# write memory

Check if bootloader protection is enabled

Use the following command to view the status of bootloader protection on the system:

OS10# show boot protect

Boot protection enabled

Authorized users: root linuxadmin admin

Password rules

Strict password rules ensure better security of the device.

Enable strong passwords

Rationale: Strong passwords make it difficult guess your passwords. By default, strong password check is enabled on the system which checks if the password contains at least characters with alphanumeric and special characters. If strong password check is disabled, enable it.

Configuration:

OS10(config)# no service simple-password
OS10(config)# exit
OS10# write memory

By default, strong password check is enabled on the system and the no service simple-password command is implicit in the running configuration. To verify if strong password check is enabled, use the following command:

OS10(config)# do show running-configuration | grep simple

service simple-password

Enforce stronger passwords

Rationale: By default, the password you configure must be at least nine alphanumeric and special characters. To increase the password strength further, enforce the user to use a mix of different characters and increase the password length.

Configuration:

OS10(config)# password-attributes {[min-length number] [character-restriction {[upper number] [lower number] [numeric number] [special-char number]}}
OS10(config)# exit
OS10# write memory

When choosing your password, Dell EMC Networking recommends that you use multiple and easy-to-remember common words in your password instead of using complex passwords which you may not remember. Combine multiple words that you can remember and modify the passphrase using special characters and numbers to get a final password. For example, instead of correcthorsebatterystaple, you can use C0rr3c+h0r5e8atTerystapl3.

ℹ️ NOTE: To recover a lost or forgotten OS10 username password, including the admin password, see Recover OS10 user name password.

Obscure passwords

Rationale: When the user views the running configuration, the password in an encrypted form is displayed. Obscure passwords in show command outputs so that text characters do not display.

Configuration:

OS10(config)# service obscure-password
OS10(config)# exit
OS10# write memory

OS10# show running-configuration users

username admin password **** role sysadmin priv-lvl 15

username desk1 password **** role sysadmin priv-lvl 15

Federal Information Processing Standards (FIPS)

FIPS is a set of government standards that define how certain things are used in the government encryption algorithms.

Enable FIPS you require FIPS in your environment

Rationale: If you enable FIPS, it installs the certificate-key pair as FIPS-compliant which is used by a FIPS-aware application, such as RADIUS over TLS.

Configuration:

OS10# crypto fips enable
OS10# write memory

Check if FIPS is enabled

Use the following command to verify if FIPS is enabled on the system:

OS10# show fips status

FIPS mode: Disabled

Enable and configure secure boot

OS10 secure boot provides a mechanism to verify the authenticity and integrity of the OS10 image. Secure Boot protects a system from malicious code being loaded and run during the boot process. Use the secure boot feature to validate the OS10 image during installation and on demand at any time.

Enable secure boot

Rationale: Enabling the secure boot feature prevents a compromised kernel and system binaries from loading during the boot operation.

Configuration:

OS10(config)# secure-boot enable
OS10(config)# exit
OS10# write memory

Protect the startup configuration file

Rationale: Protecting the startup configuration file saves a protected copy of the current startup config file internally. During switch boot up, the protected version of the startup configuration is loaded. Protecting the startup configuration file ensures that a compromised configuration file is not loaded when the system boots.

Configuration:

OS10(config)# secure-boot protect startup-config
OS10(config)# exit
OS10# write memory

Validate OS10 image file on demand

Rationale: Validate an OS10 image file anytime to verify the signature of the image files to ensure that the OS10 image is not compromised.

Configuration:

OS10# image verify image-filepath {sha256 signature signature-filepath | gpg signature signature-filepath | pki signature signature-filepath public-key key-file}

Validate OS10 kernel, system binaries, and startup configuration file

Rationale: Validate the OS10 kernel binary image, system binary files, and startup configuration file at system startup. Validating these files at startup ensures that the system does not load a compromised file.

Configuration:

OS10# secure-boot verify {kernel | file-system-integrity | startup-config}

Validate OS10 upgrade image files

Rationale: Validate the digital signature in the image files before installing an OS10 upgrade. You can use the following command to validate an OS10 image before installing.

Configuration:

OS10# image secure-install image-filepath {sha256 signature signature-filepath | gpg signature signature-filepath | pki signature signature-filepath public-key key-file}

ℹ️ NOTE: When secure boot is enabled, you can only upgrade OS10 using the image secure-install command.

Validate OS10 image before ONIE OS manual installation

Rationale: When secure boot is enabled and you manually install an OS10 image using ONIE, you can validate the image using PKI or SHA256.

Configuration:

OS10# onie-nos-install image_url pki signature_filepath certificate_filepath

Or

OS10# onie-nos-install image_url sha256 signature_filepath

Check if secure boot is enabled and the file integrity status

Use the following commands to check the status of the secure boot operation and the file integrity status:

OS10# show secure-boot status

Last boot was via secure boot : yes

Secure boot configured : yes

Latest startup config protected : yes

OS10# show secure-boot file-integrity-status

File Integrity Status: OK

Users, roles, and privilege levels

Using a password controls terminal access to a switch. But you can increase security by limiting user access to a subset of commands using privilege levels.

Create users, assign roles, and privilege levels

Rationale: Controlling terminal access to a switch is one method of securing the device and network. To increase security, you can limit user access to a subset of commands using privilege levels.

Configuration:

OS10(config)# privilege mode priv-lvl privilege-level command-string
OS10(config)# username username password password role role priv-lvl privilege-level

Configure an enable password for each privilege level in CONFIGURATION mode. Use the enable password command to switch between privilege levels and access the commands that are supported at each level.

OS10(config)# enable password encryption-type password-string priv-lvl privilege-level
OS10(config)# exit
OS10# write memory

encryption-type—Enter an encryption type for the password entry:

ℹ️ NOTE: Ensure that you use either sha-256 or sha512 encryption for your passwords.

priv-lvl privilege-level—Enter a privilege level, from 1 to 15.

ℹ️ NOTE: Use SHA-256 or SHA-512 for password encryption.

OS10(config)# privilege exec priv-lvl 12 "show version"
OS10(config)# privilege exec priv-lvl 12 "configure terminal"
OS10(config)# privilege configure priv-lvl 12 "interface ethernet"
OS10(config)# privilege interface priv-lvl 12 "ip address"
OS10(config)# username delluser password $6$Yij02Phe2n6whp7b$ladskj0HowijIlkajg981 role
secadmin priv-lvl 12
OS10(config)# enable password sha-256 $5$2uThiblo$84p.tykjmz/w7j26ymoKBjrb7uepkUB priv-
lvl 12
OS10(config)# exit
OS10# write memory

View users and their roles

The following shows the users that are configured on the local system, their roles, and the assigned privilege levels:

OS10% show running-configuration users
username admin password $6$q9QBeYjZ$jfxzVqGhkxX3smxJSH9DDz7/
VKx8SloIhp4NoGZs0I/UNwh8WVuxwfd9q4pWIgNs5BKH. role sysadmin priv-lvl 15
OS10# show running-configuration userrole

Port security

Use the port security feature to restrict the number of workstations that can send traffic through an interface and to control MAC address movement. Port security is a package of the following sub features that provide added security to the system:

  1. MAC address learning limit (MLL)
  2. Sticky MAC
  3. MAC address movement control

Configure the MAC address learning limit

Rationale: Using the MAC address learning limit method, you can set an upper limit on the number of allowed MAC addresses on an interface. Limiting the MAC addresses protects switches from MAC address flooding attacks. After the configured limit is reached on an interface, by default, the system drops all traffic from any unknown device. After you enable port security on an interface, the interface can learn one secure MAC address by default. This limit is applicable for both secure dynamic and secure static MAC addresses.

Configuration:

  1. Enable port security on the system in CONFIGURATION mode.
OS10(config)# switchport port-security
  1. Enable port security on an interface in CONFIGURATION mode.
OS10(config)# switchport port-security
OS10(config)# no disable
  1. Configure the number of secure MAC addresses that an interface can learn in INTERFACE PORT SECURITY mode:
mac-learn {limit | no-limit}

For the limit keyword, the range is from 0 to 3072. To enable the interface to learn the maximum number of MAC addresses that the hardware supports, use the no-limit keyword.

MAC address learning limit example

OS10# configure terminal
OS10(config)#interface ethernet 1/1/1
OS10(config-if-eth1/1/1)# switchport port-security 
OS10(config-if-port-sec)# no disable
OS10(config-if-port-sec)# mac-learn limit 100
OS10(config-if-port-sec)# end
OS10# write memory

Configure MAC address learning limit violation actions

Rationale: After the number of secure MAC addresses reaches the maximum configured, if an interface receives a frame with the source MAC address different from any of the learned MAC addresses, the system considers this as a MAC address learning limit violation.

Configuration:

Use the following commands in INTERFACE PORT SECURITY mode:

OS10(config-if-port-sec)#mac-learn limit violation log
OS10(config-if-port-sec)#mac-learn limit violation drop
OS10(config-if-port-sec)#mac-learn limit violation forward
OS10(config-if-port-sec)#mac-learn limit violation shutdown

MAC address learning limit violation actions configuration example

OS10% configure terminal
OS10(config)# interface ethernet 1/1/1
OS10(config-if-eth1/1/1)# switchport port-security 
OS10(config-if-port-sec)% no disable
OS10(config-if-port-sec) # mac-learn limit 100
OS10(config-if-port-sec)# mac-learn limit violation shutdown
OS10(config-if-port-sec)# end
OS10# write memory

Configure sticky MAC addresses

Rationale: When you reload the system, port security removes the dynamically learned secure MAC addresses. You can use the sticky feature to make the dynamically learned secure MAC addresses persist even after a system reboot so that the interface does not have to learn these MAC addresses again.

Configuration:

Enter the following command in INTERFACE PORT SECURITY mode:

sticky

ℹ️ NOTE: Before enabling sticky MAC address learning, ensure that you restrict the number of MAC addresses that an interface can learn using the mac-learn limit command.

Sticky MAC addresses configuration example

OS10% configure terminal
OS10(config)#interface ethernet 1/1/1
OS10(config-if-eth1/1/1)#switchport port-security 
OS10(config-if-port-sec)#no disable
OS10(config-if-port-sec) #mac-learn limit 100
OS10(config-if-port-sec)#sticky
OS10(config-if-port-sec)# end
OS10# write memory

MAC address movement

Rationale: A MAC address movement happens when the system detects the same MAC address on an interface which it has already learned through another port security-enabled interface on the same broadcast domain. MAC address movement is not allowed for secure static and sticky MAC addresses. By default, MAC address movement for dynamically-learned MAC address is disabled on the system. Secure dynamic MAC address movement is allowed between port-security-enabled and port-security-disabled interfaces.

Configuration:

Use the following command in INTERFACE PORT SECURITY mode:

OS10(config-if-port-sec)#mac-move allow
OS10(config-if-port-sec)# end
OS10# write memory

MAC address movement configuration example

OS10% configure terminal
OS10(config)# interface ethernet 1/1/1
OS10(config-if-eth1/1/1)# switchport port-security 
OS10(config-if-port-sec)# no disable
OS10(config-if-port-sec)# mac-learn limit 100
OS10(config-if-port-sec)# mac-move allow
OS10(config-if-port-sec)# end
OS10# write memory

Configure MAC address movement violation actions

Rationale: If the system detects the same MAC address in a port-security-enabled interface which it has already learned through another port-security-enabled interface, by default, the system considers this as a MAC address move violation. You can configure MAC address move violation actions. You can also configure the system to permit MAC address movement across port security-enabled interfaces.

Configuration:

OS10(config-if-port-sec)#mac-move violation log
OS10(config-if-port-sec)#mac-move violation drop
OS10(config-if-port-sec)#mac-move violation shutdown-original
OS10(config-if-port-sec)#mac-move violation shutdown-offending
OS10(config-if-port-sec)#mac-move violation shutdown-both

Verify what port security features are enabled and running

Use the following command to verify if the port security is enabled on all interfaces. This command also shows information about the status of port security features. Specify specific interfaces to view details about individual interfaces.

OS10% show switchport port-security interface erthernet 1/1/1

Global Port-security status

Interface name : ethernet1/1/1

Port Security : Enabled

Port Status : Up

Mac learn limit : 100

MAC-learn-limit-Violation action : Log

Sticky : Disabled

Mac-move-alloW : Not Allowed

Mac-move-violation action : shutdown-both

Aging : Enabled

Total MAC Addresses : 10

Secure static MAC Addresses : 0

Sticky MAC Addresses : 10

Secure Dynamic MAC addresses : 0

Management plane

These settings are applicable to services, settings, and configuration services of OS10.

Role-based access control

Role-based access control (RBAC) provides control for access and authorization. Users are granted permissions based on defined roles. Create user roles based on job functions to allow users appropriate system access. A user can be assigned only a single role, and many users can have the same role. A user role authenticates and authorizes a user at login.

Enable AAA login authentication

Rationale: Authentication, authorization, and accounting (AAA) services secure networks against unauthorized access. AAA is a centralized means of access control to users who want to access the system.

Configuration:

OS10(config)# aaa authentication login {console | default} local
OS10(config)# exit
OS10# write memory

Enable AAA login authentication with a fallback option

Rationale: Configuring AAA authentication with a fallback option provides resiliency while authentication. If one method fails, the system uses the other method of authentication.

Configuration:

OS10(config)# aaa authentication login {console | default} {local | group radius | group tacacs+}
OS10(config)# exit
OS10# write memory

The authentication methods in the method list work in the order they are configured.

Enable AAA accounting for commands

Rationale: AAA accounting for commands records login and command information about console connections and remote connections, such as Telnet and SSH.

Configuration:

OS10(config)# aaa accounting commands all {console | default} {start-stop | stop-only |
none} [logging] [group tacacs+]
OS10(config)# exit
OS10# write memory

The authentication methods in the method list work in the order they are configured.

Enable AAA accounting for authentication events

Rationale: AAA accounting for authentication events records login and command information about console connections and remote connections, such as Telnet and SSH.

Configuration:

OS10(config)# aaa accounting exec {console | default} {start-stop | stop-only | none}
[logging] [group tacacs+]
OS10(config)# exit
OS10# write memory

Access rules

Configure secure access rules.

Enable only SSH for remote system access

Rationale: By default, in OS10, SSH is the only protocol that is enabled for remote system access. As the Telnet protocol is not secure, Dell EMC recommends that you do not enable the Telnet server.

ℹ️ NOTE: If you have disabled the SSH server, reenable it and disable the Telnet server. Always use SSH for remote system access.

Configuration:

OS10(config)# ip ssh server enable
OS10(config)# ip ssh server max-auth-tries 4
OS10(config)# no ip telnet server enable
OS10(config)# exit
OS10# write memory

Enable SSH access control

Rationale: Filter SSH connections to the switch using an access list.

Configuration:

OS10(config)# ip access-list permit10
OS10(config-ipv4-acl) # permit ip 172.16.0.0 255.255.0.0 any
OS10(config-ipv4-acl)# exit
OS10(config)# line vty
OS10(config-line-vty)# ip access-class permit10
OS10(config-line-vty)# exit
OS10 (config)# exit
OS10# write memory

Banner rules

Display a message before and after a user logs in to the system. These messages can communicate legal rights to the user and assume consent to the usage policy by the user.

Enable login banner

Rationale: The login banner is displayed to the user when the user attempts to log in to the system.

Configuration:

OS10(config)# banner login %
DellEMC S4148U-ON login 
Enter your username and password
%

Enable login banner

Rationale: The login banner is displayed after the user logs in to the system.

Configuration:

OS10(config)# banner motd %
DellEMC S4148U-ON login
Enter your username and password
%
OS10(config)# exit
OS10# write memory

SNMP rules

Restricted Simple Network Management Protocol (SNMP) access improves device security when SNMP is used.

Forbid read and write access to a specific SNMP community

Rationale: Forbid read and write access to one or more SNMP communities so that an unauthorized entity cannot remotely manipulate the device.

Configuration:

OS10(config)# no snmp-server community community_string {ro | rw}
OS10(config)# exit
OS10# write memory

Forbid access to SNMP without ACL

Rationale: If no ACL is configured, anyone with a valid SNMP community string can access the system and potentially make unnecessary changes. Define and apply an ACL so that only an authorized group of trusted stations can have access SNMP access to the system.

Configuration:

OS10(config)# snmp-server community name {ro | rw} acl acl-name
OS10(config)# exit
OS10# write memory
OS10(config)# ip access-list snmp-read-only-acl
OS10(config-ipv4-acl) # permit ip 172.16.0.0 255.255.0.0 any
OS10(config-ipv4-acl)# exit
OS10(config)# snmp-server community public ro acl snmp-read-only-acl
OS10(config)# exit
OS10% write memory

Configure SNMP v3

Rationale: SNMP v2 does not support encryption or authentication. Dell EMC Networking strongly recommends that you use SNMP v3 which supports secure access to SNMP resources.

Configuration:

snmp-server engineID [local engineID] [remote ip-address {[udp-port port-number] remote-engineID}]
snmp-server view view-name oid-tree [included | excluded]
snmp-server group group-name v3 security-level [read view-name] [write view-name] [notify view-name]
snmp-server user user-name group-name security-model localized auth sha auth-password priv aes priv-password

Check what SNMP rules are running

OS10# show running-configuration snmp
!
snmp-server community public ro acl snmp-read-only-acl

Control plane

The control plane includes monitoring, route table updates, and the dynamic operation of the system.

System clock rules

These system clock rules enforce device time and timestamp settings.

Set the timezone to Coordinated Universal Time (UTC)

Rationale: By default, the system time zone is set to UTC. If the default time zone is changed, set it to UTC. Setting the system time zone to UTC eliminates difficulty troubleshooting issues across different time zones.

Configuration:

OS10(config)# clock timezone standard-timezone UTC
OS10(config)# exit
OS10# write memory

Logging rules

Logging can be used to for error and information notification, security auditing, and network forensics.

Enable logging on the console

Rationale: Enable logging to the console and restrict the severity to critical so that log messages do not affect system performance.

Configuration:

OS10(config)# logging console enable
OS10(config)# logging console severity log-crit
OS10(config)# exit
OS10# write memory

Enable logging to a syslog server over TLS

Rationale: Enable logging to a syslog server, and secure the connection using TLS.

Configuration:

OS10(config)# logging server {hostname | ipv4-address | ipv6-address} tls [port-number]
[severity severity-level] vrf {management | vrf-name]
OS10(config)# exit
OS10# write memory

For more information about configuring X.509v3 PKI certificates, see the Dell EMC SmartFabric OS10 User Guide.

Enable audit logging

Rationale: To monitor user activity and configuration changes on the switch, enable the audit log. Only the sysadmin and secadmin roles can enable, view, and clear the audit log.

Configuration:

OS10(config)# logging audit enable
OS10(config)# exit
OS10# write memory
show logging audit [reverse] [number]

NTP rules

Network Time Protocol (NTP) synchronizes timekeeping among a set of distributed time servers and clients and coordinates time distribution in a large, diverse network. NTP clients synchronize with NTP servers that provide accurate time measurement.

Configure trusted NTP server

Rationale: Configure the system to synchronize time from a trusted NTP server.

Configuration:

OS10(config)# ntp server ntpl-server-ip-address
OS10(config)# exit
OS10# write memory

ntpl-server-ip-address—Enter the IPv4 address in A.B.C.D format or IPv6 address in A::B format of the NTP server.

Configure trusted secondary NTP server

Rationale: Configure the system to synchronize time from a trusted secondary NTP server.

Configuration:

OS10(config)# ntp server ntp2-server-ip-address
OS10(config)# exit
OS10# write memory

ntpl-server-ip-address—Enter the IPv4 address in A.B.C.D format or IPv6 address in A::B format of the NTP server.

Configure NTP authentication

Rationale: NTP authentication and the corresponding trusted key provide a reliable exchange of NTP packets with trusted time sources. NTP authentication uses the message digest 5 (MD5) algorithm. The key is embedded in the synchronization packet that is sent to an NTP time source.

Configuration:

OS10(config)# ntp authentication-key number {shal | sha2-256} key
OS10(config)# ntp master {2-10}
OS10 (config)# exit
OS10# write memory

View what NTP authentication is used

Use the following to view what NTP authentication is configured on the system:

OS10% show running-configuration ntp
!
ntp authenticate
ntp authentication-key 345 md5 0 5A60910FED211F02
ntp server 1.1.1.1 key 345
ntp trusted-key 345
ntp master 7

Loopback rules

Lookback interfaces are virtual interfaces and unlike physical interfaces, loopback interfaces do not go down unless they are manually removed. This property provides security and consistency for device identification and stability.

Configure a loopback interface

Rationale: Configure a loopback interface which can be used for system multiple services.

Configuration:

OS10(config)# interface loopback 0
OS10(config)# exit
OS10# write memory

Remove multiple loopback interfaces

Rationale: Ensure that there is not more than one loopback interface configured.

Configuration:

OS10(config)# no interface loopback loopback-instance
OS10(config)# exit
OS10# write memory

Bind AAA services to a loopback interface

Rationale: AAA services are bound to a loopback interface so that the AAA services are not interrupted.

Configuration:

OS10(config)# ip tacacs source-interface loopback 0
OS10(config)# exit
OS10# write memory

Bind the NTP service to a loopback interface

Rationale: The NTP service is bound to a loopback interface so that the AAA services are not interrupted.

Configuration:

OS10(config)# ntp source loopback 0
OS10(config)# exit
OS10# write memory

Configure Control Plane Policing

Rationale: Use control-plane ACLs to selectively restrict packets that are destined to the CPU, hence preventing flooding and DoS attacks.

Configuration:

OS10# configure terminal
OS10(config)# control-plane
OS10(config-control-plane)# ip access-group acl_name in
OS10(config-control-plane)# end
OS10# write memory

ℹ️ NOTE: Define necessary ACL rules before applying to the control plane.

Data plane rules

The data plane is part of the network that carries user traffic. Data plane rules include services and settings that affect user data. Apply these rules on border-filtering devices that connect internal networks to external networks, such as the Internet.

Forbid private source addresses from external networks

Rationale: Private IP addresses are meant to be used in internal networks, such as networks that connect workstations, printers, DMZ, and so on. These IP addresses are not routed to the Internet which uses public IP addresses. A private IP address originating from the Internet is mostly an attack. Configure rules to deny any traffic from the external network that has a source address that should reside on the internal network, and apply them on the interface that connect to an external network.

⚠️ CAUTION: Verify that multicast is not in use before blocking an address range.

Configuration:

OS10(config)# ip access-list deny-private-external
OS10(config-ipv4-acl)# deny ip source-ip-address mask any log
OS10(config-ipv4-acl)# end
OS10# write memory

Forbid external source addresses on outbound traffic

Rationale: Ensure that the outbound traffic carries only valid internal addresses of the IP address range of your organization.

Configuration:

OS10(config)# ip access-list deny-source-external
OS10(config-ipv4-acl)# permit ip internal-ip-address mask any
OS10(config-ipv4-acl)# exit
OS10(config)# interface ethernet 1/1/1
OS10(conf-if-eth1/1/1)# ip access-group deny-source-external in
OS10(conf-if-eth1/1/1)# end
OS10# write memory

Neighbor authentication

Using authentication for routing protocols prevents unauthorized users from corrupting your routing table.

Configure BGP authentication if BGP is used

Rationale: Configure BGP, and secure the session with a password on both BGP peers. When you configure MD5 authentication between two BGP peers, each segment of the TCP connection is verified and the MD5 digest is checked on every segment that is sent on the TCP connection.

Configuration:

OS10(conf-router-neighbor)# password {9 encrypted-password-string | password-string}
OS10(conf-router-neighbor)# end
OS10# write memory

View what BGP neighbor authentication is enabled

Use the following to view what BGP neighbor authentication is enabled on the system:

OS10# show running-configuration bgp
!
router bgp 100
!
 neighbor 1.1.1.1
 password 9 9ee88a6225a049667a2e5294d8b0808c2ac2141a2930c06e431bf40cfcf685b1
....

Configure OSPF authentication if OSPF is used

Rationale: Configure OSPF, and secure the session with a password on both OSPF peers.

Configuration:

OS10(conf-if-eth1/1/1)# ip ospf message-digest-key 2 md5 password
OS10(conf-if-eth1/1/1)# end
OS10# write memory

X.509v3 certificates

OS10 supports X.509v3 certificates to secure communications between the switch and a host, such as a RADIUS server. Both the switch and the server exchange a public key in a signed X.509v3 certificate issued by a certificate authority (CA) to authenticate each other. The certificate authority uses its private key to sign host certificates.

Generate a certificate signing request and private key

Rationale: To use X.509v3 certificates for secure communication and user authentication on OS10 switches in a network, a public key infrastructure (PKI) with a certificate authority (CA) is required. The CA signs certificates that prove the trustworthiness of network devices.

Configuration:

OS10% crypto cert generate request cert-file cert-path key-file {private | keypath}
country 2-letter code state state locality city organization organization-name
orgunit unit-name cname common-name email email-address validity days length length
altname alt-name]

Copy CSR to the CA server.

OS10# copy home://DellHost.pem scp:///file-path/DellHost.pem
password:

The CA server signs the CSR with its private key. The CA server then makes the signed certificate available for the OS10 switch to download and install it.

crypto cert install cert-file home://cert-filepath key-file {key-path | private}
[password passphrase] [fips]

Generate a certificate signing request and private key

OS10# crypto cert generate request cert-file home://DellHost.pem key-file home://
DellHost.key
email admin@dell.com length 1024 altname DNS:dell.domain.com
Processing certificate ...
Successfully created CSR file /home/admin/DellHost.pem and key
OS10# copy home://DellHost.pem scp:///tftpuser@10.11.178.103:/tftpboot/certs/DellHost.pem
password:
OS10# copy scp:///tftpuser@10.11.178.103:/tftpboot/certs/Dell_host1_CA1.pem home://
Dell_host1_CA1.pem
password:
OS10# copy scp:///tftpuser@10.11.178.103:/tftpboot/certs/Dell_host1_CA1.key home://
Dell_host1_CA1.key
password:
OS10# crypto cert install cert-file home://Dell_host1_CA1.pem key-file home://
Dell_host1_CA1.key
Processing certificate ...
Certificate and keys were successfully installed as "Dell_host1_CA1.pem" that may be 
used in a 
security profile. CN = Dell_host1_CA1

Display trusted certificates

The following output displays the installed certificates, the validity period, and details about the CA.

OS10# show crypto cert
--------------------------------------
| Installed non-FIPS certificates |
--------------------------------------
Dell_host1_CA1.pem
--------------------------------------
| Installed FIPS certificates |
--------------------------------------
OS10# show crypto cert Dell_host1_CA1.pem
------------ Non FIPS certificate -----------------
Certificate:
Data:

Generate a self-signed certificate

Rationale: Administrators may prefer to not set up a Certificate Authority and implement a certificate trust model in the network, but still want to use the privacy features provided by the Transport Layer Security (TLS) protocol. In this case, self-signed certificates can be used.

A self-signed certificate is not signed by a CA. The switch presents itself as a trusted device in its certificate. Connecting clients may prompt their users to trust the certificate—for example, when a web browser warns that a site is unsafe—or to reject the certificate, depending on the configuration. A self-signed certificate does not provide protection against man-in-the-middle attacks.

Configuration:

  1. Create a self-signed certificate in EXEC mode. Store the device.key file in a secure, persistent location, such as NVRAM.
crypto cert generate self-signed [cert-file cert-path key-file {private | keypath}]
[country 2-letter code] [state state] [locality city] [organization organization-
name] [orgunit unit-name] [cname common-name] [email email-address] [validity days]
[length length] [altname alt-name]

If you enter the cert-file option, you must enter all the required parameters, including the local path where the certificate and private key are stored. If you do specify the cert-file option, you are prompted to enter the other parameter values for the certificate interactively; for example:

You are about to be asked to enter information that will be incorporated in your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank. For some fields there will be a default value; if you enter '.', the field will be left blank. Country Name (2 letter code) [US]: State or Province Name (full name) [Some-State]: California Locality Name (eg, city) [): San Francisco Organization Name (eg, company) ():Starfleet Command Organizational Unit Name (eg, section) ():NCC-1701A Common Name (eg, YOUR name) (hostname]:S4148-001 Email Address []:scotty@starfleet.com

  1. Install a self-signed certificate and key file in EXEC mode.
crypto cert install cert-file home://cert-filename key-file {key-path | private}
[password passphrase] [fips]

ℹ️ NOTE: You determine if the certificate-key pair is generated as FIPS-compliant. Do not use FIPS-compliant certificate-key pairs outside of FIPS mode.

If the certificate installation is successful, the file name of the self-signed certificate and its common name are displayed. Use the file name to configure the certificate in a security profile using the crypto security-profile command.

Example: Generate and install self-signed certificate and key

OS10# crypto cert generate self-signed cert-file home://DellHost.pem key-file home://
DellHost.key email admin@dell.com length 1024 altname DNS:dell.domain.com validity 365
Processing certificate
Successfully created certificate file /home/admin/DellHost.pem and key
OS10# crypto cert install cert-file home://DellHost.pem key-file home://DellHost.key
Processing certificate
Certificate and keys were successfully installed as "DellHost.pem" that may be used in a 
security profile. CN = DellHost.

Display self-signed certificate

OS10# show crypto cert
| Installed non-FIPS certificates |
DellHost.pem
| Installed FIPS certificates |
OS10# show crypto cert DellHost.pem
------------ Non FIPS certificate -----------------
Certificate:
Data:

Certificate revocation

Rationale: A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date. These certificates are no longer meant to be trusted.

Before the switch and an external device, such as a RADIUS or TLS server, set up a secure connection, they present CA-signed certificates to each other. The certificate validation allows peers to authenticate each other's identity, and is followed by checking to ensure that the certificate has not been revoked by the issuing CA.

A certificate includes the URL and other information about the certificate distribution point (CDP) that issued the certificate. Using the URL, OS10 accesses the CDP to download a certificate revocation list (CRL). If the external device's certificate is on the list or if the CDP server does not respond, the connection is not set up.

Configuration:

  1. Configure the URL for a certificate distribution point in EXEC mode.
OS10# crypto cdp add cdp-name cdp-url

Verify the CDPs accessed by the switch in EXEC mode.

OS10# show crypto cdp [cdp-name]

To delete an installed CDP, use the crypto cdp delete cdp-name command.

  1. Install CRLs that have been downloaded from CDPs in EXEC mode.
OS10# crypto crl install crl-path [crl-filename]

Display a list of the CRLs installed on the switch in EXEC mode.

OS10# show crypto crl [crl-filename]

To delete a manually installed CRL that was configured with the crypto crl install command, use the crypto crl delete [crl-filename] command.

Example: Configure CDP

OS10# crypto cdp add cert1_cdp http://crl.chambersign.org/chambersignroot.crl
Successfully added CDP
OS10# show crypto cdp
--------------------------------------
| Manually installed CDPs |
cert1 cdp.crl url
| Automatically installed CDPs |

Example: Install CRL

OS10% crypto crl install home://pki-regression/Network_Solutions_Certificate_
Authority.0.crl.pem
Processing file
issuer=C=US,O=Network Solutions L.L.C.,CN=Network Solutions Certificate
Authority.0.crl.pem
lastUpdate=Jul 7 04:15:08 2019 GMT
nextUpdate=Jul 11 04:15:08 2019 GMT
OS10% show crypto crl
| Manually installed CRLS |
Network_Solutions_Certificate_Authority.0.crl.pem
| Downloaded CRLS |

View revoked certificates

The following displays a list of revoked certificates:

OS10% show crypto crl COMODO_Certification_Authority.0.crl.pem
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: shalWithRSAEncryption
Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/
CN=COMODO Certification
Authority
Last Update: May 8 20:34:21 2019 GMT
Next Update: May 12 20:34:21 2019 GMT
CRL extensions:
X509v3 Authority Key Identifier:
keyid:0B:58:E5:8B:C6:4C:15:37:A4:40:A9:30:A9:21:BE:47:36:5A:56:FF
X509v3 CRL Number:
2904
No Revoked Certificates.
Signature Algorithm: shalWithRSAEncryption
5b:77:52:c0:a0:4e:77:be:4a:c4:6a:7e:92:98:2e:a1:6b:3c:
ad:2d:ac:db:0a:19:1d:a3:56:98:7f:d6:93:f3:1d:4b:61:40:
c3:e0:40:45:06:41:4b:66:87:35:2b:3a:4c:f3:f1:7e:44:7e:
fe:7f:51:5d:17:ee:b3:4c:15:75:a6:a0:7b:2e:b1:92:3e:b6:
71:a8:01:8d:78:ac:80:3b:16:f2:f1:a8:fd:09:68:9f:7e:09:
55:c6:80:2c:2f:e7:f3:54:51:94:3a:d8:b4:d6:00:3f:63:b1:
19:f3:42:2a:d2:c4:3b:de:c4:4d:ad:f0:72:c5:b4:25:51:e5:
3c:76:8b:97:3c:db:fe:3f:7f:41:d2:d9:aa:7f:98:90:6b:cf:
27:53:0e:66:83:8e:cc:81:ef:6a:e5:cd:c2:f1:e2:ea:84:4f:
73:bb:90:5a:b3:19:a3:50:6a:c7:b3:99:e4:09:fd:56:99:83:
3a:15:93:b0:42:49:28:78:69:85:de:fc:06:cc:b9:a5:5b:d9:
4a:b0:46:90:ce:94:3a:9c:f3:04:e4:d7:98:36:29:a8:8b:fe:
72:26:b0:fd:39:5e:14:f5:00:6d:0e:4f:ec:d4:a5:ca:4f:e1:
d9:4f:5a:37:21:e3:a2:fb:80:db:cd:68:0b:a0:fa:58:0d:5e:
40:e1:e4:1c

Configure security profiles

To use independent sets of security credentials for different OS10 applications, you can configure multiple security profiles and assign them to OS10 applications. A security profile consists of a certificate and private key pair.

For example, you can maintain different security profiles for RADIUS over TLS authentication and SmartFabric services. Assign a security profile to an application when you configure the profile.

Example: Security profile in RADIUS over TLS authentication

OS10# show crypto cert
--------------------------------------
| Installed non-FIPS certificates |
--------------------------------------
dv-fedgov-s6010-1.pem
--------------------------------------
| Installed FIPS certificates |
--------------------------------------
OS10#
OS10(config)#
OS10(config)# crypto security-profile radius-prof
OS10(config-sec-profile)# certificate dv-fedgov-s6010-1
OS10(config-sec-profile)# revocation-check
OS10(config-sec-profile)# peer-name-check
OS10(config-sec-profile)# exit
OS10(config)#
OS10(config)# radius-server host radius-server-2.test.com tls security-profile radius-
prof
key radsec
OS10(config)# end
OS10# show running-configuration crypto security-profile
!
crypto security-profile radius-prof
 certificate dv-fedgov-s6010-1

Check if a security profile is enabled

The following shows if a security profile is enabled.

OS10# show running-configuration radius-server
radius-server host radius-server-2.test.com tls security-profile radius-prof key 9
2b9799adc767c0efe8987a694969b1384c541414ba18a44cd9b25fc00ff180e9

Smart card authentication for SSH

OS10 allows you to use Common Access Card (CAC) and Personal Identity Verification (PIV) smart cards for authenticating users when connecting to the device with SSH. CAC and PIV smart cards contain Public Key Infrastructure (PKI) X.509v3 certificates that are issued by certificate authorities. This feature allows the OS10 software to verify user authentication and email signing and encryption. To use smart card authentication, use an SSH client that supports X.509v3 authentication.

Rationale: Although users can use strong and complex passwords for secure access to their devices, people tend to write their passwords down or store them in unsecured locations. Using a smart card for SSH improves security such that users need not memorize complex passwords.

The OS10 SSH server supports X.509v3 smart card authentication in two forms - with or without a password. When you use X.509v3 authentication with passwords, you can use X.509v3 authentication along with remote authentication using RADIUS or TACACS+ authentication.

Remote user authentication with a password

When you configure the switch for X.509v3 SSH authentication and remote authentication of users using RADIUS or TACACS+, and when connecting using SSH, the following sequence occurs:

  1. Insert a CAC or PIV smart card into the card reader slot in your system or keyboard.
  2. Start an RFC 6187 X.509v3 compatible SSH client application, set authentication to smart card or CAC, and make a connection to the OS10 switch.
  3. The SSH client application makes the initial connection to the switch, negotiates X.509v3 authentication, and validates the OS10 switch X.509v3 certificate.
  4. The SSH client application prompts you to select the required authentication certificate from the CAC or PIV card.
  5. The SSH client application prompts you to enter the PIN for the CAC or PIV card.
  6. The SSH client application sends an authentication request with your X.509v3 certificate.
  7. The OS10 SSH server validates the public certificate, including validating the trust chain, valid date range, and usage fields. If any of the fields are invalid, the authentication fails.
  8. If the configured OS10 security profile calls for revocation checking, the OS10 SSH server verifies that the certificate is not revoked. Verification is done by checking either the appropriate CRL or by sending an OCSP request to the appropriate OCSP responder.
  9. If the certificate is revoked, the authentication fails.
  10. If peer-name-checking is enabled in the security profile, the OS10 SSH server matches the common name or principal name fields from the user certificate against the username. The authentication fails if there is no match.
  11. The OS10 SSH server prompts you for a password.
  12. The OS10 SSH server performs standard RADIUS or TACACS+ user authentication using the username and returned password.
  13. On successful authentication, the SSH session continues.

Local user authentication with a password

When you configure the OS10 SSH server for X.509v3 SSH local authentication and when you connect using SSH, the following sequence occurs:

  1. Insert a CAC or PIV smart card into the card reader slot in your computer or keyboard.
  2. Start an RFC 6187 X.509v3 compatible SSH client application, set authentication to smart card or CAC, and make a connection to the OS10 switch.
  3. The SSH client application makes the initial connection to the switch, negotiates X.509v3 authentication, and validates the X.509v3 certificate.
  4. The SSH client application prompts you to select the required authentication certificate from the CAC or PIV card.
  5. The SSH client application prompts you to enter the PIN for the CAC or PIV card.
  6. The SSH client application sends an authentication request with the X.509v3 certificate.
  7. The OS10 SSH server validates the public certificate, including validating the trust chain, valid date range, and usage fields. If any of the fields are invalid, the authentication fails.
  8. If the configured OS10 security profile calls for revocation checking, the OS10 SSH server verifies that the certificate is not revoked. Verification is done by checking either the appropriate CRL or by sending an OCSP request to the appropriate OCSP responder.
  9. If the certificate is revoked, the authentication fails.
  10. If peer-name-checking is enabled in the security profile, the OS10 SSH server matches the common name or principal name fields from the user certificate against the username.
  11. If there is no match, the OS10 SSH server attempts to match the user certificate fields against any configured certificate for that local username.
  12. If there is no match, the authentication fails.

Local user authentication without a password

When you configure OS10 SSH server for X.509v3 SSH local authentication, and when connecting using SSH, the following sequence occurs:

  1. Insert a CAC or PIV smart card into the card reader slot in your computer or keyboard.
  2. Start an RFC 6187 X.509v3 compatible SSH client application, set authentication to smart card or CAC, and make a connection to the OS10 switch.
  3. The SSH client application makes the initial connection to the switch, negotiates X.509v3 authentication, and validates the OS10 switch X.509v3 certificate.
  4. The SSH client application prompts you to select the required authentication certificate from the CAC or PIV card.
  5. The SSH client application prompts you to enter the PIN for the CAC or PIV card.
  6. The SSH client application sends an authentication request with the X.509v3 certificate.
  7. The OS10 SSH server validates the public certificate, including validating the trust chain, valid date range, and usage fields. If any of the fields are invalid, the authentication fails.
  8. If the configured OS10 security profile calls for revocation checking, the OS10 SSH server verifies that the certificate is not revoked. Verification is done by checking either the appropriate CRL or by sending an OCSP request to the appropriate OCSP responder.
  9. If the certificate is revoked, the authentication fails.
  10. The OS10 SSH server attempts to match the user certificate fields against the configured certificate for that local username.
  11. If there is a match, the authentication succeeds and the SSH session proceeds without a password prompt.

Configure remote user authentication with a password

To support remote user authentication by smart card and password, configure the following:

radius-server host {hostname | ip-address} key {0 authentication-key | 9
authentication-key | authentication-key} [auth-port port-number]
aaa authentication login default group radius local
ip ssh server x509v3-authentication security-profile profile-name

If all SSH login attempts require an X.509v3 certificate, disable the plain password authentication and SSH public key authentication in the SSH server.

no ip ssh server password-authentication
no ip ssh server pubkey-authentication

Configure local user authentication with a password

To support local user authentication by smart card and password, configure the following:

ip ssh server x509v3-authentication security-profile profile-name
no ip ssh server password-authentication
no ip ssh server pubkey-authentication
username username certificate subject “x509v3-subject-string”
or
username username certificate principal-name user-principal-name-string
or
username username certificate fingerprint fingerprint-value

Generate and install a new security certificate on OS10 10.4.3.0 and later releases for full switch mode

Rationale: Switches running on OS 10.5.0.7P3 and previous supported releases, that have VLT or SmartFabric Services enabled, use secure channels to communicate with each other. To establish secure channels, OS10 uses X.509v3 certificates. When a user logs in to the system, OS10 images from 10.4.3.x to 10.5.0.7P3 display a warning message that the cluster manager is using the default credentials.

Configuration notes:

Use the following procedure to install a valid certificate so that the system stops displaying the warning message and continues to function properly. This procedure only works for OS10 releases 10.4.3.0 and later. If you are running OS10 releases between 10.4.1.4 and 10.4.2.x, upgrade to a later release.

Configuration:

  1. Verify the OS10 version on both devices.

Switch-A:

Switch-A# show version
Dell EMC Networking OS10 Enterprise
Copyright (c) 1999-2020 by Dell Inc. All Rights Reserved. OS Version: 10.5.0.7P3
Build Version: 10.5.0.7.745
Build Time: 2020-06-02T22:46:24+0000
System Type: MX9116N-ON
Architecture: x86_64
Up Time: 00:07:32

Switch-B:

Switch-B# show version
Dell EMC Networking OS10 Enterprise
Copyright (c) 1999-2020 by Dell Inc. All Rights Reserved. OS Version: 10.5.0.7P3
Build Version: 10.5.0.7.745
Build Time: 2020-06-02T22:46:24+0000
System Type: MX9116N-ON
Architecture: x86_64
Up Time: 00:08:10
  1. Verify if the system is in full switch mode.

Switch-A:

Switch-A# show switch-operating-mode
8713-TOR-2# Switch-Operating-Mode : Full Switch Mode

Switch-B:

Switch-B# show switch-operating-mode
8713-ToR-2# Switch-Operating-Mode : Full Switch Mode
  1. Verify if VLT is converged.

Switch-A:

Switch-A32% show vlt 255
Domain ID : 255
Unit ID : 1 Role : primary
Version : 2.3
Local System MAC address : 20:04:0f:20:86:00
Role priority : 32768
VLT MAC address : 20:04:0f:21:9a:00
IP address : fda5:74c8:b79e:1::1
Delay-Restore timer : 90 seconds
Peer-Routing : Disabled
Peer-Routing-Timeout timer : 0 seconds
VLTi Link Status
port-channel1000 : up
VLT Peer Unit ID System MAC Address Status IP Address Version
2 20:04:0f:21:9a:00 up fda5:74c8:b79e:1::2 2.3

Switch-B:

Switch-B3% show vlt 255
Domain ID : 255
Unit ID : 2 Role : secondary
Version : 2.3
Local System MAC address : 20:04:0f:21:9a:00
Role priority : 32768
VLT MAC address : 20:04:0f:21:9a:00
IP address : fda5:74c8:b79e:1::2
Delay-Restore timer : 90 seconds
Peer-Routing : Disabled
Peer-Routing-Timeout timer : 0 seconds
VLTi Link Status
port-channel1000 : up
VLT Peer Unit ID System MAC Address Status IP Address Version
1 20:04:0f:20:86:00 up fda5:74c8:b79e:1::1 2.3
  1. Create a self-signed certificate using the OS10 CLI. You can do this on one of the switches in the same VLT domain or SmartFabric Cluster.

Switch-A:

Switch-A# crypto cert generate self-signed cert-file home://dell.crt key-file home://
dell.ky cname sfscert
Processing file
Successfully created certificate file and key

You can also specify the following parameters:

  1. Verify if the newly created certificates are present in the home directory.

Switch-A:

Switch-A2% dir home
Directory contents for folder: home
Date (modified) Size (bytes) Name
2020-12-18T14:20:32Z 1017 dell.crt 2020-12-18T14:20:32Z 1675 dell.ky
  1. Copy the certificate and key from Switch-A to an SCP server. In this example, SCP is used but you can also use a TFTP or FTP server.

Switch-A:

Switch-A# copy home://dell.crt scp://<username>:<password>@100.104.54.214/dell.crt
Switch-A# copy home://dell.ky scp://<username>:<password>@100.104.54.214/dell.ky
  1. Copy the certificate and key from the SCP server to Switch- B.

Switch-B:

Switch-B# copy scp://<username>:<password>@100.104.54.214/dell.crt home://dell.crt
Switch-B# copy scp://<username>:<password>@100.104.54.214/dell.ky home://dell.ky

ℹ️ NOTE: All devices in the SFS cluster or VLT domain must have the same certificate and key files.

  1. Verify if the certificate is copied to Switch- B.

Switch-B:

Switch-B3% dir home
Directory contents for folder: home
Date (modified) Size (bytes) Name
2020-12-18T14:59:51Z 1017 dell.crt 2020-12-18T15:00:42Z 1675 dell.ky
  1. Install a self-signed certificate and key file.

Switch-A:

Switch-A# crypto cert install cert-file home://dell.crt key-file home://dell.ky

Switch-B:

Switch-B# crypto cert install cert-file home://dell.crt key-file home://dell.ky

Run the show crypto cert command to make sure that the certificate is installed on the system.

  1. Create a security profile.

Switch-A:

Switch-A(config)# crypto security-profile DELL123

Switch-B:

Switch-B(config)# crypto security-profile DELL123
  1. Assign the certificate and private key pair to the security profile. Enter the certificate name without the file extension.

Switch-A:

Switch-A(config-sec-profile)# certificate dell

Switch-B:

Switch-B(config-sec-profile)# certificate dell
  1. Create a security profile for the cluster.

Switch-A:

Switch-A(config)# cluster security-profile DELL123

Switch-B:

Switch-A(config)# cluster security-profile DELL123
  1. Open a new SSH session and verify that the warning messages are not displayed. Even if the new certificate is not in effect on the VLT domain or SFS cluster, the system does not generate the warning message.
  1. For MX devices, reboot one of the VLT peers in each VLT pair and the SFS primary node if you are running a multi-node cluster deployment. For non-MX devices, flap the VLTi link.

⚠️ CAUTION: Flapping the VLTi link or rebooting the node may lead to transient packet loss. Perform this step during a maintenance window.

  1. (Optional) Verify if VLT is converged.

Switch-A:

Switch-A# show vlt 255
Domain ID : 255
Unit ID : 1 Role : primary
Version : 2.3
Local System MAC address : 20:04:0f:20:86:00
Role priority : 32768
VLT MAC address : 20:04:0f:21:9a:00
IP address : fda5:74c8:b79e:1::1
Delay-Restore timer : 90 seconds
Peer-Routing : Disabled
Peer-Routing-Timeout timer : 0 seconds
VLTi Link Status
port-channel1000 : up
VLT Peer Unit ID System MAC Address Status IP Address Version
2 20:04:0f:21:9a:00 up fda5:74c8:b79e:1::2 2.3

Switch-B:

Switch-B# show vlt 255
Domain ID : 255
Unit ID : 2 Role : secondary
Version : 2.3
Local System MAC address : 20:04:0f:21:9a:00
Role priority : 32768
VLT MAC address : 20:04:0f:21:9a:00
IP address : fda5:74c8:b79e:1::2
Delay-Restore timer : 90 seconds
Peer-Routing : Disabled
Peer-Routing-Timeout timer : 0 seconds
VLTi Link Status
port-channel1000 : up

PDF preview unavailable. Download the PDF instead.

os10-security-guide en-us Antenna House PDF Output Library 7.0.1614

Related Documents

Preview Dell EMC SmartFabric OS10 User Guide Release 10.5.3
Comprehensive user guide for Dell EMC SmartFabric OS10, Release 10.5.3. Covers installation, configuration, management, and advanced features of the OS10 operating system for Dell networking switches.
Preview Dell EMC OS10 Enterprise Edition Concise Configuration Manual
A comprehensive guide to configuring Dell EMC OS10 Enterprise Edition, covering network setup, management, and troubleshooting.
Preview OS10 Enterprise Edition User Guide for PowerEdge MX I/O Modules
Comprehensive user guide for OS10 Enterprise Edition, detailing the configuration and management of PowerEdge MX I/O Modules. Covers installation, CLI basics, interfaces, routing protocols, system management, and access control lists.
Preview OS10 Enterprise Edition User Guide Release 10.4.0E(R3)
Comprehensive user guide for Dell EMC OS10 Enterprise Edition Release 10.4.0E(R3), detailing installation, configuration, command-line interface (CLI) operations, troubleshooting, and system management for network professionals.
Preview Dell EMC Storage & Genetec Security Center Configuration Best Practices Guide
A comprehensive guide for Dell EMC personnel and Genetec partners on configuring Dell EMC storage solutions for Genetec Security Center, covering best practices for performance, reliability, and security.
Preview Dell EMC PowerProtect Cyber Recovery Security Configuration Guide
This guide provides an overview of Dell EMC PowerProtect Cyber Recovery settings for access control, logfiles, communication, and data security. It also includes useful information about Cyber Recovery licensing and code integrity, security patches, malware protection, and manual vault security.
Preview Dell EMC OpenManage Enterprise-Modular Edition for PowerEdge MX7000 Chassis User's Guide
Comprehensive user guide for Dell EMC OpenManage Enterprise-Modular Edition (OME-Modular) software, detailing the management of PowerEdge MX7000 Chassis, including firmware updates, network configuration, compute sled management, and troubleshooting.
Preview Dell EMC PowerEdge R650xs BIOS and UEFI Reference Guide
This guide provides detailed information on configuring the BIOS and UEFI settings for the Dell EMC PowerEdge R650xs server, covering system setup, BIOS options, device settings, and security features.