Dell PowerSwitch S4128F-ON SmartFabric OS10 Security Best Practices Guide July - Page 3

SmartFabric OS10 Security Best Practices Guide July 2020, OS10 security best practices

Page 3 highlights

Contents Chapter 1: OS10 security best practices 4 On first boot...4 Password rules...5 Federal Information Processing Standards (FIPS)...6 Enable and configure secure boot...6 Users, roles, and privilege levels...7 Port security...9 Management plane...11 Role-based access control...11 Access rules...13 Banner rules...15 SNMP rules...15 Control plane...17 System clock rules...17 Logging rules...17 NTP rules...18 Loopback rules...19 Data plane rules...19 Neighbor authentication...20 X.509v3 certificates...21 Contents 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26

Chapter 1: OS10 security best practices
............................................................................................
4
On first boot
...........................................................................................................................................................................
4
Password rules
.......................................................................................................................................................................
5
Federal Information Processing Standards (FIPS)
............................................................................................................
6
Enable and configure secure boot
.......................................................................................................................................
6
Users, roles, and privilege levels
...........................................................................................................................................
7
Port security
...........................................................................................................................................................................
9
Management plane
...............................................................................................................................................................
11
Role-based access control
.............................................................................................................................................
11
Access rules
....................................................................................................................................................................
13
Banner rules
....................................................................................................................................................................
15
SNMP rules
.....................................................................................................................................................................
15
Control plane
.........................................................................................................................................................................
17
System clock rules
..........................................................................................................................................................
17
Logging rules
...................................................................................................................................................................
17
NTP rules
.........................................................................................................................................................................
18
Loopback rules
................................................................................................................................................................
19
Data plane rules
....................................................................................................................................................................
19
Neighbor authentication
.....................................................................................................................................................
20
X.509v3 certificates
............................................................................................................................................................
21
Contents
Contents
3