2.9. Security command reference

2.9.1. Command hierarchies

2.9.1.1. Configuration commands

2.9.1.1.1. Security commands

config
— system
copy {user source-user | profile source-profile} to destination [overwrite]
dot1x
[no] ftp-server
hash-control [read-version {1 | 2 | all}] [write-version {1 | 2}]
[no] keychain keychain-name
[no] profile user-profile-name
[no] radius
snmp
application app [ip-int-name|ip-address]
— no application app
ssh
[no] tacplus
[no] telnet-server
[no] users user-name
user-template {tacplus_default | radius_default}

2.9.1.1.2. Management Access Filter commands

Note:

IPv6 management access filters are supported on all platforms as described in this document, except the 7210 SAS-K 2F1C2T.

config
— system
[no] ip-filter
default-action {permit | deny | deny-host-unreachable}
[no] entry entry-id
action {permit | deny | deny-host-unreachable}
— no action
description description-string
dst-port port [mask]
— no dst-port
fragment {true | false}
— no fragment
l4-src-port port [mask]
[no] log
protocol protocol-id
— no protocol
router router-instance
— no router
src-ip {ip-prefix/mask | ip-prefix netmask}
— no src-ip
src-port {port-id | lag lag-id}
— no src-port
[no]ipv6-filter
default-action {permit | deny | deny-host-unreachable}
[no] entry entry-id
action {permit | deny | deny-host-unreachable}
— no action
description description-string
dst-port port [mask]
— no dst-port
flow-label value
— no flow-label
l4-src-port port [mask]
[no] log
next-header next-header
router router-instance
— no router
src-ip {ip-prefix/prefix-length | ip-prefix netmask}
— no src-ip
src-port {port-id | lag lag-id}
— no src-port
renum old-entry-number new-entry-number
[no] shutdown

2.9.1.1.3. Security password commands

config
— system
admin-password password [hash | hash2]
aging days
— no aging
attempts count [time minutes1] [lockout minutes2]
— no attempts
authentication-order [method-1] [method-2] [method-3] [exit-on-reject]
credits [lowercase credits] [uppercase credits] [numeric credits] [special-character credits]
— no credits
minimum-classes minimum
minimum-length length
required [lowercase count] [uppercase count] [numeric count] [special-character count]
— no required
hashing {bcrypt | sha2-pbkdf2}
[no] health-check [interval interval]

2.9.1.1.4. Profile commands

config
— system
[no] profile user-profile-name
default-action {deny-all | permit-all | none}
[no] entry entry-id
action {deny | permit}
description description-string
match command-string
— no match
renum old-entry-number new-entry-number

2.9.1.1.5. RADIUS commands

config
— system
[no] radius
[no] accounting
[no] authorization
port port
— no port
retry count
— no retry
server server-index address ip-address secret key [hash | hash2]
— no server server-index
[no] shutdown
timeout seconds
— no timeout

2.9.1.1.6. SSH commands

config
— system
ssh
client-cipher-list protocol-version version
cipher index name cipher-name
— no cipher index
mac index name mac-name
— no mac index
kex index name kex-name
— no kex index
[no] preserve-key
server-cipher-list protocol-version version
cipher index name cipher-name
— no cipher index
kex index name kex-name
— no kex index
mac index name mac-name
— no mac index
[no] version SSH-version

2.9.1.1.7. TACPLUS commands

config
— system
[no] tacplus
accounting [record-type {start-stop | stop-only}]
— no accounting
[no] authorization
server server-index address ip-address secret key [hash | hash2] [port port]
— no server server-index
[no] shutdown
timeout seconds
— no timeout

2.9.1.1.8. User commands

config
— system
[no] users user-name
[no] access [ftp] [snmp] [console]
login-exec url-prefix::source-url
— no login-exec
member user-profile-name [user-profile-name…(up to 8 max)]
— no member user-profile-name
home-directory url-prefix [directory] [directory/directory…]
password [password] [hash | hash2]
ecdsa
ecdsa-key ecdsa-public-key-id [create]
— no ecdsa-key ecdsa-public-key-id
description description-string
key-value ecdsa-public-key-value
— no key-value
rsa
rsa-key rsa-public-key-id [create]
— no rsa-key rsa-public-key-id
description description-string
key-value rsa-public-key-value
— no key-value
snmp
authentication {md5 key-1 | sha key-1} [privacy none] [hash]
authentication {md5 key-1 | sha key-1} privacy privacy-level key-2 [hash]
group group-name
— no group

2.9.1.1.9. User template commands

config
— system
user-template {tacplus_default | radius_default}
[no] access [ftp] [console]
login-exec url-prefix:source-url
— no login-exec
home-directory url-prefix [directory][directory/directory..]

2.9.1.1.10. Dot1x commands

config
— system
dot1x
radius-plcy name [create]
retry count
— no retry
server server-index address ip-address secret key [hash|hash2] [auth-port auth-port] [acct-port acct-port] [type server-type]
source-address ip-address
[no] shutdown
timeout seconds
— no timeout
[no] shutdown

2.9.1.1.11. Keychain commands

config
— system
[no] keychain keychain-name
description description-string
direction {uni | bi}
bi
entry {null-key | entry-id key authentication-key | hash-key | hash2-key [hash | hash2] algorithm algorithm}
— no entry {null-key | entry-id}
begin-time [date] [hours-minutes] [UTC] {now| forever}
[no] shutdown
tolerance [seconds | forever]
uni
entry {null-key | entry-id key authentication-key | hash-key | hash2-key [hash | hash2] algorithm algorithm}
— no entry {null-key | entry-id}
begin-time [date] [hours-minutes] [UTC] {now| forever}
end-time [date][hours-minutes] [UTC] {now| forever}
[no] shutdown
tolerance [seconds | forever]
send
entry entry-id key [authentication-key | hash-key | hash2-key] [hash | hash2] algorithm algorithm
begin-time [date] [hours-minutes] [UTC] {now| forever}
[no] shutdown
[no] shutdown
receive option-number
send option-number

2.9.1.1.12. Login control commands

config
— system
ftp
idle-timeout {minutes | disable}
[no] login-banner
motd {url url-prefix: source-url | text motd-text-string}
— no motd
pre-login-message login-text-string [name]
ssh
telnet

2.9.1.1.13. IPsec commands

config
ipsec
static-sa sa-name
— no static-sa
authentication auth-algorithm ascii-key ascii-string
authentication auth-algorithm hex-key hex-string [hash | hash2]
description description-string
direction ipsec-direction
— no direction
protocol ipsec-protocol
— no protocol
spi spi
— no spi

2.9.1.2. Show commands

2.9.1.2.1. Security commands

show
— system
— security
access-group [group-name]
authentication [statistics]
keychain [key-chain] [detail]
ip-filter [entry entry-id]
ipv6-filter [entry entry-id]
profile [user-profile-name]
ssh
user [user-id] [detail]
view [view-name] [detail]

2.9.1.2.2. Login control commands

show
users

2.9.1.3. Clear commands

admin
user user-name
lockout

2.9.1.4. Debug commands

debug
— router
radius
— no radius
detail-level {low | medium | high}
packet-type [authentication] [accounting] [coa]
radius-attr type attribute-type [transaction]
radius-attr type attribute-type [transaction] {address | hex | integer | string} value attribute-value
radius-attr vendor vendor-id type attribute-type [transaction] [encoding encoding-type]
radius-attr vendor vendor-id type attribute-type [transaction] [encoding encoding-type] {address | hex | integer | string} value attribute-value
— no radius-attr type attribute-type
— no radius-attr type attribute-type {address | hex | integer | string} value attribute-value
— no radius-attr vendor vendor-id type attribute-type
— no radius-attr vendor vendor-id type attribute-type {address | hex | integer | string} value attribute-value
server-address ip-address
— no server-address ip-address

2.9.2. Command descriptions

2.9.2.1. Configuration commands

2.9.2.1.1. General security commands

description

Syntax 
description description-string
no description
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
config>sys>security>keychain>direction>bi>entry
config>system>security>keychain>direction>uni>receive>entry
config>system>security>keychain>direction>uni>send>entry
config>system>security>user>public-keys>ecdsa>ecdsa-key
config>system>security>user>public-keys>rsa>rsa-key
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

This command associates a text string with a configuration context to help identify the context in the configuration file.

The no form of this command removes the string.

Parameters 
string—
Specifies the description character string. Allowed values are any string up to 80 characters composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>mgmt-access-filter
config>system>security>keychain>direction>bi>entry
config>system>security>keychain>direction>uni>receive>entry
config>system>security>keychain>direction>uni>send>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

The shutdown command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many entities must be explicitly enabled using the no shutdown command. The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

The no form of this command puts an entity into the administratively enabled state.

Default 

no shutdown

security

Syntax 
security
Context 
config>system
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure security settings.

Security commands manage user profiles and user membership. Security commands also manage user login registrations.

ftp-server

Syntax 
[no] ftp-server
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables FTP servers running on the system.

FTP servers are disabled by default. At system startup, only SSH servers are enabled.

The no form of this command disables FTP servers running on the system.

hash-control

Syntax 
hash-control [read-version {1 | 2 | all}] [write-version {1 | 2}]
no hash-control
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

If the user executes a save or info command, the system will encrypt all passwords, for example, MD5 keys, for security reasons. At present, two algorithms exist.

The first algorithm is a simple, short key that can be copied and pasted in a different location when the user wants to configure the same password. However, because it is the same password and the hash key is limited to the password/key, even the casual observer will notice that it is the same key.

The second algorithm is a more complex key, and cannot be copied and pasted in different locations in the configuration file. In this case, if the same key or password is used repeatedly in different contexts, each encrypted (hashed) version will be different.

Default 

hash-control read-version all

Parameters 
read-version {1 | 2 | all}
When the read-version is configured as “all,” both versions 1 and 2 will be accepted by the system. Otherwise, only the selected version will be accepted when reading configuration or exec files. The presence of incorrect hash versions will abort the script/startup.
write-version {1 | 2}
Selects the hash version that will be used the next time the configuration file is saved (or an info command is executed). Be careful to save the read and write version correctly, so that the file can be properly processed after the next reboot or exec.

source-address

Syntax 
source-address
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the source address that should be used in all unsolicited packets sent by the application.

This feature only applies on in-band interfaces and does not apply on the out-band management interface. Packets going out the management interface will keep using that as the source IP address. That is, when the RADIUS server is reachable through both the management interface and a network interface, the management interface is used despite what is configured under the source-address statement.

application

Syntax 
application app [ip-int-name | ip-address]
no application app
Context 
config>system>security>source-address
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the application to use the source IP address specified by the source-address command.

Parameters 
app—
Specifies the application name.
Values—
telnet, ftp, ssh, radius, tacplus, snmptrap, syslog, ping, traceroute, dns, sntp, ntp
Note:

PTP is not supported on all platforms. Only the applications supported on the platform can be used as a value with this command. Using an unsupported application value will not have the desired effect.

 

ip-int-name | ip-address—
Specifies the name of the IP interface and IP address. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

telnet-server

Syntax 
[no] telnet-server
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables Telnet servers running on the system.

Telnet servers are off by default. At system startup, only SSH servers are enabled.

Telnet servers in networks limit Telnet clients to three attempts to login. The Telnet server disconnects the Telnet client session after three attempts.

The no form of this command disables Telnet servers running on the system.

2.9.2.1.2. Login, Telnet, SSH and FTP commands

exponential-backoff

Syntax 
[no] exponential-backoff
Context 
config>system>login-control
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables the exponential backoff of the login prompt. The exponential-backoff command is used to deter dictionary attacks, when a malicious user can gain access to the CLI by using a script to try admin with any conceivable password.

The no form of this command disables exponential backoff.

Default 

no exponential-backoff

ftp

Syntax 
ftp
Context 
config>system>login-control
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure FTP login control parameters.

idle-timeout

Syntax 
idle-timeout {minutes | disable}
no idle-timeout
Context 
config>system>login-control
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the idle timeout for FTP, console, or Telnet sessions before the session is terminated by the system.

By default, an idle FTP, console, SSH, or Telnet session times out after 30 minutes of inactivity. This timer can be set per session.

The no form of this command reverts to the default value.

Default 

idle-timeout 30

Parameters 
minutes—
Specifies the idle timeout in minutes. Allowed values are 1 to 1440. A value of 0 implies that the sessions never timeout.
Values—
1 to 1440

 

disable—
Keyword specifying that a session will never timeout. To re-enable idle timeout, enter the command without the disable option.

inbound-max-sessions

Syntax 
inbound-max-sessions value
no inbound-max-sessions
Context 
config>system>login-control>ftp
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the maximum number of concurrent inbound FTP sessions.

This value is the combined total of inbound and outbound sessions.

The no form of this command reverts to the default value.

Default 

inbound-max-sessions 3

Parameters 
value—
Specifies the maximum number of concurrent FTP sessions on the node.
Values—
0 to 5

 

inbound-max-sessions

Syntax 
inbound-max-sessions value
no inbound-max-sessions
Context 
config>system>login-control>telnet
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command limits the number of inbound Telnet and SSH sessions. A maximum of 15 Telnet and SSH connections can be established to the router. The local serial port cannot be disabled.

The no form of this command reverts to the default value.

Default 

inbound-max-sessions 5

Parameters 
value—
Specifies the maximum number of concurrent inbound Telnet sessions, expressed as an integer.
Values—
0 to 7

 

login-banner

Syntax 
[no] login-banner
Context 
config>system>login-control
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables or disables the display of a login banner. The login banner contains the 7210 SAS copyright and build date information for a console login attempt.

The no form of this command causes only the configured pre-login message and a generic login prompt to display.

login-control

Syntax 
login-control
Context 
config>system
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure the session control for the console, Telnet, and FTP.

motd

Syntax 
motd {url url-prefix: source-url | text motd-text-string}
no motd
Context 
config>system>login-control
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the message of the day displayed after a successful console login. Only one message can be configured.

The no form of this command removes the message.

Parameters 
url url-prefix: source-url
Specifies the URL prefix and source URL of the file containing the message of the day. When the message of the day is present as a text file, provide both url-prefix and the source-url of the file containing the message of the day. The URL prefix can be local or remote.
text motd-text-string
Specifies the text of the message of the day. The motd-text-string must be enclosed in double quotes. Multiple text strings are not appended to one another.

Some special characters can be used to format the message text. The “\n” character creates multi-line MOTDs and the “\r” character restarts at the beginning of the new line. For example, entering “\n\r” will start the string at the beginning of the new line, while entering “\n” will start the second line following the last character from the first line.

outbound-max-sessions

Syntax 
outbound-max-sessions value
no outbound-max-sessions
Context 
config>system>login-control>telnet
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command limits the number of outbound Telnet and SSH sessions. A maximum of 15 telnet and ssh connections can be established from the router. The local serial port cannot be disabled.

The no form of this command reverts to the default value.

Default 

outbound-max-sessions 5

Parameters 
value—
Specifies the maximum number of concurrent outbound Telnet sessions, expressed as an integer.
Values—
0 to 7

 

pre-login-message

Syntax 
pre-login-message login-text-string [name]
no pre-login-message
Context 
config>system>login-control
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures a message displayed prior to console login attempts on the console using Telnet.

Only one message can be configured. If multiple pre-login-messages are configured, the last message entered overwrites the previous entry.

It is possible to add the name parameter to an existing message without affecting the current pre-login-message.

The no form of this command removes the message.

Parameters 
login-text-string—
Specifies a login text string, up to 900 characters. Any printable, 7-bit ASCII characters can be used. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.
name—
When the keyword name is defined, the configured system name is always displayed first in the login message. To remove the name from the login message, the message must be cleared and a new message entered without the name.

ssh

Syntax 
ssh
Context 
config>system>login-control
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure SSH parameters.

disable-graceful-shutdown

Syntax 
[no] disable-graceful-shutdown
Context 
config>system>login-control>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables graceful shutdown of SSH sessions.

The no form of this command disables graceful shutdown of SSH sessions.

client-cipher-list

Syntax 
client-cipher-list protocol-version version
Context 
config>system>security>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables the configuration of a list of allowed ciphers by the SSH client.

Parameters 
version—
Specifies the SSH version.
Values—
1 — Specifies that the SSH server will only accept connections from clients that support SSH protocol version 1. 2 — Specifies that the SSH server will accept connections from clients that support SSH protocol version 2.

 

cipher

Syntax 
cipher index name cipher-name
no cipher index
Context 
config>system>security>ssh>client-cipher-list
config>system>security>ssh>server-cipher-list
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables the configuration of a cipher. Client-ciphers are used when the 7210 SAS is acting as an SSH client. Server ciphers are used when the 7210 SAS is acting as an SSH server.

The no form of this command removes the index and cipher name from the configuration.

Default 

no cipher index

Parameters 
index—
Specifies the index of the cipher in the list.
Values—
1 to 255

 

cipher-name—
Specifies the algorithm used when performing encryption or decryption.
Values—
The following table lists the default ciphers used for SSHv1.

 

Table 12:  SSHv1 default ciphers 

Cipher Index Value

Cipher Name

Cipher

Client

Server

200

3des

205

blowfish

210

des

Values—
The following table lists the default ciphers used for SSHv2.

 

Table 13:  SSHv2 default ciphers 

Cipher Index Value

Cipher Name

Cipher

Client

Server

190

aes256-ctr

192

aes192-ctr

194

aes128-ctr

200

aes128-cbc

205

3des-cbc

210

blowfish-cbc

215

cast128-cbc

220

arcfour

225

aes192-cbc

230

aes256-cbc

235

rijndael-cbc

client-mac-list

Syntax 
client-mac-list
Context 
config>system>security>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure SSH MAC algorithms for the 7210 SAS acting as a client.

mac

Syntax 
mac index name mac-name
no mac index
Context 
config>system>security>ssh>client-mac-list
config>system>security>ssh>server-mac-list
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command allows the user to configure SSH MAC algorithms for the 7210 SAS acting as an SSH server or an SSH client.

The no form of this command removes the specified mac index.

Default 

no mac index

Parameters 
index—
Specifies the index of the algorithm in the list.
Values—
1 to 255

 

mac-name—
Specifies the algorithm for calculating the message authentication code.
Values—
The following table lists the default client and server algorithms used for SSHv2.

 

Table 14:  SSHv2 default client and server algorithms 

Cipher Index Value

MAC Name

200

hmac-sha2-512

210

hmac-sha2-256

215

hmac-sha1

220

hmac-sha1-96

225

hmac-md5

230

hmac-ripemd160

235

hmac-ripemd160-openssh-com

240

hmac-md5-96

client-kex-list

Syntax 
client-kex-list
Context 
config>system>security>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

Commands in this context configure SSH KEX algorithms for the 7210 SAS in the client role.

By default, the SSH advertises a KEX list that contains the following algorithms:

  1. diffie-hellman-group16-sha512
  2. diffie-hellman-group14-sha256
  3. diffie-hellman-group14-sha1
  4. diffie-hellman-group-exchange-sha1
  5. diffie-hellman-group1-sha1

kex

Syntax 
kex index name kex-name
no kex index
Context 
config>system>security>ssh>client-kex-list
config>system>security>ssh>server-kex-list
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

This command configures phase 1 SSHv2 KEX algorithms for the 7210 SAS in the SSH server or an SSH client role.

The no form of this command removes the specified KEX index. If all KEX indexes are removed, the default list is used.

Parameters 
index—
Specifies the index of the algorithm in the list. The lowest KEX index is negotiated first and the highest index, which is at the bottom of the KEX list, is negotiated last in the SSH negotiation.
Values—
1 to 255

 

kex-name—
Specifies the KEX algorithm for computing the shared secret key.
Values—
diffie-hellman-group16-sha512, diffie-hellman-group14-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1, diffie-hellman-group1-sha1

 

preserve-key

Syntax 
[no] preserve-key
Context 
config>system>security>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

After enabling this command, private keys, public keys, and host key files will be saved by the server. It is restored following a system reboot or restart of the SSH server.

The no form of this command specifies that the keys will be held in memory by the SSH server and is not restored following a system reboot.

Default 

no preserve-key

server-cipher-list

Syntax 
server-cipher-list protocol-version version
Context 
config>system>security>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables the configuration of the list of allowed ciphers by the SSH server.

Parameters 
version—
Specifies the SSH version.
Values—
1 — Specifies that the SSH server only accepts connections from clients that support SSH protocol version 1 2 — Specifies that the SSH server accepts connections from clients supporting either SSH protocol version 2

 

server-kex-list

Syntax 
server-kex-list
Context 
config>system>security>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

Commands in this context configure SSH KEX algorithms for the 7210 SAS in the SSH server role.

By default, the SSH advertises a KEX list that contains the following algorithms:

  1. diffie-hellman-group16-sha512
  2. diffie-hellman-group14-sha256
  3. diffie-hellman-group14-sha1
  4. diffie-hellman-group-exchange-sha1
  5. diffie-hellman-group1-sha1

server-mac-list

Syntax 
server-mac-list
Context 
config>system>security>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command allows the user to configure SSH MAC algorithms for the 7210 SAS acting as an SSH server.

server-shutdown

Syntax 
[no] server-shutdown
Context 
config>system>security>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables the SSH servers running on the system. By default, only the SSH server is enabled at startup.

version

Syntax 
version ssh-version
no version
Context 
config>system>security>ssh
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the SSH protocol version that will be supported by the SSH server.

Default 

version 2

Parameters 
ssh-version—
Specifies the SSH version.
Values—
1 — Specifies that the SSH server will only accept connections from clients that support SSH protocol version 1
2 — Specifies that the SSH server will accept connections from clients supporting either SSH protocol version 2
1-2 — Specifies that the SSH server will accept connections from clients supporting either SSH protocol version 1, or SSH protocol version 2 or both.

 

telnet

Syntax 
telnet
Context 
config>system>login-control
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure the Telnet login control parameters.

enable-graceful-shutdown

Syntax 
[no] enable-graceful-shutdown
Context 
config>system>login-control>telnet
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables graceful shutdown of Telnet sessions.

The no form of this command disables graceful shutdown of telnet sessions.

2.9.2.1.3. Management Access Filter commands

management-access-filter

Syntax 
[no] management-access-filter
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context edit management access filters and to reset match criteria.

Management access filters control all traffic in and out. They can be used to restrict management of the router by other nodes outside either specific subnetworks or through designated ports.

Management filters, as opposed to other traffic filters, are enforced by system software.

The no form of this command removes management access filters from the configuration.

ip-filter

Syntax 
[no] ip-filter
Context 
config>system>security>mgmt-access-filter
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure management access IP filter parameters.

ipv6-filter

Syntax 
[no] ipv6-filter
Context 
config>system>security>mgmt-access-filter
Platforms 

Supported on all 7210 SAS platforms as described in this document, except 7210 SAS-K 2F1C2T

Description 

Commands in this context configure management access IPv6 filter parameters.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

default-action

Syntax 
default-action {permit | deny | deny-host-unreachable}
Context 
config>system>security>mgmt-access-filter>ip-filter
config>system>security>mgmt-access-filter>ipv6-filter
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter context is not supported on the 7210 SAS-K 2F1C2T.

This command enables the default action for management access in the absence of a specific management access filter match.

The default-action is applied to a packet that does not satisfy any match criteria in any of the management access filters. Whenever management access filters are configured, the default-action must be defined.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

Parameters 
permit—
Specifies that packets not matching the configured selection criteria in any of the filter entries will be permitted.
deny—
Specifies that packets not matching the selection criteria be denied and that an ICMP host unreachable message will not be issued.
deny-host-unreachable—
Specifies that packets not matching the selection criteria be denied and a host unreachable message will be issued.

entry

Syntax 
[no] entry entry-id
Context 
config>system>security>mgmt-access-filter>ip-filter
config>system>security>mgmt-access-filter>ipv6-filter
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter context is not supported on the 7210 SAS-K 2F1C2T.

This command creates or edits a management access filter entry. Multiple entries can be created with unique entry-id numbers. The 7210 SAS exits the filter upon the first match found and executes the actions according to the respective action command. For this reason, entries must be sequenced correctly from most to least explicit.

An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action defined to be considered complete. Entries without the action keyword are considered incomplete and inactive.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

The no form of this command removes the specified entry from the management access filter.

Parameters 
entry-id—
Specifies an entry ID that uniquely identifies a match criteria and the corresponding action. Nokia recommends that entries are numbered in staggered increments. This allows users to insert a new entry in an existing policy without having to renumber the existing entries.
Values—
1 to 9999

 

action

Syntax 
action {permit | deny | deny-host-unreachable}
no action
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

This command enables the context associated with the management access filter match criteria entry.

The action keyword is required. If no action is defined, the filter is ignored. If multiple action statements are configured, the last one overwrites previous configured actions.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

If the packet does not meet any of the match criteria, the configured default action is applied.

Parameters 
permit—
Specifies that packets matching the configured criteria will be permitted.
deny—
Specifies that packets matching the configured selection criteria will be denied and that a ICMP host unreachable message will not be issued.
deny-host-unreachable—
Specifies that packets matching the configured selection criteria will be denied and that a host unreachable message will not be issued.

dst-port

Syntax 
[no] dst-port port [mask]
Context 
config>system>security>mgmt-access-filter>ip-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

This command configures a source TCP or UDP port number or port range for a management access filter match criterion.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

The no form of this command removes the source port match criterion.

Parameters 
port—
Specifies the source TCP or UDP port number as match criteria.
Values—
1 to 65535 (decimal)

 

mask—
Specifies a range of source port numbers as the match criterion.

This 16-bit mask can be configured using the formats in the following table.

Table 15:  Mask formats 

Format style

Format syntax

Example

Decimal

DDDDD

63488

Hexadecimal

0xHHHH

0xF800

Binary

0bBBBBBBBBBBBBBBBB

0b1111100000000000

To select a range from 1024 up to 2047, specify 1024 0xFC00 for value and mask.

Default—
65535 (exact match)
Values—
1 to 65535 (decimal)

 

fragment

Syntax 
[no] fragment {true | false}
Context 
config>system>security>mgmt-access-filter>ip-filter>ip-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies fragmented or non-fragmented IP packets as an IP filter match criterion.

An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

The no form of this command removes the match criterion.

Default 

no fragment

Parameters 
true—
Specifies to match on all fragmented IP packets. A match occurs for all packets that have either the MF (more fragment) bit set or the Fragment Offset field of the IP header set to a non-zero value.
false—
Specifies to match on all non-fragmented IP packets. Non-fragmented IP packets are packets that have the MF bit set to zero and the Fragment Offset field also set to zero.

l4-src-port

Syntax 
[no] l4-src-port port [mask]
Context 
config>system>security>mgmt-access-filter>ip-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

This command configures a source TCP or UDP port number for an IP filter match criterion. An entry containing L4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet since only the first fragment contains the L4 information.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

The no form of this command removes the source port match criterion.

Default 

no l4-src-port

Parameters 
port—
Specifies the source port number to be used as a match criteria expressed as a decimal integer.
Values—
1 to 65535

 

mask—
Specifies the mask in dotted decimal notation.
Values—
1 to 65535, decimal hex or binary

 

flow-label

Syntax 
flow-label value
no flow-label
Context 
config>system>security>mgmt-access-filter>ipv6-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document, except 7210 SAS-K 2F1C2T

Description 

This command configures flow label match conditions. Flow labeling enables the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non default quality of service or real-time service.

Parameters 
value—
Specifies the flow identifier in an IPv6 packet header that can be used to discriminate traffic flows (refer to RFC 3595, Textual Conventions for IPv6 Flow Label for more information.)
Values—
0 to 1048575

 

log

Syntax 
[no] log
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

This command enables match logging. When enabled, matches on this entry cause the Security event mafEntryMatch to be raised.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

Default 

no log

next-header

Syntax 
next-header next-header
no next-header
Context 
config>system>security>mgmt-access-filter>ipv6-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document, except 7210 SAS-K 2F1C2T

Description 

This command specifies the next header to match. The protocol type, such as TCP, UDP, OSPF, and OSPF3, is identified by its respective protocol number. Well-known protocol numbers include ICMP(1), TCP(6), UDP(17).

Parameters 
next-header—
Specifies the IP protocol field for IPv6 MAF, and for IPv6 the next header type to be used in the match criteria for this MAF Entry.
Values—
next-header: 0 to 255, protocol numbers accepted in DHB
keywords: none, crtp, crudp, egp, eigrp, encap, ether-ip, gre, icmp, idrp, igmp, igp, ip, ipv6, ipv6-icmp, ipv6-no-nxt, isis, iso-ip, l2tp, ospf-igp, pim, pnni, ptp, rdp, rsvp, stp, tcp, udp, vrrp

 

protocol

Syntax 
[no] protocol protocol-id
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures an IP protocol type to be used as a management access filter match criterion.

The protocol type, such as TCP, UDP, and OSPF, and OSPF3, is identified by its respective protocol number. Well-known protocol numbers include ICMP (1), TCP (6), and UDP (17).

The no form of this command removes the protocol from the match criteria.

Parameters 
protocol—
Specifies the protocol number for the match criterion.
Values—
1 to 255 (decimal)

 

router

Syntax 
router {router-instance}
no router
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

The command configures a router name or service ID to be used as a management access filter match criterion.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

The no form of this command removes the router name or service ID from the match criteria.

Default 

router Base

Parameters 
router-instance—
Specifies the router name.
Values—
Base, management

 

renum

Syntax 
renum old-entry-number new-entry-number
Context 
config>system>security>mgmt-access-filter>ip-filter
config>system>security>mgmt-access-filter>ipv6-filter
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

This command renumbers existing management access filter entries to resequence filter entries.

The system exits on the first match found and executes the actions in accordance with the accompanying action command. This may require some entries to be re-numbered differently from most to least explicit.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

Parameters 
old-entry-number—
Specifies the entry number of the existing entry.
Values—
1 to 9999

 

new-entry-number—
Specifies the new entry number that will replace the old entry number.
Values—
1 to 9999

 

src-port

Syntax 
src-port {port-id | lag lag-id}
no src-port
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

This command restricts ingress management traffic to either the CPM Ethernet port or any other logical port (LAG or port) on the device.

When the source interface is configured, only management traffic arriving on those ports satisfies the match criteria.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

The no form of the command reverts to the default value.

Parameters 
port-id—
Specifies the port ID in the following format: slot[/mda]/port.

src-ip

Syntax 
[no] src-ip {ip-prefix/prefix-length | ip-prefix netmask}
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 
Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

This command configures a source IP address range to be used as a management access filter match criterion.

To match on the source IP address, specify the address and the associated mask (that is, 10.1.0.0/16). The conventional notation of 10.1.0.0 255.255.0.0 can also be used.

The 7210 SAS-K 2F1C2T does not support IPv6 access management filters.

The no form of the command removes the source IP address match criterion.

Parameters 
ip-prefix/prefix-length—
Specifies the IP prefix used for IP match criteria in dotted decimal notation. Can be IPv4 or an IPv6 prefix.

ipv4-prefix — a.b.c.d

ipv4-prefix-length — 0 to 32

ipv6-prefix — x:x:x:x:x:x:x:x (eight 16-bit pieces)

                      x:x:x:x:x:x:d.d.d.d

                      x: [0..FFFF]H

                      d: [0..255]D

ipv6-prefix-length — 0 to 128 (7210 SAS-D, 7210 SAS-K 2F1C2T,                                  7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C)

                                 0 to 64 (7210 SAS-Dxp)

netmask—
Specifies the subnet mask in dotted decimal notation.
Values—
a.b.c.d (network bits all 1 and host bits all 0)

 

2.9.2.1.4. Password commands

admin-password

Syntax 
admin-password password [hash | hash2]
no admin-password
Context 
config>system>security>password
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables the context (with admin permissions) to configure a password that enables a user to become an administrator.

This password is valid only for one session. When enabled, no authorization to TACACS+ or RADIUS is performed and the user is locally regarded as an admin user.

This functionality can be enabled in two contexts:

  1. config>system>security>password>admin-password
  2. <global> enable-admin
Note:

See the description for enable-admin. If the admin-password is configured in the config>system>security>password context, any user can enter the administrative mode by entering the enable-admin command.

The enable-admin command is in the default profile. By default, all users are given access to this command.

After the enable-admin command is entered, the user is prompted for a password. If the password matches, the user is given unrestricted access to all commands.

The minimum password length is determined by the minimum-length command. The complexity requirements for the password is determined by the configuration in the complexity-rules context.

The password argument of this command is not sent to the servers. This is consistent with other commands that configure secrets.

The usernames and passwords in the FTP and TFTP URLs will not be sent to the authorization or accounting servers when the file>copy source-file-url dest-file-url command is executed.

For example:

file copy ftp://test:secret@131.12.31.79/test/srcfile cf1:\destfile

In this example, the username 'test' and password 'secret' will not be sent to the AAA servers (or to any logs). They will be replaced with '****'.

Note:

The configure system security password hashing command affects the maximum number of characters that can be used to configure the password parameter.

The no form of this command removes the admin password from the configuration.

Default 

no admin-password

Parameters 
password —
Configures the password that enables a user to become a system administrator. The maximum length can be up to 56 characters if unhashed, 32 characters if the hash keyword is specified, and 54 characters if the hash2 keyword is specified, 60 characters if hashed with bcrypt, or 87 to 92 characters if hashed with sha2-pbkdf2.
hash—
Specifies the key is entered in an encrypted form. If the hash parameter is not used, the key is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in encrypted.
hash2—
Specifies the key is entered in a more complex encrypted form. If the hash2 parameter is not used, the less encrypted hash form is assumed.

enable-admin

Syntax 
enable-admin
Context 
<global>
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context enter the administrative mode.

Note:

See the description for admin-password. If admin-password is configured in the config>system>security>password context, any user can enter the administrative mode by entering the enable-admin command.

The enable-admin command is in the default profile. By default, all users are given access to this command.

After the enable-admin command is entered, the user is prompted for a password. If the password matches, the user is given unrestricted access to all the commands.

The minimum length of the password is determined by the minimum-length command. The complexity requirements for hte password is determined by the configuration in the complexity-rules context.

There are two ways to verify that a user is in the enable-admin mode:

  1. The administrator can use the show users command to know which users are in this mode.
  2. Enter the enable-admin command again at the root prompt and an error message will be returned.

The following output is an example of user information.

A:ALA-1# show users
===============================================================================
User Type From Login time Idle time
===============================================================================
admin Console -- 10AUG2006 13:55:24 0d 19:42:22
admin Telnet 10.20.30.93 09AUG2006 08:35:23 0d 00:00:00 A
-------------------------------------------------------------------------------
Number of users : 2
'A' indicates user is in admin mode
===============================================================================
A:ALA-1#
A:ALA-1# enable-admin
MINOR: CLI Already in admin mode.
A:ALA-1#

aging

Syntax 
aging days
no aging
Context 
config>system>security>password
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the number of days a user password is valid before the user must change their password. This parameter can be used to force the user to change the password at the configured interval.

The no form of this command reverts to the default value.

Parameters 
days—
Specifies the maximum number of days the password is valid.
Values—
1 to 500

 

attempts

Syntax 
attempts count [time minutes1 [lockout minutes2]
no attempts
Context 
config>system>security>password
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures a threshold value of unsuccessful login attempts allowed in a specified time frame.

The threshold for the number of login attempts can be configured by using the CLI parameter count in the command. An SNMP trap is generated by the device when the number of login attempts exceeds the configured threshold. Generation of the trap can be suppressed using the config>log>event-control command. By default, the device generates a trap when the login attempts exceed the configured threshold. The trap carries information about the user ID used for the login attempt. An SNMP trap is not sent for every failed attempt. If the threshold is exceeded, the user is locked out for a specified time period.

If multiple attempts commands are entered, each command overwrites the previously entered command.

The no form of this command resets all values to default.

Default 

attempts 3 time 5 lockout 10

Parameters 
count—
Specifies the number of unsuccessful login attempts allowed for the specified time. This is a mandatory value that must be explicitly entered.
Values—
1 to 64

 

time minutes
Specifies the period of time, in minutes, that a specified number of unsuccessful attempts can be made before the user is locked out.
Values—
0 to 60

 

lockout minutes
Specifies the lockout period, in minutes, when the user is not allowed to login. Allowed values are decimal integers. When the user exceeds the attempted count times in the specified time, that user is locked out from any further login attempts for the configured time period.
Values—
0 to 1440

 

Default—
10

authentication-order

Syntax 
authentication-order [method-1] [method-2] [method-3] [exit-on-reject]
no authentication-order
Context 
config>system>security>password
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the sequence in which password authentication, authorization, and accounting is attempted among RADIUS, TACACS+, and local passwords.

The order should be from the most preferred authentication method to the least preferred. The presence of all methods in the command line does not guarantee that they are all operational. Specifying options that are not available delays user authentication.

If all (operational) methods are attempted and no authentication for a particular login has been granted, an entry in the security log registers the failed attempt. Both the attempted login identification and originating IP address are logged with a timestamp.

The preferred order for password authentication is:

  1. RADIUS
  2. TACACS+
  3. local passwords

The no form of this command reverts to the default authentication sequence.

Default 

authentication-order radius tacplus local

Parameters 
method-1—
Specifies the first password authentication method to attempt.
Default—
radius
Values—
radius, tacplus, local

 

method-2—
Specifies the second password authentication method to attempt.
Default—
tacplus
Values—
radius, tacplus, local

 

method-3—
Specifies the third password authentication method to attempt.
Default—
local
Values—
radius, tacplus, local

 

radius—
Specifies RADIUS authentication.
tacplus—
Specifies TACACS+ authentication.
local—
Specifies password authentication based on the local password database.
exit-on-reject—
When enabled and if one of the AAA methods configured in the authentication order sends a reject, the next method in the order will not be tried. If the exit-on-reject keyword is not specified and if one AAA method sends a reject, the next AAA method will be attempted. If in this process, all the AAA methods are exhausted, it will be considered as a reject.

A rejection is distinct from an unreachable authentication server. When the exit-on-reject keyword is specified, authorization and accounting will only use the method that provided an affirmation authentication; only if that method is no longer readable or is removed from the configuration will other configured methods be attempted. If the local keyword is the first authentication and:

  1. exit-on-reject is configured and the user does not exist, the user will not be authenticated.
  2. The user is authenticated locally, then other methods, if configured, will be used for authorization and accounting.
  3. The user is configured locally but without console access, login will be denied.

complexity-rules

Syntax 
complexity-rules
Context 
config>system>security>password
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command defines a list of rules for configurable password options.

allow-user-name

Syntax 
[no] allow-user-name
Context 
config>system>security>password>complexity-rules
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables the username to be used as part of the password.

The no form of this command does not allow the username to be used as part of the password.

credits

Syntax 
credits [lowercase credits] [uppercase credits] [numeric credits] [special-character credits]
no credits
Context 
config>system>security>password>complexity-rules
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the maximum credits given for usage of the different character classes in the local passwords.

The no form of this command reverts to the default value.

Default 

no credits

Parameters 
credits—
Specifies the number of credits that can be used for each character class.
Values—
0 to 10

 

minimum-classes

Syntax 
minimum-classes minimum
no minimum-classes
Context 
config>system>security>password>complexity-rules
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command forces the use of at least as many different character classes as specified.

The no form of this command resets to default.

Default 

no minimum-classes

Parameters 
minimum—
Specifies the minimum number of classes to be configured.
Values—
2 to 4

 

minimum-length

Syntax 
minimum-length length
no minimum-length
Context 
config>system>security>password>complexity-rule
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the minimum number of characters required for locally administered passwords and keys used with SNMPv3 user authentication and encryption. See the configure system security user snmp authentication command for more information about the use of keys with SNMPv3-based authentication and encryption algorithms.

If multiple minimum-length commands are entered, each new command overwrites the previously configured password length.

The no form of this command reverts to the default value.

Default 

minimum-length 6

Parameters 
value—
Specifies the minimum number of characters required for a locally administered password.
Values—
6 to 50

 

repeated-characters

Syntax 
repeated-characters count
no repeated-characters
Context 
config>system>security>password>complexity-rules
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the number of times a characters can be repeated consecutively.

The no form of this command resets to default.

Default 

no repeated-characters

Parameters 
count—
Specifies the minimum count of consecutively repeated characters.
Values—
2 to 8

 

required

Syntax 
required [lowercase count] [uppercase count] [numeric count] [special-character count]
no required
Context 
config>system>security>password>complexity-rules
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the minimum number of different character classes required.

The no form of this command reverts to the default value.

Default 

no required

Parameters 
count—
Specifies the minimum count of characters classes.
Values—
0 to 10

 

hashing

Syntax 
hashing {bcrypt | sha2-pbkdf2}
Context 
config>system>security>password
Platforms 

Supported on all 7210 SAS platforms as described in this document, except 7210 SAS-D

Description 

This command configures the password hashing algorithm.

Parameters 
bcrypt—
Keyword to configure the bcrypt algorithm.
sha2-pbkdf2—
Keyword to configure the PBKDF2 algorithm.

health-check

Syntax 
[no] health-check [interval interval]
Context 
config>system>security>password
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies that RADIUS and TACACS+ servers are monitored for 3 seconds each at 30 second intervals. Servers that are not configured will have 3 seconds of idle time. If in this process a server is found to be unreachable, or a previously unreachable server starts responding, based on the type of the server, a trap will be sent.

The no form of the command disables the periodic monitoring of the RADIUS and TACACS+ servers. In this case, the operational status for the active server will be up if the last access was successful.

Default 

health-check

Parameters 
interval—
Specifies the interval of the health check in seconds.
Values—
6 to 1500

 

password

Syntax 
password
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure password management parameters.

public-keys

Syntax 
public-keys
Context 
config>system>security>user
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

Commands in this context configure public keys for SSH.

ecdsa

Syntax 
ecdsa
Context 
config>system>security>user>public-keys
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

Commands in this context configure ECDSA public keys.

ecdsa-key

Syntax 
ecdsa-key ecdsa-public-key-id [create]
no ecdsa-key ecdsa-public-key-id
Context 
config>system>security>user>public-keys>ecdsa
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

This command creates an ECDSA public key and associates it with the username. Multiple public keys can be associated with the user. The key ID is used to identify these keys for the user.

The no form of this command removes the configured ECDSA public keys.

Default 

no ecdsa-key

Parameters 
create—
Keyword to create an ECDSA key. The create keyword requirement can be enabled or disabled in the environment>create context.
key-id
Specifies the key identifier.
Values—
1 to 32

 

key-value

Syntax 
key-value public-key-value
no key-value
Context 
config>system>security>user>public-keys>ecdsa>ecdsa-key
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

This command configures a value for the ECDSA public key. The public key must be enclosed in quotation marks. The key is between 1 and 1024 bits.

The no form of this command removes the configured ECDSA public key value.

Default 

no key-value

Parameters 
ecdsa-public-key-value
Specifies the public key value, up to 255 characters.

rsa

Syntax 
rsa
Context 
config>system>security>user>public-keys
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

Commands in this context configure RSA public keys.

rsa-key

Syntax 
rsa-key rsa-public-key-id [create]
no rsa-key rsa-public-key-id
Context 
config>system>security>user>public-keys>rsa
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

This command creates an RSA public key and associates it with the username. Multiple public keys can be associated with the user. The key ID is used to identify these keys for the user.

The no form of this command removes the configured RSA public keys.

Default 

no rsa-key

Parameters 
create—
Keyword to create the RSA key. The create keyword requirement can be enabled or disabled in the environment>create context.
key-id
Specifies the key identifier.
Values—
1 to 32

 

key-value

Syntax 
key-value rsa-public-key-value
no key-value
Context 
config>system>security>user>public-keys>rsa>rsa-key
Platforms 

Supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-D

Description 

This command configures a value for the RSA public key. The public key must be enclosed in quotation marks. The key is between 768 and 4096 bits.

The no form of this command removes the configured public key value.

Default 

no key-value

Parameters 
public-key-value
Specifies the public key value, up to 800 characters.

2.9.2.1.5. Profile management commands

action

Syntax 
action {deny | permit}
Context 
config>system>security>profile user-profile-name>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the action associated with the profile entry.

Parameters 
deny—
Specifies that commands matching the entry command match criteria are to be denied.
permit—
Specifies that commands matching the entry command match criteria will be permitted.

match

Syntax 
match command-string
no match
Context 
config>system>security>profile user-profile-name>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures a command or command subtree.

Because the 7210 SAS exits when the first match is found, subordinate levels cannot be modified with subsequent action commands. More specific action commands should be entered with a lower entry number or in a profile that is evaluated prior to this profile.

All commands below the hierarchy level of the matched command are denied.

The no form of this command removes a match condition.

Parameters 
command-string—
Specifies the CLI command or CLI tree level that is the scope of the profile entry.

copy

Syntax 
copy {user source-user | profile source-profile} to destination [overwrite]
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command copies a profile or user from a source profile to a destination profile.

Parameters 
source-profile—
Specifies the profile to copy, up to 32 characters. The profile must exist.
dest-profile—
Specifies the destination profile, up to 32 characters.
overwrite—
Specifies that the destination profile configuration will be overwritten with the copied source profile configuration. A profile will not be overwritten if the overwrite keyword is not specified.

default-action

Syntax 
default-action {deny-all | permit-all | none}
Context 
config>system>security>profile
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the default action to be applied when no match conditions are met.

Parameters 
deny-all—
Sets the default of the profile to deny access to all commands.
permit-all—
Sets the default of the profile to permit access to all commands.

This keyword does not change access to security commands. Security commands are only and always available to members of the super-user profile.

none—
Sets the default of the profile to no-action. This option is useful to assign multiple profiles to a user.

For example, if a user is a member of two profiles and the default action of the first profile is permit-all, the second profile will never be evaluated because the permit-all is executed first. Set the first profile default action to none and if no match conditions are met in the first profile, the second profile will be evaluated. If the default action of the last profile is none and no explicit match is found, the default deny-all takes effect.

description

Syntax 
description description-string
no description
Context 
config>system>security>profile user-profile-name>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures a text description stored in the configuration file for a configuration context.

The description command associates a text string with a configuration context to help identify the context in the configuration file.

The no form of this command removes the string from the context.

Parameters 
string—
Specifies the description character string. Allowed values are any string up to 80 characters composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

entry

Syntax 
[no] entry entry-id
Context 
config>system>security>profile
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command creates a user profile entry.

More than one entry can be created with unique entry-id numbers. The 7210 SAS exits when the first match is found and executes the actions according to the accompanying action command. Entries should be sequenced from most explicit to least explicit.

An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete.

The no form of this command removes the specified entry from the user profile.

Parameters 
entry-id—
Specifies a unique user profile command match criteria and a corresponding action. If more than one entry is configured, the entry-ids should be numbered in staggered increments to allow users to insert a new entry without requiring renumbering of the existing entries.
Values—
1 to 9999

 

profile

Syntax 
[no] profile user-profile-name
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command creates user profiles for CLI command tree permissions.

Profiles are used to either deny or permit user console access to a hierarchical branch or to specific commands.

After the profiles are created, the users command assigns users to one or more profiles. You can define up to 16 user profiles, but a maximum of 8 profiles can be assigned to a user. The user-profile-name can consist of up to 32 alphanumeric characters.

The no form of this command deletes a user profile.

Default 

user-profile default

Parameters 
user-profile-name—
Specifies the user profile name entered as a character string. The string is case sensitive and limited to 32 ASCII 7-bit printable characters with no spaces.

renum

Syntax 
renum old-entry-number new-entry-number
Context 
config>system>security>profile user-profile-name
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command renumbers profile entries to re-sequence the entries.

Because the 7210 SAS exits when the first match is found and executes the actions according to accompanying action command, re-numbering is useful to rearrange the entries from most explicit to least explicit.

Parameters 
old-entry-number—
Specifies the entry number of an existing entry.
Values—
1 to 9999

 

new-entry-number—
Specifies the new entry number.
Values—
1 to 9999

 

2.9.2.1.6. User management commands

access

Syntax 
[no] access [ftp] [snmp] [console]
Context 
config>system>security>user
config>system>security>user-template
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command grants a user permission for FTP, SNMP, console, or lawful intercept (LI) access.

If a user requires access to more than one application, multiple applications can be specified in a single command. Multiple commands are treated additively.

The no form of this command removes access for a specific application.

The no access command denies permission for all management access methods. To deny a single access method, enter the no form of the command followed by the method to be denied, for example, no access FTP denies FTP access.

Parameters 
ftp—
Specifies FTP permission.
snmp—
Specifies SNMP permission. This keyword is only configurable in the config>system>security>user context.
console—
Specifies console access (serial port or Telnet) permission.

authentication

Syntax 
authentication none
authentication {md5 key-1 | sha key-1} [privacy none] [hash]
authentication {md5 key-1 | sha key-1} privacy privacy-level key-2 [hash]
no authentication
Context 
config>system>security>user>snmp
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the authentication and encryption method for the user to be validated by the device. SNMP authentication allows the device to validate the managing node that issued the SNMP message and detect message tampering.

The user password is encrypted first by the MD5/SHA/DES algorithm. The output of the algorithm is always a fixed length string (key). Copy the password key and paste the output in the appropriate authentication command key parameter.

The no form of this command reverts to the default value.

Default 

authentication none

Parameters 
none—
Keyword to specify that authentication should not be used. If none is specified, privacy cannot be configured.
hash—
Keyword to store all specified keys in an encrypted format in the configuration file. The password must be entered in encrypted form when this keyword is used. When hash is not specified, non-encrypted characters can be entered.
md5 key
Specifies the authentication protocol, which can be either HMAC-MD5-96 or HMAC-SHA-96.

The MD5 authentication key is stored in an encrypted format. The minimum key length is determined by the config system security password complexity-rules minimum-length value. The maximum length is 16 octets (32 printable characters).

The complexity of the key is determined by the configuration in the complexity-rules context.

sha key
The authentication protocol, which can be either HMAC-MD5-96 or HMAC-SHA-96.

The sha authentication key is stored in an encrypted format. The minimum key length is determined by the config system security password complexity-rules minimum-length value. The maximum length is 20 octets (40 printable characters).

The complexity of the key is determined by the configuration in the complexity-rules context.

privacy none—
Keyword to specify that SNMP packet encryption should not be performed.
privacy-level—
Specifies the privacy level.
Values—
des-key, aes-128-cfb-key

 

key
Specifies the des-key or aes-128-cfb-key for SNMP packet encryption. This key is stored in an encrypted format. The minimum key length is determined by the config system security password complexity-rules minimum-length value. The maximum length is 16 octets (32 printable characters). If privacy is configured, authentication must be enabled.

To remove a previously configured des-key or aes-128-cfb-key, enter privacy none.

The complexity requirements for the password is determined by the configuration in the complexity-rules context.

group

Syntax 
group group-name
no group
Context 
config>system>security>user>snmp
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command associates (or links) a user to a group name. The group name must be configured with the config>system>security>user>snmp>group command. The access command links the group with one or more views, security models, security levels, and read, write, and notify permissions.

Parameters 
group-name—
Specifies the group name, up to 32 characters, that is associated with this user. A user can be associated with one group name per security model.

cannot-change-password

Syntax 
[no] cannot-change-password
Context 
config>system>security>user>console
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command disables the user’s privilege to change their password for both FTP and console login.

The cannot-change-password flag is not replicated when a user copy is performed. A new-password-at-login flag is created instead.

The no form of this command enables the user privilege to change their password.

Default 

no cannot-change-password

console

Syntax 
console
Context 
config>system>security>user
config>system>security>user-template
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure user profile membership for the console (either Telnet or serial port user).

copy

Syntax 
copy {user source-user | profile source-profile} to destination [overwrite]
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command copies specific user configuration parameters to another (destination) user.

The password is set to a carriage return and a new password at login must be selected.

Parameters 
source-user—
Specifies the user to copy, up to 32 characters. The user must already exist.
dest-user—
Specifies the destination user to which the profile is copied, up to 32 characters.
overwrite—
Specifies that the destination user configuration will be overwritten with the copied source user configuration. A configuration will not be overwritten if the overwrite command is not specified.

home-directory

Syntax 
home-directory url-prefix [directory] [directory/directory…]
no home-directory
Context 
config>system>security>user
config>system>security>user-template
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the local home directory for the user for both console and FTP access.

If the URL or the specified URL/directory structure is not present, a warning message is issued and the default is assumed.

Note:

If restrict-to-home has been configured, no file access is granted and no home-directory is created. If restrict-to-home is not applied, the root becomes the user’s home-directory.

The no form of this command removes the configured home directory.

Default 

no home-directory

Parameters 
local-url-prefix [directory] [directory/directory…]—
Specifies the user’s local home directory URL prefix and directory structure, up to 190 characters in length.

profile

Syntax 
profile user-profile-name
no profile
Context 
config>system>security>user-template
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the profile for the user based on the specified template.

Parameters 
user-profile-name—
Specifies the user profile name entered as a character string. The string is case sensitive and limited to 32 ASCII 7-bit printable characters with no spaces.

login-exec

Syntax 
[no] login-exec url-prefix: source-url
Context 
config>system>security>user>console
config>system>security>user-template>console
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures a user’s login exec file, which executes whenever the user successfully logs in to a console session.

Only one exec file can be configured. If multiple login-exec commands are entered for the same user, each subsequent entry overwrites the previous entry.

The no form of this command disables the login exec file for the user.

Parameters 
url-prefix: source-url—
Specifies either a local or remote URL, up to 200 characters, that identifies the exec file that will be executed after the user successfully logs in.

member

Syntax 
member user-profile-name [user-profile-name…up to 8max]
no member user-profile-name
Context 
config>system>security>user>console
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command allows the user access to a profile.

A user can participate in up to eight profiles.

The no form of this command deletes user access to a profile.

Parameters 
user-profile-name—
Specifies the user profile name, up to 32 characters.

new-password-at-login

Syntax 
[no] new-password-at-login
Context 
config>system>security>user>console
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command forces the user to change a password at the next console login. The new password applies to FTP but the change can be enforced only by the console, SSH, or Telnet login.

The no form of this command does not force the user to change passwords.

Default 

no new-password-at-login

password

Syntax 
password [password] [hash | hash2]
Context 
config>system>security>user
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the user password for console and FTP access.

The use of the hash keyword sets the initial password when the user is created or modifies the password of an existing user and specifies that the specific password was hashed using hashing algorithm version 1.

The password is stored in an encrypted format in the configuration file when specified. Passwords should be encased in double quotes (" ") at the time of the password creation. The double quote character (") is not accepted inside a password. It is interpreted as the start or stop delimiter of a string.

The use of the hash2 keyword specifies that the specific password is already hashed using hashing algorithm version 2. A semantic check is performed on the specific password field to verify if it is a valid hash 2 key to store in the database.

The following output is an example of user syntax.

config>system>security# user testuser1
config>system>security>user$ password "zx/Uhcn6ReMOZ3BVrWcvk." hash2
config>system>security>user# exit
 
config>system>security# info
-------------------------------------
...
            user "testuser1"
                password "zx/Uhcn6ReMOZ3BVrWcvk." hash2
            exit
...
-------------------------------------
config>system>security# 
Parameters 
password—
Specifies the password that the user must be entered during the login procedure. The minimum length of the password is determined by the minimum-length command. The maximum length can be up to 20 characters if unhashed and 32 characters if hashed.

All password special characters (#, $, spaces, and so on) must be enclosed within double quotes.

For example: config>system>security>user# password “south#bay?”

The question mark character (?) cannot be directly inserted as input during a Telnet connection because the character is bound to the help command during a normal Telnet/console connection.

To insert a # or ? character, they must be entered inside a notepad or clipboard program and cut and pasted into the Telnet session in the password field that is encased in the double quotes as delimiters for the password.

If a password is entered without any parameters, a password length of zero is implied: (carriage return).

hash—
Specifies that the specific password is already hashed using hashing algorithm version 1. A semantic check is performed on the specific password field to verify if it is a valid hash 1 key to store in the database.
hash2 —
Specifies that the specific password is already hashed using hashing algorithm version 2. A semantic check is performed on the specific password field to verify if it is a valid hash 2 key to store in the database.

restricted-to-home

Syntax 
[no] restricted-to-home
Context 
config>system>security>user
config>system>security>user-template
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command prevents users from navigating above their home directories for file access. A user is not allowed to navigate to a directory higher in the directory tree on the home directory device. The user is allowed to create and access subdirectories below their home directory.

If a home-directory is not configured or the home directory is not available, the user has no file access.

The no form of this command allows the user access to navigate to directories above their home directory.

Default 

no restricted-to-home

snmp

Syntax 
snmp
Context 
config>system>security>user
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure SNMP group membership for a specific user and defines encryption and authentication parameters.

All SNMPv3 users must be configured with the commands available in this CLI node.

The 7210 SAS always uses the configured SNMPv3 username as the security username.

user-template

Syntax 
user-template {tacplus_default | radius_default}
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures default security user template parameters.

Parameters 
tacplus_default—
Specifies that the default TACACS+ user template is actively applied to the TACACS+ user.
radius_default—
Specifies that the default RADIUS user template is actively applied to the RADIUS user if no VSAs are returned with the auth-accept from the RADIUS server.

users

Syntax 
users
Context 
show
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command creates a local user and a context to edit the user configuration.

When creating a new user and entering the info command, the system displays a password in the output. This is expected behavior in the hash2 scenario. However, when using that username, there will be no password required. The user can log in to the system and <ENTER> at the password prompt. The user will be logged in.

Unless an administrator explicitly changes the password, it will be null. The hashed value displayed uses the username and null password field, so when the username is changed, the displayed hashed value will change.

user

Syntax 
user user-name
Context 
admin
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables a local user and a context to edit the user configuration.

If a new user-name is entered, the user is created. When an existing user-name is specified, the user parameters can be edited.

When creating a new user and entering the info command, the system displays a password in the output. This is expected behavior in the hash2 scenario. However, when using that username, there will be no password required. The user can log in to the system and <ENTER> at the password prompt; the user will be logged in.

Unless an administrator explicitly changes the password, it will be null. The hashed value displayed uses the username and null password field, so when the username is changed, the displayed hashed value will change.

The no form of this command deletes the user and all configuration data. Users cannot delete themselves.

Parameters 
user-name—
Specifies the name of the user, up to 16 characters.

2.9.2.1.7. RADIUS client commands

accounting

Syntax 
[no] accounting
Context 
config>system>security>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables RADIUS accounting.

The no form of this command disables RADIUS accounting.

Default 

no accounting

accounting-port

Syntax 
accounting-port port
no accounting-port
Context 
config>system>security>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies a UDP port number on which to contact the RADIUS server for accounting requests.

Parameters 
port—
Specifies the UDP port number.
Values—
1 to 65535

 

Default—
1813

authorization

Syntax 
[no] authorization
Context 
config>system>security>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures RADIUS authorization parameters for the system.

Default 

no authorization

port

Syntax 
port port
no port
Context 
config>system>security>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the TCP port number to contact the RADIUS server.

The no form of this command reverts to the default value.

Default 

port 1812 (as specified in RFC 2865, Remote Authentication Dial In User Service (RADIUS))

Parameters 
port—
Specifies the TCP port number to contact the RADIUS server.
Values—
1 to 65535

 

radius

Syntax 
[no] radius
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure RADIUS authentication on the 7210 SAS router.

Implement redundancy by configuring multiple server addresses for each 7210 SAS series router.

The no form of this command removes the RADIUS configuration.

retry

Syntax 
retry count
no retry
Context 
config>system>security>radius
config>system>security>dot1x>radius-plcy
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the number of times the router attempts to contact the RADIUS server for authentication if there are problems communicating with the server.

The no form of this command reverts to the default value.

Default 

retry 3

Parameters 
count—
Specifies the retry count.
Values—
1 to 10

 

server

Syntax 
server index address ip-address secret key [hash|hash2] [auth-port auth-port] [acct-port acct-port] [type server-type]
no server index
Context 
config>system>security>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command adds a RADIUS server and configures the RADIUS server IP address, index, and key values.

Up to five RADIUS servers can be configured at one time. RADIUS servers are accessed in order from lowest to highest index for authentication requests until a response from a server is received. A higher indexed server is only queried if no response is received from a lower indexed server (which implies that the server is not available). If a response from a server is received, no other RADIUS servers are queried. It is assumed that there are multiple identical servers configured as backups and that the servers do not have redundant data.

The 7210 SAS-K 2F1C2T does not support IPv6 addresses for RADIUS servers.

The no form of the command removes the server from the configuration.

Parameters 
index—
Specifies the index for the RADIUS server. The index determines the sequence in which the servers are queried for authentication requests. Servers are queried in order from lowest to highest index.
Values—
1 to 5

 

address ip-address
Specifies the IP address of the RADIUS server. Two RADIUS servers cannot have the same IP address. An error message is generated if the server address is a duplicate.
Values—
ipv4-address — a.b.c.d (host bits must be 0)
ipv6-address — x:x:x:x:x:x:x:x (eight 16-bit pieces)
                          x:x:x:x:x:x:d.d.d.d
                          x — [0..FFFF]H
                          d — [0..255]D

 

secret key
Specifies the secret key, up to 20 characters, to access the RADIUS server. This secret key must match the password on the RADIUS server.
hash—
Specifies the key is entered in an encrypted form. If the hash parameter is not used, the key is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash parameter specified.
hash2—
Specifies the key is entered in a more complex encrypted form. If the hash2 parameter is not used, the less encrypted hash form is assumed.

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command administratively disables the RADIUS protocol operation. Shutting down the protocol does not remove or change the configuration other than the administrative state.

The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

The no form of this command administratively enables the protocol.

Default 

no shutdown

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the number of seconds the router waits for a response from a RADIUS server.

The no form of this command reverts to the default value.

Default 

timeout 3

Parameters 
seconds—
Specifies the number of seconds the router waits for a response from a RADIUS server, expressed as a decimal integer.
Values—
1 to 90

 

use-default-template

Syntax 
[no] use-default-template
Context 
config>system>security>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies whether the RADIUS user template is actively applied to the RADIUS user if no VSAs are returned with the auth-accept from the RADIUS server. When enabled, the RADIUS user template is actively applied if no VSAs are returned with the auth-accept from the RADIUS server.

The no form of this command disables the command.

2.9.2.1.8. TACACS+ client commands

tacplus

Syntax 
[no] tacplus
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure TACACS+ authentication on the router.

Configure multiple server addresses for each router for redundancy.

The no form of this command removes the TACACS+ configuration.

accounting

Syntax 
accounting [record-type {start-stop | stop-only}]
no accounting
Context 
config>system>security>tacplus
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the type of accounting record packet that is to be sent to the TACACS+ server. The record-type parameter indicates whether TACACS+ accounting start and stop packets be sent or just stop packets be sent.

Default 

record-type stop-only

Parameters 
record-type start-stop—
Specifies that a TACACS+ start packet is sent whenever the user executes a command.
record-type stop-only—
Specifies that a stop packet is sent whenever the command execution is complete.

authorization

Syntax 
[no] authorization
Context 
config>system>security>tacplus
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures TACACS+ authorization parameters for the system.

Default 

no authorization

server

Syntax 
server index address ip-address secret key [hash | hash2]
no server index
Context 
config>system>security>tacplus
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command adds a TACACS+ server and configures the TACACS+ server IP address, index, and key values.

Up to five TACACS+ servers can be configured at any one time. TACACS+ servers are accessed in order from lowest index to the highest index for authentication requests.

The 7210 SAS-K 2F1C2T does not support IPv6 addresses for TACACS+ servers.

The no form of the command removes the server from the configuration.

Parameters 
index—
Specifies the index for the TACACS+ server. The index determines the sequence in which the servers are queried for authentication requests. Servers are queried in order from the lowest index to the highest index.
Values—
1 to 5

 

address ip-address
Specifies the IP address of the TACACS+ server. Two TACACS+ servers cannot have the same IP address. An error message is generated if the server address is a duplicate.
Values—
ipv4-address — a.b.c.d (host bits must be 0)
ipv6-address — x:x:x:x:x:x:x:x (eight 16-bit pieces)
                          x:x:x:x:x:x:d.d.d.d
                          x — [0..FFFF]H
                          d — [0..255]D

 

secret key
Specifies the secret key, up to 128 characters, to access the RADIUS server. This secret key must match the password on the RADIUS server.
hash—
Specifies the key is entered in an encrypted form. If the hash parameter is not used, the key is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash parameter specified.
hash2—
Specifies the key is entered in a more complex encrypted form. If the hash2 parameter is not used, the less encrypted hash form is assumed.

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>tacplus
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command administratively disables the TACACS+ protocol operation. Shutting down the protocol does not remove or change the configuration other than the administrative state.

The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

The no form of this command administratively enables the protocol.

Default 

no shutdown

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security>tacplus
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the number of seconds the router waits for a response from a TACACS+ server.

The no form of the command reverts to the default value.

Default 

timeout 3

Parameters 
seconds—
Specifies the number of seconds the router waits for a response from a TACACS+ server, expressed as a decimal integer.
Values—
1 to 90

 

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>tacplus
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command administratively disables the TACACS+ protocol operation. Shutting down the protocol does not remove or change the configuration other than the administrative state.

The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

The no form of this command administratively enables the protocol which is the default state.

Default 

no shutdown

use-default-template

Syntax 
[no] use-default-template
Context 
config>system>security>tacplus
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies whether or not the user template defined by this entry is to be actively applied to the TACACS+ user.

2.9.2.1.9. Generic 802.1x commands

dot1x

Syntax 
[no] dot1x
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure 802.1x network access control on the 7210 SAS router.

The no form of this command removes the 802.1x configuration.

radius-plcy

Syntax 
[no] radius-plcy name [create]
Context 
config>system>security>dot1x
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures RADIUS server parameters for 802.1x network access control on the 7210 SAS router.

Note:

The RADIUS server configured under the config>system>security>dot1x>radius-plcy context authenticates clients who get access to the data plane of the 7210 SAS as opposed to the RADIUS server configured under the config>system>radius context which authenticates CLI login users who get access to the management plane of the 7210 SAS.

The no form of this command removes the RADIUS server configuration for 802.1x.

Parameters 
name—
Specifies the name of the RADIUS policy, up to 32 characters.
create—
This keyword is mandatory to create a RADIUS policy.

retry

Syntax 
retry count
no retry
Context 
config>system>security>dot1x
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the number of times the router attempts to contact the RADIUS server for authentication if there are problems communicating with the server.

The no form of this command reverts to the default value.

Default 

retry 3

Parameters 
count—
Specifies the retry count.
Values—
1 to 10

 

server

Syntax 
server server-index address ip-address secret key [hash | hash2] [auth-port auth-port] [acct-port acct-port] [type server-type]
no server index
Context 
config>system>security> dot1x>radius-plcy
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command adds a dot1x server and configures the dot1x server IP address, index, and key values.

Up to five dot1x servers can be configured at any one time. Dot1x servers are accessed in order from lowest to highest index for authentication requests until a response from a server is received. A higher indexed server is only queried if no response is received from a lower indexed server (which implies that the server is not available). If a response from a server is received, no other dot1x servers are queried. It is assumed that there are multiple identical servers configured as backups and that the servers do not have redundant data.

The 7210 SAS-K 2F1C2T does not support IPv6 addresses for dot1x servers.

The no form of the command removes the server from the configuration.

Parameters 
server-index—
Specifies the index for the dot1x server. The index determines the sequence in which the servers are queried for authentication requests. Servers are queried in order from lowest to highest index.
Values—
1 to 5

 

address ip-address
Specifies the IP address of the dot1x server. Two dot1x servers cannot have the same IP address. An error message is generated if the server address is a duplicate.
secret key
Specifies the secret key, up to 128 characters, to access the dot1x server. This secret key must match the password on the dot1x server.
hash—
Specifies the key is entered in an encrypted form. If the hash parameter is not used, the key is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash parameter specified.
hash2—
Specifies the key is entered in a more complex encrypted form. If the hash2 parameter is not used, the less encrypted hash form is assumed.
acct-port acct-port
Specifies the UDP port number on which to contact the RADIUS server for accounting requests.
auth-port auth-port
Specifies a UDP port number to be used as a match criteria.
Values—
1 to 65535

 

type server-type
Specifies the server type.
Values—
authorization, accounting, combined

 

source-address

Syntax 
source-address ip-address
no source-address
Context 
config>system>security> dot1x>radius-plcy
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the NAS IP address to be sent in the RADIUS packet.

By default the System IP address is used in the NAS field.

The no form of the command reverts to the default value.

Parameters 
ip-address—
Specifies the IP prefix for the IP match criterion in dotted decimal notation.
Values—
a.b.c.d

 

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>dot1x
config>system>security>dot1x>radius-plcy
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command administratively disables the 802.1x protocol operation. Shutting down the protocol does not remove or change the configuration other than the administrative state.

The operational state of the entity is disabled as well as the operational state of any entities contained within.

The no form of the command administratively enables the protocol which is the default state.

Default 

shutdown

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security>dot1x>radius-plcy
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the number of seconds the router waits for a response from a RADIUS server.

The no form of the command reverts to the default value.

Default 

timeout 3

Parameters 
seconds—
Specifies the number of seconds the router waits for a response from a RADIUS server, expressed as a decimal integer.
Values—
1 to 90

 

2.9.2.1.10. TCP Enhanced Authentication commands

keychain

Syntax 
[no] keychain keychain-name
Context 
config>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure keychain parameters. A keychain must be configured on the system before it can be applied to a session.

The no form of this command removes the keychain nodal context and everything under it from the configuration. If the keychain to be removed is in use when the no keychain command is entered, the command will not be accepted and an error indicating that the keychain is in use will be printed.

Parameters 
keychain-name—
Specifies a keychain name, up to 32 characters, that identifies this particular keychain entry.

direction

Syntax 
direction
Context 
config>system>security>keychain
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the data type that indicates the TCP stream direction to apply the keychain.

bi

Syntax 
bi
Context 
config>system>security>keychain>direction
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures keys for both send and receive stream directions.

uni

Syntax 
uni
Context 
config>system>security>keychain>direction
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures keys for send or receive stream directions.

receive

Syntax 
receive
Context 
config>system>security>keychain>direction>uni
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables the receive nodal context. Entries defined under this context are used to authenticate TCP segments that are being received by the router.

send

Syntax 
send
Context 
config>system>security>keychain>direction>uni
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the send nodal context to sign TCP segments that are being sent by the router to another device.

entry

Syntax 
entry entry-id key [authentication-key | hash-key | hash2-key] [hash | hash2] algorithm algorithm
no entry entry-id
Context 
config>system>security>keychain>direction>bi
config>system>security>keychain>direction>uni>receive
config>system>security>keychain>direction>uni>send
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command defines a particular key in the keychain. Entries are defined by an entry-id. A keychain must have valid entries for the TCP enhanced authentication mechanism to work.

The no form of this command removes the entry from the keychain. If the entry is the active entry for sending, this will cause a new active key to be selected (if one is available using the youngest key rule). If it is the only possible send key, the system will reject the command with an error indicating that the configured key is the only available send key.

If the key is one of the eligible keys for receiving, it will be removed. If the key is the only possible eligible key, the command will not be accepted, and an error message indicating that this is the only eligible key will be displayed.

Parameters 
entry-id—
Specifies an entry that represents a key configuration to be applied to a keychain.
Values—
0 to 63

 

key—
Specifies a key ID which is used along with keychain-name and direction to uniquely identify this particular key entry.
authentication-key—
Specifies the authentication-key that will be used by the encryption algorithm. The key is used to sign and authenticate a protocol packet.

The authentication-key can be any combination of letters or numbers.

Values—
A key must be 160 bits for algorithm hmac-sha-1-96 and must be 128 bits for algorithm aes-128-cmac-96. If the key specified with the entry command amounts to less than this number of bits, it is padded internally with zero bits up to the proper length.

 

algorithm-algorithm—
Specifies an enumerated integer that indicates the encryption algorithm to be used by the key defined in the keychain.
Values—
aes-128-cmac-96 — Specifies an algorithm based on the AES standard.
hmac-sha-1-96 — Specifies an algorithm based on SHA-1.

 

hash-key | hash2-key—
Specifies the hash key. The key can be any combination of ASCII characters up to 33 for the hash-key and 96 characters for the hash2-key in length (encrypted). If spaces are used in the string, enclose the entire string in quotation marks (“ ”).

This is useful when a user must configure the parameter, but, for security purposes, the actual unencrypted key value is not provided.

hash—
Specifies the key is entered in an encrypted form. If the hash parameter is not used, the key is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash parameter specified.
hash2—
Specifies the key is entered in a more complex encrypted form.

begin-time

Syntax 
begin-time [date] [hours-minutes] [UTC] [now] [forever]
Context 
config>system>security>keychain>direction>bi>entry
config>system>security>keychain>direction>uni>receive>entry
config>system>security>keychain>direction>uni>send>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the calendar date and time after which the key specified by the keychain authentication key is used to sign and authenticate the protocol stream.

If no date and time is set, the begin-time is represented by a date and time string with all nulls and the key is not valid by default.

Parameters 
date hours-minutes—
Specifies the date and time for the key to become active.
Values—
date: YYYY/MM/DD hours-minutes: hh:mm[:ss]

 

now—
Specifies that the key should become active immediately.
forever—
Specifies that the key should always be active.

end-time

Syntax 
end-time [date] [hours-minutes] [UTC] [now] [forever]
Context 
config>system>security>keychain>direction>uni>receive>entry
config>system>security>keychain>direction>uni>send>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the calendar date and time after which the key specified by the authentication key is no longer eligible to sign and authenticate the protocol stream.

Default 

end-time forever

Parameters 
date—
Specifies the calendar date after which the key specified by the authentication key is no longer eligible to sign and authenticate the protocol stream in the YYYY/MM/DD format. When no year is specified the system assumes the current year.
hours-minutes—
Specifies the time after which the key specified by the authentication key is no longer eligible to sign and authenticate the protocol stream in the hh:mm[:ss] format. Seconds are optional, and if not included, assumed to be 0.
UTC—
Indicates that time is specified with reference to Coordinated Universal Time in the input.
now—
Specifies a time equal to the current system time.
forever—
Specifies a time beyond the current epoch.

tolerance

Syntax 
tolerance [seconds | forever]
Context 
config>system>security>keychain>direction>bi>entry
config>system>security>keychain>direction>uni>receive>entry
config>system>security>keychain>direction>uni>send>entry
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the amount of time that an eligible receive key should overlap with the active send key or to never expire.

Parameters 
seconds—
Specifies the duration that an eligible receive key overlaps with the active send key.
Values—
0 to 4294967294 seconds

 

forever—
Specifies that an eligible receive key overlaps with the active send key forever.

tcp-option-number

Syntax 
tcp-option-number
Context 
config>system>security>keychain
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

Commands in this context configure the TCP option number to be placed in the TCP packet header.

receive

Syntax 
receive option-number
Context 
config>system>security>keychain>tcp-option-number
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the TCP option number accepted in TCP packets received.

Default 

receive 254

Parameters 
option-number—
Specifies an enumerated integer that indicates the TCP option number to be used in the TCP header.
Values—
253, 254, 253, 254

 

send

Syntax 
send option-number
Context 
config>system>security>keychain>tcp-option-number
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the TCP option number accepted in TCP packets sent.

Default 

send 254

Parameters 
option-number—
Specifies an enumerated integer that indicates the TCP option number to be used in the TCP header.
Values—
253, 254

 

dst-port

Syntax 
dst-port [tcp/udp port-number] [mask]
no dst-port
Context 
config>sys>sec>cpm>entry>match
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the TCP/UDP port to match the destination port of the packet. An entry containing L4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet since only the first fragment contains the L4 information.

The no form of this command removes the destination port match criterion.

Parameters 
dst-port-number—
Specifies the destination port number to be used as a match criteria expressed as a decimal integer.
Values—
0 to 65535 (accepted in decimal hex or binary)

 

mask
Specifies the 16 bit mask to be applied when matching the destination port.

lockout

Syntax 
lockout all
lockout user user-name
Context 
admin>clear
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command clears any lockouts for a specific user.

Parameters 
all—
Specifies to clear the lockout for all users.
user-name—
Specifies the locked username, up to 32 characters.

2.9.2.1.11. IPsec commands

ipsec

Syntax 
ipsec
Context 
config
Platforms 

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description 

Commands in this context configure Internet Protocol security (IPsec) parameters. IPsec is a structure of open standards that uses cryptographic security services to ensure private, secure communications over IP networks.

static-sa

Syntax 
static-sa sa-name [create]
no static-sa
Context 
config>ipsec
Platforms 

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description 

This command configures an IPsec static security association (SA).

The no form of this command removes the configuration.

Parameters 
sa-name—
Specifies the SA name, up to 32 characters.
create—
Mandatory keyword to create an SA instance.

authentication

Syntax 
authentication auth-algorithm ascii-key ascii-string
authentication auth-algorithm hex-key hex-string [hash | hash2]
no authentication
Context 
config>ipsec>static-sa
Platforms 

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description 

This command configures the authentication algorithm to use for an IPsec manual SA.

The no form of this command removes the configuration.

Default 

no authentication

Parameters 
auth-algorithm—
Specifies the authentication algorithm.
Values—
sha1 — The authentication protocol can be either HMAC-MD5-96 or HMAC-SHA-96.
md5 — The authentication protocol can either be HMAC-MD5-96 or HMAC-SHA-96.

 

ascii-string—
Specifies the ASCII key, up to 16 characters for md5 and 20 characters for sha1.

The authentication key is stored an encrypted format. The minimum key length is configured using the config>system>security>password>minimum-length command.

The complexity of the key is configured using the commands in the config>system>security>password>complexity-rules context.

hex-string—
Specifies the hexadecimal key, up to 32 hexadecimal nibbles for md5 and up to 40 hexadecimal nibbles for sha1.
hash—
Keyword that stores all specified keys in encrypted format in the configuration file. The password must be entered in encrypted form when this keyword is configured. If this keyword is not configured, the key is assumed to be in a non-encrypted form.
hash2—
Keyword to store the key in a more complex encrypted form. If this keyword is not used, the less encrypted hash form is assumed.

description

Syntax 
description description-string
no description
Context 
config>ipsec>static-sa
Platforms 

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description 

This command creates a text description, which is stored in the configuration file, to help identify the content of the entity.The no form of this command removes the string from the configuration.

Parameters 
description-string—
Specifies the description character string. Allowed values are any string up to 80 characters composed of printable, 7-bit ASCII characters. It the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed in double quotes.

direction

Syntax 
direction ipsec-direction
no direction
Context 
config>ipsec>static-sa
Platforms 

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description 

This command configures the direction for an IPsec manual SA.

The no form of this command reverts to the default value.

Default 

direction bidirectional

Parameters 
ipsec-direction—
Specifies the direction.
Values—
inbound, outbound, bidirectional

 

protocol

Syntax 
protocol ipsec-protocol
no protocol
Context 
config>ipsec>static-sa
Platforms 

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description 

This command configures the security protocol to use for an IPsec manual SA.

The no form of this command reverts to the default value.

Default 

protocol esp

Parameters 
ipsec-protocol—
Specifies the security protocol.
Values—
ah — Configures to Authentication Header Protocol.
esp — Configures the Encapsulation Security Payload Protocol.

 

spi

Syntax 
spi spi
no spi
Context 
config>ipsec>static-sa
Platforms 

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description 

This command configures the security parameter index (SPI) key value for an IPsec manual SA.

The no form of this command removes the configured SPI key value.

Parameters 
spi—
Specifies the SPI value.
Values—
256 to 16383

 

2.9.2.2. Show commands

2.9.2.2.1. Security commands

access-group

Syntax 
access-group [group-name]
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays SNMP access group information.

Parameters 
group-name—
Displays information for the specified access group.
Output 

The following output is an example of SNMP access group information, and Table 16 describes the output fields.

Sample output
A:ALA-4# show system security access-group
===============================================================================
Access Groups                                                                  
===============================================================================
group name        security  security  read          write         notify       
                  model     level     view          view          view         
-------------------------------------------------------------------------------
snmp-ro           snmpv1    none      no-security                 no-security  
snmp-ro           snmpv2c   none      no-security                 no-security  
snmp-rw           snmpv1    none      no-security   no-security   no-security  
snmp-rw           snmpv2c   none      no-security   no-security   no-security  
snmp-rwa          snmpv1    none      iso           iso           iso          
snmp-rwa          snmpv2c   none      iso           iso           iso          
snmp-trap         snmpv1    none                                  iso          
snmp-trap         snmpv2c   none                                  iso          
===============================================================================
A:ALA-7#
Table 16:  Output fields: access group 

Label

Description

Group name

Displays the access group name

Security model

Displays the security model required to access the views configured in this node

Security level

Specifies the required authentication and privacy levels to access the views configured in this node

Read view

Specifies the variable of the view to read the MIB objects

Write view

Specifies the variable of the view to configure the contents of the agent

Notify view

Specifies the variable of the view to send a trap about MIB objects

authentication

Syntax 
authentication [statistics]
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays system login authentication configuration and statistics.

Parameters 
statistics—
Appends login and accounting statistics to the display.
Output 

The following output is an example of system login authentication information, and Table 17 describes the output fields.

Sample output
A:ALA-4# show system security authentication
===============================================================================
Authentication                  sequence : radius tacplus local
===============================================================================
server address   status  type    timeout(secs)  single connection  retry count
-------------------------------------------------------------------------------
10.10.10.103     up      radius  5              n/a                5
10.10.0.1        up      radius  5              n/a                5
10.10.0.2        up      radius  5              n/a                5
10.10.0.3        up      radius  5              n/a                5
-------------------------------------------------------------------------------
radius admin status  : down
tacplus admin status : up
health check         : enabled
-------------------------------------------------------------------------------
No. of Servers: 4
===============================================================================
A:ALA-4#
 
 
A:ALA-7>show>system>security# authentication statistics
===============================================================================
Authentication                  sequence : radius tacplus local
===============================================================================
server address   status  type    timeout(secs)  single connection  retry count
-------------------------------------------------------------------------------
10.10.10.103     up      radius  5              n/a                5
10.10.0.1        up      radius  5              n/a                5
10.10.0.2        up      radius  5              n/a                5
10.10.0.3        up      radius  5              n/a                5
-------------------------------------------------------------------------------
radius admin status  : down
tacplus admin status : up
health check         : enabled
-------------------------------------------------------------------------------
No. of Servers: 4
===============================================================================
Login Statistics
===============================================================================
server address      connection errors   accepted logins     rejected logins
-------------------------------------------------------------------------------
10.10.10.103        0                   0                   0
10.10.0.1           0                   0                   0
10.10.0.2           0                   0                   0
10.10.0.3           0                   0                   0
local               n/a                 1                   0
===============================================================================
Authorization Statistics (TACACS+)
===============================================================================
server address      connection errors   sent packets        rejected packets
-------------------------------------------------------------------------------
===============================================================================
Accounting Statistics
===============================================================================
server address      connection errors   sent packets        rejected packets
-------------------------------------------------------------------------------
10.10.10.103        0                   0                   0
10.10.0.1           0                   0                   0
10.10.0.2           0                   0                   0
10.10.0.3           0                   0                   0
===============================================================================
A:ALA-7#
Table 17:  Output fields: security authentication  

Label

Description

Sequence

Displays the sequence in which authentication is processed

Server address

Displays the IP address of the RADIUS server

Status

Displays the current status of the RADIUS server

Type

Displays the authentication type

Timeout (secs)

Displays the number of seconds the router waits for a response from a RADIUS server

Single connection

Enabled — Specifies a single connection to the TACACS+ server and validates everything via that connection.

Disabled — Specifies the TACACS+ protocol operation is disabled.

Retry count

Displays the number of times the router attempts to contact the RADIUS server for authentication if there are problems communicating with the server

Connection errors

Displays the number of times a user has attempted to login irrespective of whether the login succeeded or failed

Accepted logins

Displays the number of times the user has successfully logged in

Rejected logins

Displays the number of unsuccessful login attempts

Sent packets

Displays the number of packets sent

Rejected packets

Displays the number of packets rejected

keychain

Syntax 
keychain [key-chain] [detail]
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays keychain information.

Parameters 
key-chain—
Specifies the keychain name to display.
detail—
Displays detailed keychain information.
Output 

The following output is an example of keychain information, and Table 18 describes the output fields.

Sample output
*A:ALA-A# show system security keychain test
===============================================================================
Key chain:test
===============================================================================
TCP-Option number send     : 254                    Admin state   : Up
TCP-Option number receive  : 254                    Oper state    : Up
===============================================================================
*A:ALA-A# 
 
 
*A:ALA-A#  show system security keychain test detail
===============================================================================
Key chain:test
===============================================================================
TCP-Option number send     : 254                    Admin state   : Up
TCP-Option number receive  : 254                    Oper state    : Up
===============================================================================
Key entries for key chain: test
===============================================================================
Id               : 0
Direction        : send-receive         Algorithm        : hmac-sha-1-96
Admin State      : Up                   Valid            : Yes
Active           : Yes                  Tolerance        : 300
Begin Time       : 2007/02/15 18:28:37  Begin Time (UTC) : 2007/02/15 17:28:37
End Time         : N/A                  End Time (UTC)   : N/A
===============================================================================
Id               : 1
Direction        : send-receive         Algorithm        : aes-128-cmac-96
Admin State      : Up                   Valid            : Yes
Active           : No                   Tolerance        : 300
Begin Time       : 2007/02/15 18:27:57  Begin Time (UTC) : 2007/02/15 17:27:57
End Time         : 2007/02/15 18:28:13  End Time (UTC)   : 2007/02/15 17:28:13
===============================================================================
Id               : 2
Direction        : send-receive         Algorithm        : aes-128-cmac-96
Admin State      : Up                   Valid            : Yes
Active           : No                   Tolerance        : 500
Begin Time       : 2007/02/15 18:28:13  Begin Time (UTC) : 2007/02/15 17:28:13
End Time         : 2007/02/15 18:28:37  End Time (UTC)   : 2007/02/15 17:28:37
===============================================================================
*A:ALA-A# 
Table 18:  Output fields: keychain 

Label

Description

TCP-Option number send

Displays the TCP option number to be inserted in the header of sent TCP packets

Admin state

Displays the administrative state of the keychain: up or down

TCP-Option number receive

Displays the TCP option number that will be accepted in the header of received TCP packets

Oper state

Displays the operational state of the keychain: up or down

Key entries for key chain: test

Id

Displays the ID of the key entry

Direction

Displays the stream direction on which keys will be applied for this entry: send, receive, or send-receive

Algorithm

Displays the encryption algorithm to be used by this key entry

Option

Indicates the configured IS-IS encoding standard (indicates “none” if the associated protocol is not IS-IS)

Admin State

Displays the administrative state of the key entry: up or down

Valid

Indicates if the receive key is valid

Active

Indicates if the transmit (sent) key is active

Tolerance

Displays the tolerance time configured for support of both currently active and new keys

Begin Time

Displays the time at which the new key is used to sign and/or authenticate protocol packets

Begin Time (UTC)

Displays the begin time in UTC time

End Time

Displays the time at which the key is no longer eligible to authenticate protocol packets

End Time (UTC)

Displays the end time in UTC time

management-access-filter

Syntax 
management-access-filter
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays management access filter information for IP filters.

ip-filter

Syntax 
ip-filter [entry entry-id]
Context 
show>system>security>mgmt-access-filter
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays management-access IP filters.

Parameters 
entry-id—
Displays information for the specified entry.
Values—
1 to 9999

 

Output 

The following output is an example of management access IP filter information, and Table 19 describes the output fields.

Sample output
*7210-SAS>show>system>security>management-access-filter# ip-filter entry 1
 
===============================================================================
IPv4 Management Access Filter
===============================================================================
filter type   : ip
Def. Action   : permit
Admin Status  : enabled (no shutdown)
-------------------------------------------------------------------------------
Entry         : 1
Description   : (Not Specified)
Src IP        : undefined
Src interface : undefined
Dest port     : undefined
L4 Src port   : undefined
Fragment      : off
Protocol      : undefined
Router        : undefined
Action        : none
Log           : disabled
Matches       : 0
===============================================================================
*7210-SAS>show>system>security>management-access-filter# 
Table 19:  Output fields: IP filter 

Label

Description

Def. action

Permit — Specifies that packets not matching the configured selection criteria in any of the filter entries are permitted

Deny — Specifies that packets not matching the configured selection criteria in any of the filter entries are denied and that an ICMP host unreachable message will be issued

Deny-host-unreachable — Specifies that packets not matching the configured selection criteria in the filter entries are denied

Entry

Displays the entry ID in a policy or filter table

Description

Displays a text string describing the filter

Src IP

Displays the source IP address used for management access filter match criteria

Src Interface

Displays the interface name for the next-hop to which the packet should be forwarded if it hits this filter entry

Dest port

Displays the destination port

Match

Displays the number of times a management packet has matched this filter entry

Protocol

Displays the IP protocol to match

Action

Displays the action to take for packets that match this filter entry

Flow label

Displays the flow label value to match

Next-header

Displays the IPv6 next header value to match

L4 Src port

Displays the TCP/UDP source port number to match

Fragment

Indicates whether or not the entry should match a fragment

Router

Displays the router instance ID to match

Log

Indicates if packet matching this entry must be logged or not. On 7210 SAS, platforms logging is not supported.

ipv6-filter

Syntax 
ipv6-filter [entry entry-id]
Context 
show>system>security>mgmt-access-filter
Platforms 

Supported on all 7210 SAS platforms as described in this document, except 7210 SAS-K 2F1C2T

Description 

This command displays management-access IPv6 filters.

Parameters 
entry-id—
Displays information for the specified entry.
Values—
1 to 9999

 

Output 

The following output is an example of management access IPV6 filter information, and Table 20 describes the output fields.

Sample output
A:7210SAS# show system security management-access-filter ipv6-filter 
 
===============================================================================
IPv6 Management Access Filter
===============================================================================
filter type : ipv6
Def. Action : permit
Admin Status : enabled (no shutdown)
-------------------------------------------------------------------------------
Entry : 1
Description : (Not Specified)
Src IP : undefined
Flow label : undefined
Src interface : 1/1/1
Dest port : undefined
L4 Src port : undefined
Next-header : undefined
Router : undefined
Action : permit
Log : disabled
Matches : 0
===============================================================================
*A:7210SAS# 
Table 20:  Output fields: IPv6 filter 

Label

Description

Def. action

Permit — Specifies that packets not matching the configured selection criteria in any of the filter entries are permitted

Deny — Specifies that packets not matching the configured selection criteria in any of the filter entries are denied and that a ICMP host unreachable message will be issued

Deny-host-unreachable — Specifies that packets not matching the configured selection criteria in the filter entries are denied

Entry

Displays the entry ID in a policy or filter table

Description

Displays a text string describing the filter

Src IP

Displays the source IPv6 address used for management access filter match criteria

Src Interface

Displays the interface name for the next-hop to which the packet should be forwarded if it hits this filter entry

Dest port

Displays the destination port

Flow label

Displays the flow label value to match

Protocol

Displays the IPv6 protocol to match

Action

Displays the action to take for packets that match this filter entry

Next-header

Displays the IPv6 next header value to match

L4 Src port

Displays the TCP/UDP source port number to match

Router

Displays the router instance ID to match

Log

Indicates if packet matching this entry must be logged or not. On 7210 SAS platforms, logging is not supported.

password-options

Syntax 
password-options
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays configured password options.

Output 

The following output is an example of configured password options information, and Table 21 describes the output fields.

Sample output
A:ALA-7# show system security password-options
===============================================================================
Password Options                                                               
===============================================================================
Password aging in days                           : none                        
Number of invalid attempts permitted per login   : 3                           
Time in minutes per login attempt                : 5                           
Lockout period (when threshold breached)         : 10                          
Authentication order                             : radius tacplus local        
Configured complexity options                    :                             
Minimum password length                          : 6                           
===============================================================================
A:ALA-7#
Table 21:  Output fields: password options 

Label

Description

Password aging in days

Displays the number of days a user password is valid before the user must change their password

Number of invalid attempts permitted per login

Displays the number of unsuccessful login attempts allowed for the specified time

Time in minutes per login attempt

Displays the period of time, in minutes, that a specified number of unsuccessful attempts can be made before the user is locked out

Lockout period (when threshold breached)

Displays the lockout period in minutes where the user is not allowed to login

Authentication order

Displays the sequence in which password authentication is attempted among RADIUS, TACACS+, and local passwords

Configured complexity options

Displays the complexity requirements of locally administered passwords, HMAC-MD5-96, HMAC-SHA-96, and DES-keys configured in the authentication section

Minimum password length

Displays the minimum number of characters required for locally administered passwords, HMAC-MD5-96, HMAC-SHA-96, and DES-keys configured in the system security section

profile

Syntax 
profile [profile-name]
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays user profile information.

If the profile-name is not specified, then information for all profiles are displayed.

Parameters 
profile-name—
Displays information for the specified user profile.
Output 

The following output is an example of user profile information, and Table 22 describes the output fields.

Sample output
A:ALA-7# show system security profile administrative
=============================================================================== 
User Profile                                                                    
=============================================================================== 
User Profile : administrative                                                   
Def. Action  : permit-all                                                       
------------------------------------------------------------------------------- 
Entry        : 10                                                               
Description  :                                                                  
Match Command: configure system security                                        
Action       : permit                                                           
------------------------------------------------------------------------------- 
Entry        : 20                                                               
Description  :                                                                  
Match Command: show system security                                             
Action       : permit                                                           
-------------------------------------------------------------------------------
No. of profiles: 
===============================================================================
A:ALA-7#
Table 22:  Output fields: security profile 

Label

Description

User Profile

Displays the profile name used to deny or permit user console access to a hierarchical branch or to specific commands

Def. action

Permit all — Permits access to all commands

Deny — Denies access to all commands

None — No action is taken

Entry

Displays the entry ID in a policy or filter table

Description

Displays the text string describing the entry

Match Command

Displays the command or subtree commands in subordinate command levels

Action

Permit all — Commands matching the entry command match criteria are permitted

Deny — Commands not matching the entry command match criteria are not permitted

No. of profiles

Displays the total number of profiles listed

source-address

Syntax 
source-address
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays the source address configured for applications.

The 7210 SAS-K 2F1C2T does not support IPv6 source addresses.

Output 

The following output is an example of source address information, and Table 23 describes the output fields.

Sample output
A:SR-7# show system security source-address
===============================================================================
Source-Address applications
===============================================================================
Application         IP address/Interface Name                    Oper status
-------------------------------------------------------------------------------
telnet              10.20.1.7                                    Up
radius              loopback1                                    Up
===============================================================================
A:SR-7# 
Table 23:  Output fields: source address 

Label

Description

Application

Displays the source-address application

IP address

Interface Name

Displays the source address IP address or interface name

Oper status

Up — The source address is operationally up

Down — The source address is operationally down

ssh

Syntax 
ssh
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays all SSH sessions as well as the SSH status and fingerprint.

Output 

The following output is an example of SSH information, and Table 24 describes the output fields.

Sample output
ALA-7# show system security ssh 
SSH is enabled
SSH preserve key: Enabled
SSH protocol version 1: Enabled
RSA host key finger print:c6:a9:57:cb:ee:ec:df:33:1a:cd:d2:ef:3f:b5:46:34
 
SSH protocol version 2: Enabled
DSA host key finger print:ab:ed:43:6a:75:90:d3:fc:42:59:17:8a:80:10:41:79 
=======================================================
Connection Encryption Username
=======================================================
192.168.5.218 3des admin
-------------------------------------------------------
Number of SSH sessions : 1
======================================================= 
ALA-7# 
A:ALA-49>config>system>security# show system security ssh
SSH is disabled
A:ALA-49>config>system>security#
Table 24:  Output fields: SSH 

Label

Description

SSH status

SSH is enabled — Displays that SSH server is enabled

SSH is disabled — Displays that SSH server is disabled

SSH Preserve Key

Enabled — Displays that preserve-key is enabled

Disabled — Displays that preserve-key is disabled

SSH protocol version 1

Enabled — Displays that SSH1 is enabled

Disabled — Displays that SSH1 is disabled

SSH protocol version 2

Enabled — Displays that SSH2 is enabled

Disabled — Displays that SSH2 is disabled

Key fingerprint

Displays the key fingerprint, which is the server identity. Clients trying to connect to the server verify the server fingerprint. If the server fingerprint is not known, the client may not continue with the SSH session since the server might be spoofed.

Connection

Displays the IP address of the connected routers (remote client)

Encryption

des — Data encryption using a private (secret) key

3des — An encryption method that allows proprietary information to be transmitted over untrusted networks

Username

Displays the name of the user

Number of SSH sessions

Displays the total number of SSH sessions

user

Syntax 
user [user-id] [detail]
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays user registration information.

By default, if no command line options are specified, summary information for all users displays.

Parameters 
user-id—
Displays information for the specified user, up to 32 characters.
detail—
Displays detailed user information to the summary output.
Output 

The following output is an example of user registration information, and Table 25 describes the output fields.

Sample output
A:ALA-7# show system security user
===============================================================================
Users                                                                          
===============================================================================
user id           need    user permissions  password    attempted failed  local
                  new pwd console ftp snmp  expires     logins    logins  conf 
-------------------------------------------------------------------------------
                                                                               
admin             n       y       n   n     never       21        0       y    
===============================================================================
A:ALA-7# 
 
A:
ALA-7# show system security user detail
===============================================================================
Users                                                                          
===============================================================================
user id           need    user permissions  password    attempted failed  local
                  new pwd console ftp snmp  expires     logins    logins  conf 
-------------------------------------------------------------------------------
                                                                               
admin             n       y       n   n     never       21        0       y    
===============================================================================
                                                                               
===============================================================================
User Configuration Detail                                                      
===============================================================================
user id            : admin                                                     
-------------------------------------------------------------------------------
console parameters                                                             
-------------------------------------------------------------------------------
new pw required    : no                 cannot change pw   : no                
home directory     : cf1:\ 
restricted to home : no                                                        
login exec file    :                                                           
profile            : administrative                                            
-------------------------------------------------------------------------------
snmp parameters                                                                
===============================================================================
A:ALA-7# 
Table 25:  Output fields: security user 

Label

Description

User ID

Displays the name of a system user

Need new pwd

Y — The user must change their password at the next login

N — The user is not forced to change their password at the next login

Cannot change pw

Y — The user has the ability to change the login password

N — The user does not have the ability to change the login password

User permissions

Console

Y — The user is authorized for console access

N — The user is not authorized for console access

FTP

Y — The user is authorized for FTP access

N — The user is not authorized for FTP access

SNMP

Y — The user is authorized for SNMP access

N — The user is not authorized for SNMP access

Password expires

Displays the number of days in which the user must change their login password

Attempted logins

Displays the number of times the user has attempted to log in regardless of whether the login succeeded or failed

Failed logins

Displays the number of unsuccessful login attempts

Local conf

Y — Password authentication is based on the local password database

N — Password authentication is not based on the local password database

Home directory

Specifies the local home directory for the user for both console and FTP access

Restricted to home

Yes — The user is not allowed to navigate to a directory higher in the directory tree on the home directory device

No — The user is allowed to navigate to a directory higher in the directory tree on the home directory device

Login exec file

Displays the user login exec file, which executes whenever the user successfully logs in to a console session

view

Syntax 
view [view-name] [detail]
Context 
show>system>security
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays the SNMP MIB views.

Parameters 
view-name—
Specifies the name of the view to display output, up to 32 characters. If no view name is specified, the complete list of views displays.
detail—
Displays detailed view information.
Output 

The following output is an example of SNMP MIB view information, and Table 26 describes the output fields.

Sample output
A:ALA-48# show system security view
===============================================================================
Views
===============================================================================
view name         oid tree                        mask              permission
-------------------------------------------------------------------------------
iso               1                                                 included
read1             1.1.1.1                         11111111          included
write1            2.2.2.2                         11111111          included
testview          1                               11111111          included
testview          1.3.6.1.2                       11111111          excluded
mgmt-view         1.3.6.1.2.1.2                                     included
mgmt-view         1.3.6.1.2.1.4                                     included
mgmt-view         1.3.6.1.2.1.5                                     included
mgmt-view         1.3.6.1.2.1.6                                     included
mgmt-view         1.3.6.1.2.1.7                                     included
mgmt-view         1.3.6.1.2.1.31                                    included
mgmt-view         1.3.6.1.2.1.77                                    included
mgmt-view         1.3.6.1.4.1.6527.3.1.2.3.7                        included
mgmt-view         1.3.6.1.4.1.6527.3.1.2.3.11                       included
no-security       1                                                 included
no-security       1.3.6.1.6.3                                       excluded
no-security       1.3.6.1.6.3.10.2.1                                included
no-security       1.3.6.1.6.3.11.2.1                                included
no-security       1.3.6.1.6.3.15.1.1                                included
on-security       2                               00000000          included
-------------------------------------------------------------------------------
No. of Views: 
===============================================================================
A:ALA-48#
Table 26:  Output fields: security view 

Label

Description

view name

Displays the name of the view. Views control the accessibility of a MIB object within the configured MIB view and subtree.

oid tree

Displays the object identifier of the ASN.1 subtree

mask

Displays the bit mask that defines a family of view subtrees

permission

Indicates whether each view is included or excluded

No. of Views

Displays the total number of views

2.9.2.2.2. Login control

users

Syntax 
users
Context 
show
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command displays console user login and connection information.

Output 

The following output is an example of console user login and connection information, and Table 27 describes the output fields.

Sample output
A:ALA-7# show users
===============================================================================
User              Type    From              Login time          Idle time
===============================================================================
testuser          Console     --            21FEB2007 04:58:55  0d 00:00:00  A
-------------------------------------------------------------------------------
Number of users : 1
'A' indicates user is in admin mode
===============================================================================
A:ALA-7#
Table 27:  Output fields: users 

Label

Description

User

Displays the username

Type

Displays the access type that the user is authorized

From

Displays the originating IP address

Login time

Displays the time the user logged in

Idle time

Displays the amount of idle time for a specific login

Number of users

Displays the total number of users logged in

2.9.2.3. Debug commands

radius

Syntax 
radius
no radius
Context 
debug>router
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command enables debugging for RADIUS connections.

The no form of this command disables RADIUS debugging.

Default 

no radius

detail-level

Syntax 
detail-level {low | medium | high}
no detail-level
Context 
debug>router>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command configures the RADIUS debugging output detail level.

The no form of this command reverts to the default value.

Default 

detail-level medium

Parameters 
low—
Specifies that the output include the packet type, server address, length, and RADIUS server policy name.
medium—
Specifies that the output include the RADIUS attributes in the packets, in addition to all information included in low detail output.
high—
Specifies that the output include hexadecimal packet dumps, in addition to all information included in medium and low detail output.

packet-type

Syntax 
packet-type [authentication] [accounting] [coa]
no packet-type
Context 
debug>router>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the RADIUS packet types to include in the RADIUS debugging output.

The no form of this command reverts to the default values.

Default 

packet-type authentication accounting coa

Parameters 
authentication—
Specifies that RADIUS authentication packets should be included.
accounting—
Specifies that RADIUS accounting packets should be included.
coa—
Specifies that RADIUS change-of-authorization packets should be included.

radius-attr

Syntax 
radius-attr type attribute-type [transaction]
radius-attr type attribute-type [transaction] {address | hex | integer | string} value attribute-value
radius-attr vendor vendor-id type attribute-type [transaction] [encoding encoding-type]
radius-attr vendor vendor-id type attribute-type [transaction] [encoding encoding-type] {address | hex | integer | string} value attribute-value
no radius-attr type attribute-type
no radius-attr type attribute-type {address | hex | integer | string} value attribute-value
no radius-attr vendor vendor-id type attribute-type
no radius-attr vendor vendor-id type attribute-type {address | hex | integer | string} value attribute-value
Context 
debug>router>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the RADIUS attributes to include in medium or high detail RADIUS debugging output.

The no form of this command disables the inclusion of the specified attributes.

Parameters 
address—
Specifies that the attribute-value is an IPv4 or IPv6 address, prefix, or subnet.
attribute-type—
Specifies the RADIUS attribute type.
Values—
1 to 255

 

attribute-value—
Specifies the value of the RADIUS attribute.
Values—
addressipv4-address, ipv6-address, ipv6-prefix/prefix-length
                   ipv4-address — a.b.c.d
                   ipv6-address — x:x:x:x:x:x:x:x (eight 16-bit pieces)
                   ipv6-prefix — x:x:x:x:x:x:x:x (eight 16-bit pieces)
                                          x:x:x:x:d.d.d.d
                                          x — 0 to FFFF (hexadecimal)
                                          d — 0 to 255 (decimal)
                   prefix-length — 0 to 128 (7210 SAS-D,                                             7210 SAS-K 2F1C2T,                                             7210 SAS-K 2F6C4T,                                             7210 SAS-K 3SFP+ 8C)
                                            0 to 64 (7210 SAS-Dxp)
hex — 0x0 to 0xFFFFFFFF (up to 506 hexadecimal nibbles)
integer — 0 to 4294967295
string — ASCII string up to 253 characters

 

encoding-type—
Specifies the size of the vendor-type and vendor-length in bytes. The information is configured in the format xy, where x is the size of the vendor-type and y is the size of the vendor-length.
Values—
vendor-type — 1 to 4
vendor-length — 0 to 2

 

Default—
11
hex—
Specifies that the attribute-value is a binary string in hexadecimal format.
integer—
Specifies that the attribute-value is an integer.
string—
Specifies that the attribute-value is an ASCII string.
transaction—
Specifies that the system outputs both request and response packets in the same session, even if the response packet does not include the filtered attributes.
vendor-id—
Specifies the vendor ID for the vendor-specific attributes.
Values—
0 to 16777215

 

server-address

Syntax 
server-address ip-address
no server-address ip-address
Context 
debug>router>radius
Platforms 

Supported on all 7210 SAS platforms as described in this document

Description 

This command specifies the RADIUS server information to include in the RADIUS debugging output.

The no form of this command removes the specified RADIUS server from the RADIUS debugging output.

Parameters 
ip-address—
Specifies the IPv4 or IPv6 address of the RADIUS server.
Values—
ipv4-address — a.b.c.d
ipv6-address — x:x:x:x:x:x:x:x (eight 16-bit pieces)
                          x:x:x:x:d.d.d.d
                          x — 0 to FFFF (hexadecimal)
                          d — 0 to 255 (decimal)