General security commands

description

Syntax

description description-string

no description

Context

config>system>security>mgmt-access-filter>ip-filter>entry

config>system>security>mgmt-access-filter>ipv6-filter>entry

config>sys>security>keychain>direction>bi>entry

config>system>security>keychain>direction>uni>receive>entry

config>system>security>keychain>direction>uni>send>entry

config>system>security>user>public-keys>ecdsa>ecdsa-key

config>system>security>user>public-keys>rsa>rsa-key

Platforms

Supported on all 7210 SAS platforms as described in this document

Description

Note:

The config>system>security>mgmt-access-filter>ipv6-filter>entry context is not supported on the 7210 SAS-K 2F1C2T.

This command associates a text string with a configuration context to help identify the context in the configuration file.

The no form of this command removes the string.

Parameters

string

Specifies the description character string. Allowed values are any string up to 80 characters composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes.

shutdown

Syntax

[no] shutdown

Context

config>system>security>mgmt-access-filter

config>system>security>keychain>direction>bi>entry

config>system>security>keychain>direction>uni>receive>entry

config>system>security>keychain>direction>uni>send>entry

Platforms

Supported on all 7210 SAS platforms as described in this document

Description

The shutdown command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many entities must be explicitly enabled using the no shutdown command. The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

The no form of this command puts an entity into the administratively enabled state.

Default

no shutdown

security

Syntax

security

Context

config>system

Platforms

Supported on all 7210 SAS platforms as described in this document

Description

Commands in this context configure security settings.

Security commands manage user profiles and user membership. Security commands also manage user login registrations.

ftp-server

Syntax

[no] ftp-server

Context

config>system>security

Platforms

Supported on all 7210 SAS platforms as described in this document

Description

This command enables FTP servers running on the system.

FTP servers are disabled by default. At system startup, only SSH servers are enabled.

The no form of this command disables FTP servers running on the system.

hash-control

Syntax

hash-control [read-version {1 | 2 | all}] [write-version {1 | 2}]

no hash-control

Context

config>system>security

Platforms

Supported on all 7210 SAS platforms as described in this document

Description

If the user executes a save or info command, the system encrypts all passwords, for example, MD5 keys, for security reasons. At present, two algorithms exist.

The first algorithm is a simple, short key that can be copied and pasted in a different location when the user wants to configure the same password. However, because it is the same password and the hash key is limited to the password/key, even the casual observer will notice that it is the same key.

The second algorithm is a more complex key, and cannot be copied and pasted in different locations in the configuration file. In this case, if the same key or password is used repeatedly in different contexts, each encrypted (hashed) version is different.

Default

hash-control read-version all

Parameters

read-version {1 | 2 | all}

When the read-version is configured as ‟all,” both versions 1 and 2 are accepted by the system. Otherwise, only the selected version is accepted when reading configuration or exec files. The presence of incorrect hash versions aborts the script/startup.

write-version {1 | 2}

Selects the hash version that is used the next time the configuration file is saved (or an info command is executed). Be careful to save the read and write version correctly, so that the file can be properly processed after the next reboot or exec.

source-address

Syntax

source-address

Context

config>system>security

Platforms

Supported on all 7210 SAS platforms as described in this document

Description

This command specifies the source address that should be used in all unsolicited packets sent by the application.

This feature only applies on in-band interfaces and does not apply on the out-band management interface. Packets going out the management interface will keep using that as the source IP address. That is, when the RADIUS server is reachable through both the management interface and a network interface, the management interface is used despite what is configured under the source-address statement.

application

Syntax

application app [ip-int-name | ip-address]

no application app

Context

config>system>security>source-address

Platforms

Supported on all 7210 SAS platforms as described in this document

Description

This command specifies the application to use the source IP address specified by the source-address command.

Parameters

app

Specifies the application name.

Values

telnet, ftp, ssh, radius, tacplus, snmptrap, syslog, ping, traceroute, dns, sntp, ntp

Note:

PTP is not supported on all platforms. Only the applications supported on the platform can be used as a value with this command. Using an unsupported application value does not have the needed effect.

ip-int-name | ip-address

Specifies the name of the IP interface and IP address. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes.

telnet-server

Syntax

[no] telnet-server

Context

config>system>security

Platforms

Supported on all 7210 SAS platforms as described in this document

Description

This command enables Telnet servers running on the system.

Telnet servers are off by default. At system startup, only SSH servers are enabled.

Telnet servers in networks limit Telnet clients to three attempts to login. The Telnet server disconnects the Telnet client session after three attempts.

The no form of this command disables Telnet servers running on the system.