Security Command Reference

Command Hierarchies

Configuration Commands

Security Configuration Commands

config
— system
copy {user source-user | profile source-profile} to destination [overwrite]
— no ftp-server
hash-control [read-version {1 | 2 | all}] [write-version {1 | 2}]
application app [ip-int-name | ip-address]
— no application app
application6 app ipv6-address
— no application6 app
[no] telnet-server
vprn-network-exceptions [number seconds]

Management Access Filter Commands

config
— system
default-action {permit | deny | deny-host-unreachable}
[no] entry entry-id
action {permit | deny | deny-host-unreachable}
— no action
description description-string
dst-port port [mask]
— no dst-port
[no] log
[no] source-address  protocol-id
router router-instance
— no router
src-ip {ip-prefix/mask | ip-prefix netmask}
— no src-ip
src-port {port-id | cpm}
— no src-port
renum old-entry-number new-entry-number
[no] shutdown

IPv6 Management Access Filter Commands

config
— system
default-action {permit | deny | deny-host-unreachable}
[no] entry entry-id
action {permit | deny | deny-host-unreachable}
— no action
description description-string
dst-port port [mask]
— no dst-port
flow-label value
— no flow-label
[no] log
[no] next-header next-header
router router-instance
— no router
src-ip ipv6-address/prefix-length
— no src-ip
src-port {port-id | cpm}
— no src-port
renum old-entry-number new-entry-number
[no] shutdown

CPM Filter Commands

config
— system
[no] cpm-filter
default-action {accept | drop}
entry entry-id [create]
— no entry entry-id
action {accept | drop}
— no action
description description-string
log log-id
— no log
match [protocol protocol-id]
— no match
dscp dscp-name
— no dscp
dst-ip {ip-address/mask | ip-address netmask}
— no dst-ip
dst-port tcp/udp port-number [mask]
— no dst-port
fragment {true | false}
— no fragment
icmp-code icmp-code
— no icmp-code
icmp-type icmp-type
— no icmp-type
ip-option ip-option-value [ip-option-mask]
— no ip-option
multiple-option {true | false}
option-present {true | false}
src-ip {ip-address/mask | ip-address netmask}
— no src-ip
src-port src-port-number [mask]
— no src-port
tcp-ack {true | false}
— no tcp-ack
tcp-syn {true | false}
— no tcp-syn
renum old-entry-id new-entry-id
[no] shutdown

IPv6 CPM Filter Commands

config
— system
[no] cpm-filter
default-action {accept | drop}
entry entry-id [create]
— no entry entry-id
action {accept | drop}
— no action
description description-string
log log-id
— no log
match [next-header next-header]
— no match
dscp dscp-name
— no dscp
dst-ip ipv6-address/prefix-length
— no dst-ip
dst-port tcp/udp port-number [mask]
— no dst-port
icmp-code icmp-code
— no icmp-code
icmp-type icmp-type
— no icmp-type
src-ip ipv6-address/prefix-length
— no src-ip
src-port src-port-number [mask]
— no src-port
tcp-ack {true | false}
— no tcp-ack
tcp-syn {true | false}
— no tcp-syn
renum old-entry-id new-entry-id
[no] shutdown

Password Commands

config
— system
admin-password password [hash | hash2]
aging days
— no aging
attempts count [time minutes1] [lockout minutes2]
— no attempts
authentication-order [method-1] [method-2] [method-3] [exit-on-reject]
[no] complexity [numeric] [special-character] [mixed-case]
[no] health-check
minimum-length value

Profile Commands

config
— system
[no] profile user-profile-name
default-action {deny-all | permit-all | none}
[no] entry entry-id
action {permit | deny}
description description-string
match command-string
— no match
renum old-entry-number new-entry-number

User Commands

config
— system
[no] user user-name
[no] access [ftp] [snmp] [console]
login-exec url-prefix:source-url
— no login-exec
member user-profile-name [user-profile-name…(up to 8 max)]
— no member user-profile-name
home-directory url-prefix [directory] [directory/directory…]
password [password] [hash | hash2]
snmp
authentication {[none] | [[hash] {md5 key-1 | sha key-1} privacy {privacy-level key-2}]}
group group-name
— no group
user-template {tacplus_default | radius_default}
[no] access [ftp] [console]
login-exec url-prefix:source-url
— no login-exec
home-directory url-prefix [directory] [directory/directory ..]

RADIUS Commands

config
— system
[no] radius
access-algorithm {direct | round-robin}
[no] accounting
[no] authorization
port port
— no port
retry count
— no retry
server server-index address ip-address secret key [hash | hash2]
— no server server-index
[no] shutdown
timeout seconds
— no timeout

TACACS+ Commands

config
— system
[no] tacplus
accounting [record-type {start-stop | stop-only}]
— no accounting
[no] authorization
server server-index address ip-address secret key [hash | hash2] [port port]
— no server server-index
timeout seconds
— no timeout
[no] shutdown

802.1x Commands

config
— system
[no] dot1x
[no] radius-plcy name [create]
retry count
— no retry
server server-index address ip-address secret key [hash | hash2] [auth-port auth-port] [acct-port acct-port] [type server-type]
— no server server-index
source-address ip-address
[no] shutdown
timeout seconds
— no timeout
[no] shutdown

SSH Commands

config
— system
ssh
[no] preserve-key
[no] version SSH-version

Login Control Commands

config
— system
ftp
idle-timeout {minutes | disable}
[no] login-banner
motd {url url-prefix: source-url | text motd-text-string}
— no motd
pre-login-message login-text-string [name]
telnet

Show Commands

Security

show
— system
— security
access-group [group-name]
authentication [statistics]
— ip-filter [entry entry-id]
— ipv6-filter [entry entry-id]
— ip-filter [entry entry-id]
— ipv6-filter [entry entry-id]
profile user-profile-name
ssh
retry [user-id] [detail]
view [view-name] [detail] [capabilities]

Login Control

show
users

Clear Commands

Authentication

clear
— router
— authentication
statistics [interface ip-int-name | ip-address]

Debug Commands

debug
radius [detail] [hex]
— no radius

Command Descriptions

Configuration Commands

Generic Security Commands

description

Syntax 
description description-string
no description
Context 
config>system>security>management-access-filter>ip-filter>entry
config>system>security>management-access-filter>ipv6-filter>entry
config>system>security>cpm-filter>ip-filter>entry>
config>system>security>cpm-filter>ipv6-filter>entry>
config>system>security>profile>entry
Description 

This command creates a text description stored in the configuration file for a configuration context.

The no form of the command removes the string.

Default 

n/a

Parameters 
description-string—
the description character string. Allowed values are any string up to 80 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>management-access-filter>ip-filter
config>system>security>management-access-filter>ipv6-filter
config>system>security>cpm-filter>ip-filter
config>system>security>cpm-filter>ipv6-filter
config>system>security>radius
config>system>security>tacplus
Description 

This command administratively disables the entity. The operational state of the entity is disabled as well as the operational state of any entities contained within. When disabled, an entity does not change, reset, or remove any configuration settings or statistics, other than the administrative state. Many objects must be shut down before they can be deleted.

The no form of the command puts an entity into the administratively enabled state. Many entities must be explicitly enabled using the no shutdown command.

Default 

no shutdown

Security Commands

security

Syntax 
security
Context 
config>system
Description 

This command creates the context to configure security settings.

Security commands manage user profiles and user membership. Security commands also manage user login registrations.

copy

Syntax 
copy {user source-user | profile source-profile} to destination [overwrite]
Context 
config>system>security
Description 

This command copies the specified user or profile configuration parameters to another (destination) user or profile.

The password is set to the return key and a new password at login must be selected.

Parameters 
source-user—
the user to copy from. The user must already exist.
source-profile—
the profile to copy from. The profile must already exist.
destination—
the destination user or profile
overwrite—
specifies that the destination user or profile configuration will be overwritten with the copied source user or profile configuration. A configuration will not be overwritten if the overwrite command is not specified.

ftp-server

Syntax 
[no] ftp-server
Context 
config>system>security
Description 

This command enables FTP servers running on the system.

FTP servers are disabled by default. At system startup, only SSH servers are enabled.

The no form of the command disables FTP servers running on the system.

Default 

no ftp-server

hash-control

Syntax 
hash-control [read-version {1 | 2 | all}] [write-version {1 | 2}]
no hash-control
Context 
config>system>security
Description 

Whenever the user executes a save or info command, the system will encrypt all passwords, keys, and so on for security reasons. At present, two algorithms exist.

The first algorithm is a simple, short key that can be copied and pasted in a different location when the user wants to configure the same password. However, because it is the same password and the hash key is limited to the password/key, it is obvious that it is the same key.

The second algorithm is a more complex key, and cannot be copied and pasted in different locations in the configuration file. In this case, if the same key or password is used repeatedly in different contexts, each encrypted (hashed) version will be different.

Default 

all — read-version set to accept both versions 1 and 2

Parameters 
read-version {1 | 2 | all}—
when the read-version is configured as “all,” both versions 1 and 2 will be accepted by the system. Otherwise, only the selected version will be accepted when reading configuration or exec files. The presence of incorrect hash versions will abort the script/startup.
write-version {1 | 2}—
selects the hash version that will be used the next time the configuration file is saved (or an info command is executed). Be careful to save the read and write version correctly, so that the file can be properly processed after the next reboot or exec.

source-address

Syntax 
source-address
Context 
config>system>security
Description 

This command specifies the source address that should be used in all unsolicited packets sent by the application.

application

Syntax 
application app [ip-int-name | ip-address]
no application app
Context 
config>system>security>source-address
Description 

This command specifies the application to use the source IPv4 address specified by the source-address command.

The no form of the command removes the specified source address from the application, causing the application to use the system IP address as the source address.

Parameters 
app—
specifies the application name
Values—
telnet, ftp, ssh, radius, tacplus, snmptrap, syslog, ping, traceroute, dns, sntp, ntp
ip-int-name | ip-address—
specifies the name of the IP interface or IPv4 address. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

application6

Syntax 
application app ipv6-address
no application app
Context 
config>system>security>source-address
Description 

This command specifies the application to use the source IPv6 address specified by the source-address command.

The no form of the command removes the specified source address from the application, causing the application to use the system IP address as the source address.

Parameters 
app—
specifies the application name
Values—
telnet, ftp, radius, tacplus, snmptrap, syslog, ping, traceroute, dns
ipv6-address—
specifies the IPv6 address

telnet-server

Syntax 
[no] telnet-server
Context 
config>system>security
Description 

This command enables Telnet servers running on the system.

Telnet servers are off by default. At system startup, only SSH servers are enabled.

Telnet servers in 7705 SAR networks limit a Telnet client to three retries to log in. The Telnet server disconnects the Telnet client session after three retries.

The no form of the command disables Telnet servers running on the system.

Default 

no telnet-server

telnet6-server

Syntax 
[no] telnet6-server
Context 
config>system>security
Description 

This command enables Telnet IPv6 servers running on the system.

Telnet servers are off by default. At system startup, only SSH servers are enabled.

Telnet servers in 7705 SAR networks limit a Telnet client to three retries to log in. The Telnet server disconnects the Telnet client session after three retries.

The no form of the command disables Telnet servers running on the system.

Default 

no telnet6-server

vprn-network-exceptions

Syntax 
vprn-network-exceptions [number seconds]
no vprn-network-exceptions
Context 
config>system>security
Description 

This command configures the rate at which the 7705 SAR sends ICMP replies to a source IP address in response to TTL expiry IP packets that have been received for all VPRN instances in the system and from all network IP interfaces. Packets include labeled user packets as well as ping and traceroute packets within a VPRN.

This command does not apply to MPLS packets or service OAM packets such as VPRN ping and trace, LSP ping and trace, and VCC ping and trace.

When the command is issued without any number and seconds parameters specified, the default rate is 100 ICMP reply packets sent per 10 seconds. The no form of the command disables the rate-limiting of ICMP replies.

Default 

no vprn-network-exceptions

Parameters 
number—
specifies the maximum number of ICMP reply messages that can be sent within the configured number of seconds
Values—
10 to 1000
seconds—
specifies the time frame in which the configured number of ICMP reply messages can be sent
Values—
1 to 60

Management Access Filter Commands

management-access-filter

Syntax 
[no] management-access-filter
Context 
config>system>security
Description 

This command creates the context to edit management access filters and to reset match criteria.

Management access filters control all traffic in and out of the CSM. They can be used to restrict management of the 7705 SAR by other nodes outside either specific (sub)networks or through designated ports.

Management filters, as opposed to other traffic filters, are enforced by system software.

The no form of the command removes management access filters from the configuration.

Default 

n/a

ip-filter

Syntax 
ip-filter
Context 
config>system>security>management-access-filter
Description 

This command creates the context to configure IP filter commands.

ipv6-filter

Syntax 
ipv6-filter
Context 
config>system>security>management-access-filter
Description 

This command creates the context to configure IPv6 filter commands.

default-action

Syntax 
default-action {permit | deny | deny-host-unreachable}
Context 
config>system>security>management-access-filter>ip-filter
config>system>security>management-access-filter>ipv6-filter
Description 

This command creates the default action for management access in the absence of a specific management access filter match.

The default-action is applied to a packet that does not satisfy any match criteria in any of the management access filters. Whenever management access filters are configured, the default-action must be defined.

Default 

n/a

Parameters 
permit—
specifies that packets not matching the configured selection criteria in any of the filter entries will be permitted
deny—
specifies that packets not matching the selection criteria will be denied
deny-host-unreachable—
specifies that packets not matching the selection criteria will be denied and a host unreachable message will be issued

entry

Syntax 
[no] entry
Context 
config>system>security>management-access-filter>ip-filter
config>system>security>management-access-filter>ipv6-filter
Description 

This command is used to create or edit a management access filter entry. Multiple entries can be created with unique entry-id numbers. The 7705 SAR exits the filter upon the first match found and executes the actions according to the respective action command. For this reason, entries must be sequenced correctly from most to least explicit.

An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action defined to be considered complete. Entries without the action keyword are considered incomplete and inactive.

The no form of the command removes the specified entry from the management access filter.

Default 

n/a

Parameters 
entry-id—
an entry ID uniquely identifies a match criteria and the corresponding action. It is recommended that entries be numbered in staggered increments. This allows users to insert a new entry in an existing policy without having to renumber the existing entries.
Values—
1 to 9999

action

Syntax 
action {permit | deny | deny-host-unreachable}
no action
Context 
config>system>security>management-access-filter>ip-filter>entry
config>system>security>management-access-filter>ipv6-filter>entry
Description 

This command creates the action associated with the management access filter match criteria entry.

The action keyword is required. If no action is defined, the filter is ignored. If multiple action statements are configured, the last one overwrites previous configured actions.

If the packet does not meet any of the match criteria, the configured default action is applied.

Default 

n/a

Parameters 
permit—
specifies that packets matching the configured criteria will be permitted
deny—
specifies that packets not matching the selection criteria will be denied
deny-host-unreachable—
specifies that packets not matching the selection criteria will be denied and a host unreachable message will be issued

dst-port

Syntax 
dst-port port [mask]
no dst-port
Context 
config>system>security>management-access-filter>ip-filter>entry
config>system>security>management-access-filter>ipv6-filter>entry
Description 

This command configures a destination TCP or UDP port number or port range for a management access filter match criterion.

The no form of the command removes the destination port match criterion.

Default 

n/a

Parameters 
port—
the source TCP or UDP port number as match criteria
Values—
1 to 65535 (decimal)
mask—
mask used to specify a range of destination port numbers as the match criterion

This 16-bit mask can be configured using the formats in Table 4.

Table 4:  16-bit Mask Formats  

Format Style

Format Syntax

Example

Decimal

DDDDD

63488

Hexadecimal

0xHHHH

0xF800

Binary

0bBBBBBBBBBBBBBBBB

0b1111100000000000

For example, to select a range from 1024 up to 2047, specify 1024 0xFC00 for value and mask.

Values—
1 to 65535 (decimal)
Values—
65535 (exact match)

flow-label

Syntax 
flow-label value
no flow-label
Context 
config>system>security>management-access-filter>ipv6-filter>entry
Description 

This command configures flow label match conditions for a management access filter match criterion. Flow labeling enables the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default QoS or real-time service.

This command applies to IPv6 filters only.

Parameters 
value—
the flow identifier in an IPv6 packet header that can be used to discriminate traffic flows (see RFC 3595, Textual Conventions for IPv6 Flow Label)
Values—
0 to 1048575

log

Syntax 
[no] log
Context 
config>system>security>management-access-filter>ip-filter>entry
config>system>security>management-access-filter>ipv6-filter>entry
Description 

This command enables match logging.

The no form of this command disables match logging.

Default 

no log

next-header

Syntax 
[no] next-header next-header
Context 
config>system>security>management-access-filter>ipv6-filter>entry
Description 

This command specifies the next header to match as a management access filter match criterion.

This command applies to IPv6 filters only.

Parameters 
next-header—
the IPv6 next header to match. This parameter is similar to the protocol parameter used in IPv4 filter match criteria.
Values—
[1 to 42 | 45 to 49 | 52 to 59 | 61 to 255] — (values can be expressed in decimal, hexadecimal, or binary – DHB)
keywords: none, crtp, crudp, egp, eigrp, encap, ether-ip, gre, icmp, idrp, igmp, igp, ip, ipv6, ipv6-frag, ipv6-icmp, ipv6-no-nxt, isis, iso-ip, l2tp, ospf-igp, pim, pnni, ptp, rdp, rsvp, stp, tcp, udp, vrrp
* — udp/tcp wildcard

protocol

Syntax 
[no] protocol protocol-id
Context 
config>system>security>management-access-filter>ip-filter>entry
Description 

This command configures an IP protocol type to be used as a management access filter match criterion.

The protocol type is identified by its respective protocol number. Well-known protocol numbers include ICMP (1), TCP (6), and UDP (17).

This command applies to IPv4 filters only.

The no form of the command removes the protocol from the match criteria.

Default 

n/a

Parameters 
protocol-id—
the protocol number for the match criterion
Values—
1 to 255 (decimal)

router

Syntax 
router router-instance
no router
Context 
config>system>security>management-access-filter>ip-filter>entry
config>system>security>management-access-filter>ipv6-filter>entry
Description 

This command configures a router name or service ID to be used as a management access filter match criterion.

The no form of the command removes the router name or service ID from the match criteria.

Parameters 
router-instance—
specifies one of the following parameters for the router instance:

router-name — specifies a router name up to 32 characters to be used in the match criteria

service-id — specifies an existing service ID to be used in the match criteria

Values—
1 to 2147483647

src-ip

Syntax 
src-ip {ip-prefix/mask | ip-prefix netmask}
no src-ip
Context 
config>system>security>management-access-filter>ip-filter>entry
Description 

This command configures a source IPv4 address range to be used as a management access filter match criterion.

To match on the source IP address, specify the address and the associated mask (for example, 10.1.0.0/16). The conventional notation of 10.1.0.0 255.255.0.0 can also be used.

The no form of the command removes the source IP address match criterion.

Default 

n/a

Parameters 
ip-prefix —
the IP prefix for the IP match criterion in dotted-decimal notation
mask—
the subnet mask length expressed as a decimal integer
Values—
0.0.0.0 to 255.255.255.255 (IP prefix), 1 to 32 (mask length)
netmask—
the subnet mask in dotted-decimal notation
Values—
a.b.c.d (network bits all 1 and host bits all 0)

src-ip

Syntax 
src-ip ipv6-address/prefix-length
no src-ip
Context 
config>system>security>management-access-filter>ipv6-filter>entry
Description 

This command configures a source IPv6 address range to be used as an management access filter match criterion.

To match on the source IP address, specify the address and prefix length; for example, 11::12/128.

The no form of the command removes the source IP address match criterion.

Default 

n/a

Parameters 
ipv6-address/prefix-length—
the IPv6 address on the interface
Values—
ipv6-address         x:x:x:x:x:x:x:x (eight 16-bit pieces)
                             x:x:x:x:x:x:d.d.d.d
                             x:   [0 to FFFF]H
                             d:   [0 to 255]D
prefix-length :       1 to 128

src-port

Syntax 
src-port {port-id | cpm}
no src-port
Context 
config>system>security>management-access-filter>ip-filter>entry
config>system>security>management-access-filter>ipv6-filter>entry
Description 

This command restricts ingress management traffic to either the CSM Ethernet port or any other logical port (port or channel) on the device.

When the source interface is configured, only management traffic arriving on those ports satisfy the match criteria.

The no form of the command reverts to the default value.

Default 

any interface

Parameters 
port-id—
the port ID
Values—
port-id: slot/mda/port[.channel]
                       bundle-id:          bundle-type-slot/mda.bundle-num
                                     bundle:            keyword
                                     type:                ima | ppp
                                     bundle-num:    1 to 32
cpm—
specifies that ingress management traffic is restricted to the CSM Ethernet port

renum

Syntax 
renum old-entry-number new-entry-number
Context 
config>system>security>management-access-filter>ip-filter
config>system>security>management-access-filter>ipv6-filter
Description 

This command renumbers existing management access filter entries to resequence filter entries.

The 7705 SAR exits on the first match found and executes the actions in accordance with the accompanying action command. This may require some entries to be renumbered from most to least explicit.

Parameters 
old-entry-number—
the entry number of the existing entry
Values—
1 to 9999
new-entry-number—
the new entry number that will replace the old entry number
Values—
1 to 9999

CPM Filter Commands

cpm-filter

Syntax 
[no] cpm-filter
Context 
config>system>security
Description 

This command enables the context to configure a CPM (referred to as CSM on the 7705 SAR) filter. A CPM filter is a hardware filter (that is, implemented on the network processor) for the CSM-destined traffic that applies to all the traffic destined for the CSM CPU. It can be used to drop or accept packets, as well as allocate dedicated hardware queues for the traffic. The hardware queues are not user-configurable.

The no form of the command disables the CPM filter.

default-action

Syntax 
default-action {accept | drop}
Context 
config>system>security>cpm-filter
Description 

This command specifies the action to be applied to packets when the packets do not match the specified criteria in all of the IP filter entries of the filter. If there are no filter entries defined, the packets received will either be accepted or dropped based on that default action.

Default 

accept

Parameters 
accept—
packets are accepted unless there is a specific filter entry that causes the packet to be dropped
drop—
packets are dropped unless there is a specific filter entry that causes the packet to be accepted

ip-filter

Syntax 
ip-filter
Context 
config>system>security>cpm-filter
Description 

This command enables the context to configure IPv4 CPM filter parameters.

ipv6-filter

Syntax 
ipv6-filter
Context 
config>system>security>cpm-filter
Description 

This command enables the context to configure IPv6 CPM filter parameters.

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>system>security>cpm-filter>ip-filter
config>system>security>cpm-filter>ipv6-filter
Description 

This command specifies a particular CPM filter match entry. Every CPM filter must have at least one filter match entry. A filter entry with no match criteria set will match every packet, and the entry action will be taken.

The create keyword must be used with every new entry configured. Once the entry has been created, you can navigate to the entry context without using the create keyword.

All IPv4 filter entries can specify one or more matching criteria. There are no range-based restrictions on any IPv4 filter entries.

For IPv6 filters, the combined number of fields for all entries in a filter must not exceed 16 fields (or 256 bits), where a field contains the bit representation of the matching criteria.

Parameters 
entry-id—
identifies a CPM filter entry as configured on this system.
Values—
1 to 64

action

Syntax 
action {accept | drop}
no action
Context 
config>system>security>cpm-filter>ip-filter>entry
config>system>security>cpm-filter>ipv6-filter>entry
Description 

This command specifies the action to take for packets that match this filter entry.

Default 

drop

Parameters 
accept—
 packets matching the entry criteria will be forwarded
drop—
packets matching the entry criteria will be dropped

log

Syntax 
log log-id
no log
Context 
config>system>security>cpm-filter>ip-filter>entry
config>system>security>cpm-filter>ipv6-filter>entry
Description 

This command specifies the log in which packets matching this entry should be entered. The value 0 indicates that logging is disabled.

The no form of the command deletes the log ID.

Parameters 
log-id—
the log ID where packets matching this entry should be entered
Values—
101 to 199

match

Syntax 
match [protocol protocol-id]
no match
Context 
config>system>security>cpm-filter>ip-filter>entry
Description 

This command enables the context to enter match criteria for the IPv4 filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.

If more than one match criterion (within one match statement) is configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.

A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.

The no form of the command removes the match criteria for the entry-id.

Parameters 
protocol—
configures an IP protocol to be used as an IP filter match criterion. The protocol type such as TCP or UDP is identified by its respective protocol number.
protocol-id—
configures the decimal value representing the IP protocol to be used as an IP filter match criterion. Common protocol numbers include ICMP(1), TCP(6), UDP(17). The no form of the command removes the protocol from the match criteria. See Table 5 for the protocol IDs and descriptions for the IP protocols.
Values—
0 to 255 (values can be expressed in decimal,  hexadecimal, or binary – DHB)
keywords - none, crtp, crudp, egp, eigrp, encap, ether-ip,  gre, icmp, idrp, igmp, igp, ip, ipv6, ipv6-frag, ipv6-icmp,  ipv6-no-nxt, ipv6-opts, ipv6-route, isis, iso-ip, l2tp,  ospf-igp, pim, pnni, ptp, rdp, rsvp, stp, tcp, udp, vrrp
* — udp/tcp wildcard
Table 5:  IP Protocol IDs and Descriptions   

Protocol ID

Protocol

Description

1

icmp

Internet Control Message       

2

igmp

Internet Group Management

4

ip

IP in IP (encapsulation)

6

tcp

Transmission Control

8

egp

Exterior Gateway Protocol

9

igp

Any private interior gateway

17

udp

User Datagram

27

rdp

Reliable Data Protocol

41

ipv6

IPv6

43

ipv6-route

Routing Header for IPv6

44

ipv6-frag

Fragment Header for IPv6

45

idrp

Inter-Domain Routing Protocol

46

rsvp

Reservation Protocol

47

gre

General Routing Encapsulation

58

ipv6-icmp

ICMP for IPv6

59

ipv6-no-nxt

No Next Header for IPv6

60

ipv6-opts

Destination Options for IPv6

80

iso-ip

ISO Internet Protocol

88

eigrp

EIGRP

89

ospf-igp

OSPFIGP

97

ether-ip

Ethernet-within-IP Encapsulation

98

encap

Encapsulation Header

102

pnni

PNNI over IP

103

pim

Protocol Independent Multicast

112

vrrp

Virtual Router Redundancy Protocol

115

l2tp

Layer Two Tunneling Protocol

118

stp

Schedule Transfer Protocol

123

ptp

Performance Transparency Protocol

124

isis

ISIS over IPv4

126

crtp

Combat Radio Transport Protocol

127

crudp

Combat Radio User Datagram

match

Syntax 
match [next-header next-header]
no match
Context 
config>system>security>cpm-filter>ipv6-filter>entry
Description 

This command enables the context to enter match criteria for the IPv6 filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.

If more than one match criterion (within one match statement) is configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.

A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.

The no form of the command removes the match criteria for the entry-id.

Parameters 
next-header—
the IPv6 next header to match. This parameter is similar to the protocol parameter used in IPv4 filter match criteria.
Values—
[1 to 42 | 45 to 49 | 52 to 59 | 61 to 255] — (values can be expressed in decimal, hexadecimal, or binary – DHB)
keywords: none, crtp, crudp, egp, eigrp, encap, ether-ip, gre, icmp, idrp, igmp, igp, ip, ipv6, ipv6-icmp, ipv6-no-nxt, isis, iso-ip, l2tp, ospf-igp, pim, pnni, ptp, rdp, rsvp, stp, tcp, udp, vrrp
* — udp/tcp wildcard

dscp

Syntax 
dscp dscp-name
no dscp
Context 
config>system>security>cpm-filter>ip-filter>entry>match
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command configures a DiffServ Code Point (DSCP) name to be used as an IP filter match criterion.

The no form of the command removes the DSCP match criterion.

Default 

no dscp

Parameters 
dscp-name—
 a DSCP name that has been previously mapped to a value using the dscp-name command. The DiffServ Code Point may only be specified by its name.
Values—
be|cp1|cp2|cp3|cp4|cp5|cp6|cp7|cs1|cp9|af11|cp11|
af12|cp13|af13|cp15|cs2|cp17|af21|cp19|af22|cp21|
af23|cp23|cs3|cp25|af31|cp27|af32|cp29|af33|cp31|cs4|
cp33|af41|cp35|af42|cp37|af43|cp39|cs5|cp41|cp42|
cp43|cp44|cp45|ef|cp47|nc1|cp49|cp50|cp51|cp52|cp53|
cp54|cp55|nc2|cp57|cp58|cp59|cp60|cp61|cp62|cp63

dst-ip

Syntax 
dst-ip {ip-address/mask | ip-address netmask}
no dst-ip
Context 
config>system>security>cpm-filter>ip-filter>entry>match
Description 

This command configures a destination IPv4 address range to be used as an IP filter match criterion.

To match on the destination IP address, specify the address and its associated mask; for example, 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.

The no form of the command removes the destination IP address match criterion.

Default 

no dst-ip

Parameters 
ip-address—
 the IP prefix for the IP match criterion in dotted-decimal notation
Values—
0.0.0.0 to 255.255.255.255
mask—
the subnet mask length expressed as a decimal integer
Values—
1 to 32
netmask—
the dotted-decimal equivalent of the mask length
Values—
0.0.0.0 to 255.255.255.255

dst-ip

Syntax 
dst-ip ipv6-address/prefix-length
no dst-ip
Context 
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command configures a destination IPv6 address range to be used as an IP filter match criterion.

To match on the destination IP address, specify the address and prefix length; for example, 11::12/128.

The no form of the command removes the destination IP address match criterion.

Default 

n/a

Parameters 
ipv6-address/prefix-length—
the IPv6 address on the interface
Values—
ipv6-address : x:x:x:x:x:x:x:x (eight 16-bit pieces)
                              x:x:x:x:x:x:d.d.d.d
                              x:   [0 to FFFF]H
                              d:   [0 to 255]D
prefix-length 1 to 128

dst-port

Syntax 
dst-port tcp/udp port-number [mask]
no dst-port
Context 
config>system>security>cpm-filter>ip-filter>entry>match
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command specifies the TCP/UDP port to match the destination port of the packet.

The no form of the command removes the destination port match criterion.

The TCP or UDP protocol must be configured using the match command before this filter can be configured.

Parameters 
tcp/udp port-number—
the destination port number to be used as a match criterion
Values—
0 to 65535 (accepted in decimal, hexadecimal, or binary format)
mask
the 16-bit mask to be applied when matching the destination port

fragment

Syntax 
fragment {true | false}
no fragment
Context 
config>system>security>cpm-filter>ip-filter>entry>match
Description 

This command configures fragmented or non-fragmented IP packets as an IP filter match criterion.

The no form of the command removes the match criterion.

This command applies to IPv4 filters only.

Default 

false

Parameters 
true—
configures a match on all fragmented IP packets. A match will occur for all packets that have either the MF (more fragment) bit set or have the Fragment Offset field of the IP header set to a non-zero value.
false—
configures a match on all non-fragmented IP packets. Non-fragmented IP packets are packets that have the MF bit set to zero and have the Fragment Offset field also set to zero.

icmp-code

Syntax 
icmp-code icmp-code
no icmp-code
Context 
config>system>security>cpm-filter>ip-filter>entry>match
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command configures matching on an ICMP code field in the ICMP header of an IP packet as an IP filter match criterion.

The ICMP protocol must be configured using the match command before this filter can be configured.

The no form of the command removes the criterion from the match entry.

Default 

no icmp-code

Parameters 
icmp-code—
specifies the ICMP code values that must be present to match
Values—
0 to 255 (values can be expressed in decimal,  hexadecimal, or binary – DHB)
keywords - none | network-unreachable | host-unreachable | protocol-unreachable | port-unreachable | fragmentation-needed  | dest-network-unknown | dest-host-unknown

icmp-type

Syntax 
icmp-type icmp-type
no icmp-type
Context 
config>system>security>cpm-filter>ip-filter>entry>match
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command configures matching on an ICMP type field in the ICMP header of an IP packet as an IP filter match criterion.

The ICMP protocol must be configured using the match command before this filter can be configured.

The no form of the command removes the criterion from the match entry.

Default 

no icmp-type

Parameters 
icmp-type—
specifies the ICMP type values that must be present to match
Values—
0 to 255 (values can be expressed in decimal,  hexadecimal, or binary – DHB)
keywords - none | echo-reply | dest-unreachable  | echo-request | time-exceeded | parameter-problem

ip-option

Syntax 
ip-option ip-option-value [ip-option-mask]
no ip-option
Context 
config>system>security>cpm-filter>ip-filter>entry>match
Description 

This command configures matching packets with a specific IP option or a range of IP options in the IP header as an IP filter match criterion.

The option type octet contains 3 fields:

  1. 1 bit copied flag (copy options in all fragments)
  2. 2 bits option class
  3. 5 bits option number

The no form of the command removes the match criterion.

This command applies to IPv4 filters only.

Default 

no ip-option

Parameters 
ip-option-value—
 the 8-bit option type (can be entered using decimal, hexadecimal, or binary formats). The mask is applied as an AND to the option byte and the result is compared with the option value.

The decimal value entered for the match should be a combined value of the 8-bit option type field and not just the option number. Therefore, to match on IP packets that contain the Router Alert option (option number = 20), enter the option type of 148 (10010100).

Values—
0 to 255
ip-option-mask—
specifies a range of option numbers to use as the match criteria

This 8-bit mask can be entered using decimal, hexadecimal, or binary formats as shown in Table 6.

Table 6:  IP Option Formats  

Format Style

Format Syntax

Example

Decimal

DDD

20

Hexadecimal

0xHH

0x14

Binary

0bBBBBBBBB

0b0010100

Values—
0 to 255
Values—
255 (decimal) (exact match)

multiple-option

Syntax 
multiple-option {true | false}
no multiple-option
Context 
config>system>security>cpm-filter>ip-filter>entry>match
Description 

This command configures matching packets that contain more than one option field in the IP header as an IP filter match criterion.

The no form of the command removes the checking of the number of option fields in the IP header as a match criterion.

This command applies to IPv4 filters only.

Default 

no multiple-option

Parameters 
­true—
specifies matching on IP packets that contain more than one option field in the header
false—
specifies matching on IP packets that do not contain multiple option fields in the header

option-present

Syntax 
option-present {true | false}
no option-present
Context 
config>system>security>cpm-filter>ip-filter>entry>match
Description 

This command configures matching packets that contain the option field or have an option field of 0 in the IP header as an IP filter match criterion.

The no form of the command removes the checking of the option field in the IP header as a match criterion.

This command applies to IPv4 filters only.

Parameters 
true—
specifies matching on all IP packets that contain the option field in the header. A match will occur for all packets that have the option field present. An option field of 0 is considered as no option present.
false—
specifies matching on IP packets that do not have any option field present in the IP header (an option field of 0)

src-ip

Syntax 
src-ip {ip-address/mask | ip-address netmask}
no src-ip
Context 
config>system>security>cpm-filter>ip-filter>entry>match
Description 

This command specifies the IPv4 address to match the source IP address of the packet.

To match on the source IP address, specify the address and its associated mask; for example, 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.

The no form of the command removes the source IP address match criterion.

Default 

no src-ip

Parameters 
ip-address—
 the IP prefix for the IP match criterion in dotted-decimal notation
Values—
0.0.0.0 to 255.255.255.255
mask—
the subnet mask length expressed as a decimal integer
Values—
1 to 32
netmask—
the dotted-decimal equivalent of the mask length
Values—
0.0.0.0 to 255.255.255.255

src-ip

Syntax 
src-ip ipv6-address/prefix-length
no src-ip
Context 
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command configures a source IPv6 address range to be used as an IP filter match criterion.

To match on the source IP address, specify the address and prefix length; for example, 11::12/128.

The no form of the command removes the source IP address match criterion.

Default 

n/a

Parameters 
ipv6-address/prefix-length—
the IPv6 address on the interface
Values—
ipv6-address x:x:x:x:x:x:x:x (eight 16-bit pieces)
                              x:x:x:x:x:x:d.d.d.d
                              x:   [0 to FFFF]H
                              d:   [0 to 255]D
prefix-length 1 to 128

src-port

Syntax 
src-port src-port-number [mask]
no src-port
Context 
config>system>security>cpm-filter>ip-filter>entry>match
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command specifies the TCP/UDP port to match the source port of the packet.

Default 

no src-port

Parameters 
src-port-number—
the source port number to be used as a match criterion
Values—
0 to 65535 (accepted in decimal, hexadecimal, or binary format)
mask
the 16-bit mask to be applied when matching the destination port

tcp-ack

Syntax 
tcp-ack {true | false}
no tcp-ack
Context 
config>system>security>cpm-filter>ip-filter>entry>match
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command configures matching on the ACK bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-ack

Parameters 
true—
specifies matching on IP packets that have the ACK bit set in the control bits of the TCP header of an IP packet
false—
specifies matching on IP packets that do not have the ACK bit set in the control bits of the TCP header of the IP packet

tcp-syn

Syntax 
tcp-syn {true | false}
no tcp-syn
Context 
config>system>security>cpm-filter>ip-filter>entry>match
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command configures matching on the SYN bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion.

The SYN bit is normally set when the source of the packet wants to initiate a TCP session with the specified destination IP address.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-syn

Parameters 
true—
specifies matching on IP packets that have the SYN bit set in the control bits of the TCP header
false—
specifies matching on IP packets that do not have the SYN bit set in the control bits of the TCP header

renum

Syntax 
renum old-entry-id new-entry-id
Context 
config>system>security>cpm-filter>ip-filter
config>system>security>cpm-filter>ipv6-filter
Description 

This command renumbers existing IP filter entries in order to resequence filter entries.

Resequencing may be required in some cases because the OS exits when the first match is found and executes the actions according to the accompanying action command. This requires that entries be sequenced correctly from most to least explicit.

Parameters 
old-entry-id—
the entry number of an existing entry
Values—
1 to 64
where: 1 to 29 are filter entries
            30 to 64 are extended filter entries
new-entry-id—
the new entry number to be assigned to the old entry
Values—
1 to 64
where: 1 to 29 are filter entries
            30 to 64 are extended filter entries

Global Password Commands

enable-admin

Syntax 
enable-admin
Context 
<global>
Description 
Note:

See the description for the admin-password command. If the admin-password is configured in the config>system>security>password context, then any user can enter the special administrative mode by entering the enable-admin command.

The enable-admin command is in the default profile. By default, all users are given access to this command.

Once the enable-admin command is entered, the user is prompted for a password. If the password matches, the user is given unrestricted access to all the commands.

There are two ways to verify that a user is in the enable-admin mode:

  1. enter the show users command — the Administrator can see which users are in this mode
  2. enter the enable-admin command again at the root prompt and an error message will be returned
A:ALU-1# show users
===============================================================================
User           Type    Login time                                Idle time
  From
===============================================================================
admin         Console   10AUG2006 13:55:24                       0d 19:42:22
  --
admin         Telnet    09AUG2006 08:35:23                       0d 00:00:00 A
  10.20.30.93
-------------------------------------------------------------------------------
Number of users : 2
'A' indicates user is in admin mode
===============================================================================
A:ALU-1#
A:ALU-1# enable-admin
MINOR: CLI Already in admin mode.
A:ALU-1#

Password Commands

password

Syntax 
password
Context 
config>system>security
Description 

This command creates the context to configure password management parameters.

admin-password

Syntax 
admin-password password [hash | hash2]
no admin-password
Context 
config>system>security>password
Description 

This command allows a user (with admin permissions) to configure a password which enables a user to become an administrator.

This password is valid only for one session. When enabled, no authorization to TACACS+ or RADIUS is performed and the user is locally regarded as an admin user.

Note:

See the description for the enable-admin command. If the admin-password is configured in the config>system>security>password context, then any user can enter the admin mode by entering the enable-admin command and the correct admin password.

The minimum length of the password is determined by the minimum-length command. The complexity requirements for the password are determined by the complexity command.

Note:

The password argument of this command is not sent to the servers. This is consistent with other commands that configure secrets. User names and passwords in the FTP and TFTP URLs will not be sent to the authorization or accounting servers when the file>copy source-url dest-url command is executed.

For example:

file copy ftp://test:secret@131.12.31.79/test/srcfile cf3:\destfile

In this example, the user name “test” and password “secret” will not be sent to the AAA servers (or to any logs). They will be replaced with “****”.

The no form of the command removes the admin password from the configuration.

Default 

no admin-password

Parameters 
password —
configures the password that enables a user to become a system administrator. The maximum length can be up to 20 characters if unhashed, 32 characters if hashed, and 54 characters if the hash2 keyword is specified.
hash —
specifies that the key is entered and stored on the node in encrypted form
hash2 —
specifies that the key is entered and stored on the node in a more complex encrypted form
Note:

If neither the hash nor hash2 keyword is specified, the key is entered in clear text. However, for security purposes, the key is stored on the node using hash encryption.

aging

Syntax 
aging days
no aging
Context 
config>system>security>password
Description 

This command configures the number of days a user password is valid before the user must change their password.

The no form of the command reverts to the default value.

Default 

no aging is enforced

Parameters 
days—
the maximum number of days the password is valid
Values—
1 to 500

attempts

Syntax 
attempts count [time minutes1] [lockout minutes2]
no attempts
Context 
config>system>security>password
Description 

This command configures a threshold value of unsuccessful login attempts allowed in a specified time frame.

If the threshold is exceeded, the user is locked out for a specified time period.

If multiple attempts commands are entered, each command overwrites the previously entered command.

The no attempts command resets all values to the default.

Default 

count: 3 minutes1: 5 minutes2: 10

Parameters 
count—
the number of unsuccessful login attempts allowed for the specified time. This is a mandatory value that must be explicitly entered.
Values—
1 to 64
minutes1—
the period of time, in minutes, that a specified number of unsuccessful attempts can be made before the user is locked out
Values—
0 to 60
minutes2—
the lockout period, in minutes, where the user is not allowed to log in
Values—
0 to 1440
When the user exceeds the attempted count times in the specified time, then that user is locked out from any further login attempts for the configured time period.

authentication-order

Syntax 
authentication-order [method-1] [method-2] [method-3] [exit-on-reject]
no authentication-order
Context 
config>system>security>password
Description 

This command configures the sequence in which password authentication, authorization, and accounting is attempted among RADIUS, TACACS+, and local passwords.

The order should be from the most preferred authentication method to the least preferred. The presence of all methods in the command line does not guarantee that they are all operational. Specifying options that are not available delays user authentication.

If all (operational) methods are attempted and no authentication for a particular login has been granted, then an entry in the security log registers the failed attempt. Both the attempted login identification and originating IP address are logged with a timestamp.

The no form of the command reverts to the default authentication sequence.

Default 

authentication-order radius tacplus local

Parameters 
method-1—
the first password authentication method to attempt
Values—
radius, tacplus, local
Values—
radius
method-2—
the second password authentication method to attempt
Values—
radius, tacplus, local
Values—
tacplus
method-3—
the third password authentication method to attempt
Values—
radius, tacplus, local
Values—
local
radius—
RADIUS authentication
tacplus—
TACACS+ authentication
local—
password authentication based on the local password database
exit-on-reject—
when enabled, and if one of the AAA methods configured in the authentication order sends a reject, then the next method in the order will not be tried. If the exit-on-reject keyword is not specified and one AAA method sends a reject, the next AAA method will be attempted. If in this process all the AAA methods are exhausted, it will be considered a reject.

Note that a rejection is distinct from an unreachable authentication server. When the exit-on-reject keyword is specified, authorization and accounting will only use the method that provided an affirmation authentication; only if that method is no longer readable or is removed from the configuration will other configured methods be attempted. If the local keyword is the first authentication and:

  1. exit-on-reject is configured and the user does not exist, the user will not be authenticated
  2. the user is authenticated locally, then other methods, if configured, will be used for authorization and accounting
  3. the user is configured locally but without console access, login will be denied

complexity

Syntax 
[no] complexity [numeric] [special-character] [mixed-case]
Context 
config>system>security>password
Description 

This command configures the complexity requirements of locally administered passwords, HMAC-MD5-96, HMAC-SHA-96, and des-keys configured in the config>system>security>user user-name >snmp>authentication context.

If more than one complexity command is entered, each command overwrites the previous command.

The no form of the command cancels all requirements. To remove a single requirement, enter the no form of the command followed by the requirement that needs to be removed (for example, no complexity numeric).

Default 

no complexity requirements are configured

Parameters 
mixed-case—
specifies that at least one uppercase and one lowercase character must be present in the password. This keyword can be used in conjunction with the numeric and special-character parameters. However, if this command is used with the authentication none command, the complexity command is rejected.
numeric—
specifies that at least one numeric character must be present in the password. This keyword can be used in conjunction with the mixed-case and special-character parameters. However, if this command is used with the authentication none command, the complexity command is rejected.
special-character—
specifies that at least one special character must be present in the password. This keyword can be used in conjunction with the numeric and mixed-case parameters. However, if this command is used with the authentication none command, the complexity command is rejected.

Special characters include: ~!@#$%^&*()_+|{}:”<>?`-=\[];’,./.

health-check

Syntax 
[no] health-check
Context 
config>system>security>password
Description 

This command specifies that RADIUS and TACACS+ servers are monitored for 3 seconds each at 30-second intervals. Servers that are not configured will have 3 seconds of idle time. If in this process a server is found to be unreachable, or a previously unreachable server starts responding, depending on the type of server, a trap will be sent.

The no form of the command disables the periodic monitoring of the RADIUS and TACACS+ servers. In this case, the operational status for the active server will be up if the last access was successful.

Default 

health-check

minimum-length

Syntax 
minimum-length value
no minimum-length
Context 
config>system>security>password
Description 

This command configures the minimum number of characters required for locally administered passwords, HMAC-MD5-96, HMAC-SHA-96, and des-keys configured in the config>system>security context.

If multiple minimum-length commands are entered, each command overwrites the previously entered command.

The no form of the command reverts to the default value.

Default 

minimum-length 6

Parameters 
value—
the minimum number of characters required for a password
Values—
1 to 8

Profile Management Commands

profile

Syntax 
[no] profile user-profile-name
Context 
config>system>security
Description 

This command creates a context to create user profiles for CLI command tree permissions.

Profiles are used to either deny or permit user console access to a hierarchical branch or to specific commands.

Once the profiles are created, the user command assigns users to one or more profiles. You can define up to 16 user profiles, but a maximum of 8 profiles can be assigned to a user.

The no form of the command deletes a user profile.

Default 

user-profile default

Parameters 
user-profile-name—
the user profile name entered as a character string. The string is case-sensitive and limited to 32 ASCII 7-bit printable characters with no spaces.

default-action

Syntax 
default-action {deny-all | permit-all | none}
Context 
config>system>security>profile
Description 

This command specifies the default action to be applied when no match conditions are met.

Default 

none

Parameters 
deny-all—
sets the default of the profile to deny access to all commands
permit-all—
sets the default of the profile to permit access to all commands
Note:

The permit-all command does not change access to security commands. Security commands are only and always available to members of the admin-user profile.

none—
sets the default of the profile to no-action. This option is useful to assign multiple profiles to a user.

For example, if a user is a member of two profiles and the default action of the first profile is permit-all, then the second profile will never be evaluated because permit-all is executed first. If the first profile default action is set to none and if no match conditions are met in the first profile, then the second profile will be evaluated. If the default action of the last profile is none and no explicit match is found, then the default-action deny-all takes effect.

entry

Syntax 
[no] entry entry-id
Context 
config>system>security>profile
Description 

This command is used to create a user profile entry.

More than one entry can be created with unique entry-id numbers. The 7705 SAR exits when the first match is found and executes the actions according to the accompanying action command. Entries should be sequenced from most explicit to least explicit.

An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete.

The no form of the command removes the specified entry from the user profile.

Default 

no entry IDs are defined

Parameters 
entry-id—
an entry ID uniquely identifies a user profile command match criteria and a corresponding action. If more than one entry is configured, the entry-ids should be numbered in staggered increments to allow users to insert a new entry without requiring renumbering of the existing entries.
Values—
1 to 9999

action

Syntax 
action {deny | permit}
Context 
config>system>security>profile>entry
Description 

This command configures the action associated with the profile entry.

Parameters 
deny—
specifies that commands matching the entry command match criteria will be denied
permit—
specifies that commands matching the entry command match criteria will be permitted

match

Syntax 
match command-string
no match
Context 
config>system>security>profile>entry
Description 

This command configures a command or command subtree.

Because the 7705 SAR exits when the first match is found, subordinate levels cannot be modified with subsequent action commands. More specific action commands should be entered with a lower entry number or in a profile that is evaluated prior to this profile.

All commands below the hierarchy level of the matched command are denied.

The no form of this command removes a match condition.

Default 

no match command string is specified

Parameters 
command-string—
the CLI command or CLI tree level that is the scope of the profile entry

renum

Syntax 
renum old-entry-number new-entry-number
Context 
config>system>security>profile
Description 

This command renumbers profile entries to resequence the entries.

Since the 7705 SAR exits when the first match is found and executes the actions according to the accompanying action command, renumbering is useful to rearrange the entries from most explicit to least explicit.

Parameters 
old-entry-number—
the entry number of an existing entry
Values—
1 to 9999
new-entry-number—
the new entry number
Values—
1 to 9999

User Management Commands

user

Syntax 
[no] user user-name
Context 
config>system>security
Description 

This command creates a local user and a context to edit the user configuration.

If a new user-name is entered, the user is created. When an existing user-name is specified, the user parameters can be edited.

When a new user is created and the info command is entered, the system displays a password with hash2 encryption in the output screen. However, when using that user name, there will be no password required. The user can log in to the system by entering their user name and then pressing at the password prompt.

Unless an administrator explicitly changes the password, it will be null. The hashed value displayed uses the user name and null password field, so when the user name is changed, the displayed hashed value will change.

The no form of the command deletes the user and all configuration data. Users cannot delete themselves.

Default 

n/a

Parameters 
user-name—
the name of the user, up to 16 characters

user-template

Syntax 
user-template {tacplus_default | radius_default}
Context 
config>system>security
Description 

This command configures default security user template parameters.

Parameters 
tacplus_default—
specifies that the TACACS+ default template is used for the configuration
radius_default —
specifies that the RADIUS default template is used for the configuration

access

Syntax 
[no] access [ftp] [snmp] [console]
[no] access [ftp] [console]
Context 
config>system>security>user
config>system>security>user-template
Description 

This command grants a user permission for FTP, SNMP, or console access.

If a user requires access to more than one application, then multiple applications can be specified in a single command. Multiple commands are treated sequentially.

The no form of the command removes access for a specific application.

The no access command denies permission for all management access methods. To deny a single access method, enter the no form of the command followed by the method to be denied; for example, no access ftp denies FTP access.

Default 

no access

Parameters 
ftp—
specifies FTP permission
snmp—
specifies SNMP permission. This keyword is only configurable in the config>system>security>user context.
console—
specifies console access (serial port or Telnet) permission

console

Syntax 
console
Context 
config>system>security>user
config>system>security>user-template
Description 

This command creates the context to configure user profile membership for the console.

cannot-change-password

Syntax 
[no] cannot-change-password
Context 
config>system>security>user>console
Description 

This command allows a user to change their password for both FTP and console login.

To disable a user’s privilege to change their password, use the cannot-change-password form of the command.

Note that the cannot-change-password flag is not replicated when a user copy is performed. A new-password-at-login flag is created instead.

Default 

no cannot-change-password

login-exec

Syntax 
[no] login-exec url-prefix:source-url
Context 
config>system>security>user>console
config>system>security>user-template>console
Description 

This command configures a user’s login exec file, which executes whenever the user successfully logs in to a console session.

Only one exec file can be configured. If multiple login-exec commands are entered for the same user, each subsequent entry overwrites the previous entry.

The no form of the command disables the login exec file for the user.

Default 

no login exec file is defined

Parameters 
url-prefix: source-url—
enter either a local or remote URL, up to 200 characters in length, that identifies the exec file that will be executed after the user successfully logs in

member

Syntax 
member user-profile-name [user-profile-name]
no member user-profile-name
Context 
config>system>security>user>console
Description 

This command allows the user access to a profile.

A user can participate in up to eight profiles.

The no form of this command deletes access user access to a profile.

Default 

default

Parameters 
user-profile-name—
the user profile name

new-password-at-login

Syntax 
[no] new-password-at-login
Context 
config>system>security>user>console
Description 

This command forces the user to change passwords at the next console or FTP login.

If the user is limited to FTP access, the administrator must create the new password.

The no form of the command does not force the user to change passwords.

Default 

no new-password-at-login

home-directory

Syntax 
home-directory url-prefix [directory] [directory/directory]
no home-directory
Context 
config>system>security>user
config>system>security>user-template
Description 

This command configures the local home directory for the user for both console and FTP access.

If the URL or the specified URL/directory structure is not present, then a warning message is issued and the default is assumed.

The no form of the command removes the configured home directory.

Default 

no home-directory

Note:

If restricted-to-home has been configured, no file access is granted and no home directory is created; if restricted-to-home is not applied, root becomes the user’s home directory.

Parameters 
url-prefix [directory] [directory/directory…]—
the user’s local home directory URL prefix and directory structure, up to 190 characters in length

password

Syntax 
password [password] [hash | hash2]
Context 
config>system>security>user
Description 

This command configures the user password for console and FTP access.

The use of the hash keyword sets the initial password when the user is created or modifies the password of an existing user and specifies that the given password was hashed using hashing algorithm version 1.

The use of the hash2 keyword specifies that the given password is already hashed using hashing algorithm version 2. A semantic check is performed on the given password field to verify that it is a valid hash2 key to store in the database.

The password is stored in an encrypted format in the configuration file when specified. Passwords must be encased in double quotes (" ") at the time of the password creation if they contain any special characters. The double quote character (") is not accepted inside a password. It is interpreted as the start or stop delimiter of a string.

For example:

config>system>security# user testuser1
config>system>security>user$ password "zx/Uhcn6ReMOZ3BVrWcvk." hash2
config>system>security>user# exit
config>system>security# info
-------------------------------------
...
            user "testuser1"
                password "zx/Uhcn6ReMOZ3BVrWcvk." hash2
            exit
...
-------------------------------------
config>system>security# 
Parameters 
password—
the password for the user that must be entered by this user during the login procedure. The minimum length of the password is determined by the minimum-length command. The maximum length can be up to 20 characters if unhashed and 32 characters if hashed or 54 characters if hash2. The complexity requirements for the password are determined by the complexity command.

Passwords that contain special characters (#, $, spaces, etc.) must be enclosed within double quotes.

For example:  config>system>security>user# password “south#bay?”

The question mark character (?) cannot be directly inserted as input during a Telnet connection because the character is bound to the help command during a normal Telnet/console connection.

To insert # or ? characters, they must be entered inside a notepad or clipboard program and then cut and pasted into the Telnet session in the password field that is encased in the double quotes as delimiters for the password.

If a password is entered without any parameters, a password length of zero is implied (return key).

hash—
specifies that the given password is already hashed using hashing algorithm version 1. A semantic check is performed on the given password field to verify that it is a valid hash1 key to store in the database.
hash2 —
specifies that the given password is already hashed using hashing algorithm version 2. A semantic check is performed on the given password field to verify that it is a valid hash2 key to store in the database.

restricted-to-home

Syntax 
[no] restricted-to-home
Context 
config>system>security>user
config>system>security>user-template
Description 

This command prevents users from navigating above their home directories for file access. A user is not allowed to navigate to a directory higher in the directory tree on the home directory device. The user is allowed to create and access subdirectories below their home directory.

If a home directory is not configured or the home directory is not available, then the user has no file access.

The no form of the command allows the user access to navigate to directories above their home directory.

Default 

no restricted-to-home

snmp

Syntax 
snmp
Context 
config>system>security>user
Description 

This command creates the context to configure SNMP group membership for a specific user and defines encryption and authentication parameters.

All SNMPv3 users must be configured with the commands available in this CLI context.

The 7705 SAR always uses the configured SNMPv3 user name as the security user name.

authentication

Syntax 
authentication {[none] | [[hash] {md5 key-1 | sha key-1} privacy {none | des-key key-2}]
Context 
config>system>security>user>snmp
Description 

This command configures the authentication and encryption method the user must use in order to be validated by the 7705 SAR. SNMP authentication allows the device to validate the managing node that issued the SNMP message and determine if the message has been tampered with. The authentication protocol can either be HMAC-MD5-96 or HMAC-SHA-96.

The user password is encrypted first by the MD5/SHA/DES algorithm. The output of the algorithm is always a fixed-length string (key). Copy the password key and paste the output in the appropriate authentication command key parameter.

Default 

authentication none - no authentication is configured and privacy cannot be configured

Parameters 
none—
do not use authentication. If none is specified, then privacy cannot be configured.
hash—
when hash is not specified, unencrypted characters can be entered. When hash is configured, all specified keys are stored in an encrypted format in the configuration file. The password must be entered in encrypted form when the hash parameter is used.
md5 key-1
the MD5 authentication key is stored in an encrypted format. The minimum key length is determined by the config>system>security>password>minimum-length value. The maximum length is 16 octets (32 printable characters).

The complexity of the key is determined by the complexity command.

sha key-1
the sha authentication key is stored in an encrypted format. The minimum key length is determined by the config>system>security>password>minimum-length value. The maximum length is 20 octets (40 printable characters).

The complexity of the key is determined by the complexity command.

privacy none—
do not perform SNMP packet encryption
privacy des-key key-2
configure the des-key for SNMP packet encryption. This key is stored in an encrypted format. The minimum key length is determined by the config>system>security>password>minimum-length value. The maximum length is 16 octets (32 printable characters). If privacy is configured, then authentication must be enabled.

To remove a previously configured des-key, enter privacy none.

The complexity of the key is determined by the complexity command.

Values—
privacy none

group

Syntax 
group group-name
no group
Context 
config>system>security>user>snmp
Description 

This command associates (or links) a user to a group name. The access command links the group with one or more views, security model(s), security level(s), and read, write, and notify permissions.

Default 

no group name is associated with a user

Parameters 
group-name—
enter the group name (between 1 and 32 alphanumeric characters) that is associated with this user. A user can be associated with one group name per security model.

RADIUS Client Commands

radius

Syntax 
[no] radius
Context 
config>system>security
Description 

This command creates the context to configure RADIUS authentication on the 7705 SAR.

Implement redundancy by configuring multiple server addresses for each 7705 SAR.

The no form of the command removes the RADIUS configuration.

access-algorithm

Syntax 
access-algorithm {direct | round-robin}
[no] access-algorithm
Context 
config>system>security>radius
Description 

This command configures the algorithm used to access the set of RADIUS servers. Up to five servers can be configured.

In direct mode, the first server, as defined by the server command, is the primary server. This server is always used first when authenticating a request. In round-robin mode, the server used to authenticate a request is the next server in the list, following the last authentication request. For example, if server 1 is used to authenticate the first request, server 2 is used to authenticate the second request, and so on.

Default 

direct

Parameters 
direct—
first server is always used to authenticate a request
round-robin—
server used to authenticate a request is the next server in the list, following the last authentication request

accounting

Syntax 
[no] accounting
Context 
config>system>security>radius
Description 

This command enables RADIUS accounting. The no form of this command disables RADIUS accounting.

Default 

no accounting

accounting-port

Syntax 
accounting-port port
no accounting-port
Context 
config>system>security>radius
Description 

This command specifies a UDP port number on which to contact the RADIUS server for accounting requests.

Parameters 
port—
specifies the UDP port number
Values—
1 to 65535
Values—
1813

authorization

Syntax 
[no] authorization
Context 
config>system>security>radius
Description 

This command configures RADIUS authorization parameters for the system.

The no form of this command disables RADIUS authorization for the system.

Default 

no authorization

port

Syntax 
port port
no port
Context 
config>system>security>radius
Description 

This command configures the TCP port number to contact the RADIUS server.

The no form of the command reverts to the default value.

Default 

1812 (as specified in RFC 2865, Remote Authentication Dial In User Service (RADIUS))

Parameters 
port—
the TCP port number to contact the RADIUS server
Values—
1 to 65535

retry

Syntax 
retry count
no retry
Context 
config>system>security>radius
Description 

This command configures the number of times the router attempts to contact the RADIUS server for authentication if there are problems communicating with the server.

The no form of the command reverts to the default value.

Default 

3

Parameters 
count—
the retry count
Values—
1 to 10

server

Syntax 
server server-index address ip-address secret key [hash | hash2]
no server server-index
Context 
config>system>security>radius
Description 

This command adds a RADIUS server and configures the RADIUS server IP address, index, and key values.

Up to five RADIUS servers can be configured at any one time. RADIUS servers are accessed in order from lowest to highest index for authentication requests until a response from a server is received. A higher-indexed server is only queried if no response is received from a lower-indexed server (which implies that the server is not available). If a response from a server is received, no other RADIUS servers are queried. It is assumed that there are multiple identical servers configured as backups and that the servers do not have redundant data.

The no form of the command removes the server from the configuration.

Default 

no RADIUS servers are configured

Parameters 
index—
the index for the RADIUS server. The index determines the sequence in which the servers are queried for authentication requests. Servers are queried in order from lowest to highest index.
Values—
1 to 5
ip-address—
the IP address of the RADIUS server. Two RADIUS servers cannot have the same IP address. An error message is generated if the server address is a duplicate.
Values—
ipv4-address      a.b.c.d (host bits must be 0)
ipv6-address         x:x:x:x:x:x:x:x (eight 16-bit pieces)
                             x:x:x:x:x:x:d.d.d.d
                             x:   [0 to FFFF]H
                             d:   [0 to 255]D
key—
the secret key to access the RADIUS server. This secret key must match the password on the RADIUS server.
Values—
up to 20 characters in length
hash—
specifies that the key is entered in an encrypted form. If the hash parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash parameter specified.
hash2—
specifies that the key is entered in a more complex encrypted form. If the hash2 parameter is not used, the less encrypted hash form is assumed.

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security>radius
Description 

This command configures the number of seconds the router waits for a response from a RADIUS server.

The no form of the command reverts to the default value.

Default 

3

Parameters 
seconds—
the number of seconds the router waits for a response from a RADIUS server, expressed as a decimal integer
Values—
1 to 90

use-default-template

Syntax 
[no] use-default-template
Context 
config>system>security>radius
Description 

This command specifies whether or not the user template defined by this entry is to be actively applied to the RADIUS user.

Default 

no use-default-template

TACACS+ Client Commands

tacplus

Syntax 
[no] tacplus
Context 
config>system>security
Description 

This command creates the context to configure TACACS+ authentication on the 7705 SAR.

Configure multiple server addresses for each 7705 SAR for redundancy.

The no form of the command removes the TACACS+ configuration.

accounting

Syntax 
accounting [record-type {start-stop | stop-only}]
no accounting
Context 
config>system>security>tacplus
Description 

This command enables TACACS+ accounting and configures the type of accounting record packet that is to be sent to the TACACS+ server. The record-type parameter indicates whether TACACS+ accounting start and stop packets will be sent or just stop packets will be sent.

Default 

record-type stop-only

Parameters 
record-type start-stop—
specifies that a TACACS+ start packet is sent whenever the user executes a command and a stop packet is sent when the command is complete
record-type stop-only—
specifies that a stop packet is sent when the command execution is complete

authorization

Syntax 
[no] authorization
Context 
config>system>security>tacplus
Description 

This command configures TACACS+ authorization parameters for the system.

Default 

no authorization

server

Syntax 
server index address ip-address secret key [hash | hash2] [port port]
no server index
Context 
config>system>security>tacplus
Description 

This command adds a TACACS+ server and configures the TACACS+ server IP address, index, and key values.

Up to five TACACS+ servers can be configured at any one time. TACACS+ servers are accessed in order from the lowest index to the highest index for authentication requests.

The no form of the command removes the server from the configuration.

Default 

no TACACS+ servers are configured

Parameters 
index—
the index for the TACACS+ server. The index determines the sequence in which the servers are queried for authentication requests. Servers are queried in order from the lowest index to the highest index.
Values—
1 to 5
ip-address—
the IP address of the TACACS+ server. Two TACACS+ servers cannot have the same IP address. An error message is generated if the server address is a duplicate.
Values—
ipv4-address      a.b.c.d (host bits must be 0)
ipv6-address         x:x:x:x:x:x:x:x (eight 16-bit pieces)
                             x:x:x:x:x:x:d.d.d.d
                             x:   [0 to FFFF]H
                             d:   [0 to 255]D
key—
the secret key to access the RADIUS server. This secret key must match the password on the TACACS+ server.
Values—
up to 20 characters in length
hash—
specifies that the key is entered in an encrypted form. If the hash parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash parameter specified.
hash2—
specifies that the key is entered in a more complex encrypted form. If the hash2 parameter is not used, the less encrypted hash form is assumed.
port—
the port ID
Values—
0 to 65535

single-connection

Syntax 
[no] single-connection
Context 
config>system>security>tacplus
Description 

This command sets up a single connection to the TACACS+ server and validates everything via that connection. Normally, each authentication event sets up a connection to validate that particular event.

The no form of the command disables TACACS+ single connection configuration.

Default 

no single-connection

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security>tacplus
Description 

This command configures the number of seconds the router waits for a response from a TACACS+ server.

The no form of the command reverts to the default value.

Default 

3

Parameters 
seconds—
the number of seconds the router waits for a response from a TACACS+ server, expressed as a decimal integer
Values—
1 to 90

use-default-template

Syntax 
[no] use-default-template
Context 
config>system>security>tacplus
Description 

This command specifies whether or not the user template defined by this entry is to be actively applied to the TACACS+ user.

802.1x Commands

dot1x

Syntax 
[no] dot1x
Context 
config>system>security
Description 

This command creates the context to configure 802.1x network access control on the 7705 SAR.

The no form of the command removes the 802.1x configuration.

radius-plcy

Syntax 
[no] radius-plcy name [create]
Context 
config>system>security>dot1x
Description 

This command creates the context to configure RADIUS server parameters for 802.1x network access control on the 7705 SAR.

The RADIUS server configured under the config>system>security>dot1x>radius-plcy context authenticates clients who get access to the data plane of the 7705 SAR. This configuration differs from the RADIUS server configured under the config>system>security>radius context that authenticates CLI login users who get access to the management plane of the 7705 SAR.

The no form of the command removes the RADIUS server configuration for 802.1x.

Parameters 
name—
the RADIUS policy name, up to 32 characters
create —
keyword required when first creating the configuration context. When the context is created, you can navigate into the context without the create keyword.

retry

Syntax 
retry count
no retry
Context 
config>system>security>dot1x
Description 

This command configures the number of times the router attempts to contact the RADIUS server for authentication if there are problems communicating with the server.

The no form of the command reverts to the default value.

Default 

3

Parameters 
count —
the retry count
Values—
1 to 10

server

Syntax 
server server-index address ip-address secret key [hash | hash2] [auth-port auth-port]
[acct-port acct-port] [type server-type]
no server server-index
Context 
config>system>security>dot1x>radius-plcy
Description 

This command adds an 802.1x server and configures the IP address, index, and key values.

Up to five 802.1x servers can be configured at any one time. These servers are accessed in order from lowest to highest index for authentication requests until a response from a server is received. A higher- indexed server is only queried if no response is received from a lower-indexed server (which implies that the server is not available). If a response from a server is received, no other 802.1x servers are queried. It is assumed that there are multiple identical servers configured as backups and that the servers do not have redundant data.

The no form of the command removes the server from the configuration.

Default 

n/a

Parameters 
server-index—
the index for the 802.1x server
Values—
1 to 5
ip-address
the IP address of the 802.1x server. Each 802.1x server must have a unique IP address. An error message is generated if the server address is a duplicate.
Values—
a.b.c.d
key
the secret key to access the 802.1x server. This secret key must match the password on the 802.1x server.
Values—
up to 20 alphanumeric characters
hash —
specifies that the key is entered in an encrypted form. If the hash parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash parameter specified.
hash2 —
specifies that the key is entered in a more complex encrypted form that involves more variables than the key value alone. This means that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash parameter specified.
auth-port
the UDP port number used to contact the RADIUS server for authentication
Values—
1 to 65535
acct-port
the UDP port number used to contact the RADIUS server for accounting requests
Values—
1 to 65535
server-type
the server type
Values—
authorization, accounting, or combined

source-address

Syntax 
source-address ip-address
no source-address
Context 
config>system>security>dot1x>radius-plcy
Description 

This command configures the NAS IP address to be sent in the RADIUS packet.

The no form of the command reverts to the default value.

Default 

system IP address

Parameters 
ip-address—
the source address of the RADIUS packet in dotted-decimal notation
Values—
0.0.0.0 to 255.255.255.255

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>dot1x
config>system>security>dot1x>radius-plcy
Description 

This command administratively disables the 802.1x protocol operation. Shutting down the protocol does not remove or change the configuration other than the administrative state.

The operational state of the entity is disabled as well as the operational state of any entities contained within.

The no form of the command administratively enables the protocol.

Default 

shutdown

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security>dot1x>radius-plcy
Description 

This command configures the number of seconds the router waits for a response from a RADIUS server.

The no form of the command reverts to the default value.

Default 

5

Parameters 
seconds—
the number of seconds the router waits for a response from a RADIUS server, expressed as a decimal integer
Values—
1 to 90

SSH Commands

ssh

Syntax 
ssh
Context 
config>system>security
Description 

This command enables the context to configure the SSH server on the system. This command should only be enabled or disabled when no SSH session is running.

When the command is executed, an SSH security key is generated. This key is valid until either the node is restarted or the SSH server is stopped with the no ssh command and restarted. The key size is non-configurable and set at 1024 bits.

Quitting SSH while in the process of authentication is accomplished by either executing a ctrl-c or “~.” (tilde and dot), assuming the “~” is the default escape character for the SSH session.

Default 

ssh — the SSH server is enabled

preserve-key

Syntax 
[no] preserve-key
Context 
config>system>security>ssh
Description 

This command specifies the persistence of the SSH server host key. When enabled, the host key will be saved by the server and restored following a system reboot. This command can only be enabled or disabled when no SSH session is running.

The no form of the command specifies that the host key will be held in memory by the SSH server and not be restored following a system reboot.

Default 

no preserve-key

server-shutdown

Syntax 
[no] server-shutdown
Context 
config>system>security>ssh
Description 

This command enables the SSH servers running on the system.

Default 

at system startup, only the SSH server is enabled

version

Syntax 
version ssh-version
no version
Context 
config>system>security>ssh
Description 

This command specifies the SSH protocol version that will be supported by the SSH server. The server may be configured as Secure Shell Version 1 (SSH1), Version 2 (SSH2) or both. SSH1 and SSH2 are different protocols and encrypt at different parts of the packets. SSH1 uses the server as well as host keys to authenticate systems, whereas SSH2 only uses host keys. SSH2 does not use the same networking implementation that SSH1 does and is considered a more secure, efficient, and portable version of SSH.

Parameters 
ssh-version—
specifies the SSH version
Values—
1 — specifies that the SSH server will only accept connections from clients supporting SSH protocol version 1
2 — specifies that the SSH server will only accept connections from clients supporting SSH protocol version 2
1-2 — specifies that the SSH server will accept connections from clients supporting either SSH protocol version 1, or SSH protocol version 2, or both
Values—
2

Login Control Commands

login-control

Syntax 
login-control
Context 
config>system
Description 

This command creates the context to configure the session control for console, Telnet and FTP.

exponential-backoff

Syntax 
[no] exponential-backoff
Context 
config>system>login-control
Description 

This command enables the exponential backoff of the login prompt. The exponential-backoff command is used to deter dictionary attacks, when a malicious user can gain access to the CLI by using a script to try admin with any conceivable password.

The no form of the command disables exponential-backoff.

Default 

no exponential-backoff

ftp

Syntax 
ftp
Context 
config>system>login-control
Description 

This command creates the context to configure FTP login control parameters.

inbound-max-sessions

Syntax 
inbound-max-sessions value
no inbound-max-sessions
Context 
config>system>login-control>ftp
Description 

This command configures the maximum number of concurrent inbound FTP sessions.

This value is the combined total of inbound and outbound sessions.

The no form of the command reverts to the default value.

Default 

3

Parameters 
value—
the maximum number of concurrent FTP sessions on the node
Values—
0 to 5

idle-timeout

Syntax 
idle-timeout {minutes | disable}
no idle-timeout
Context 
config>system>login-control
Description 

This command configures the idle timeout for FTP, console, or Telnet sessions before the session is terminated by the system.

By default, an idle FTP, console, or Telnet session times out after 30 minutes of inactivity. This timer can be set per session.

The no form of the command reverts to the default value.

Default 

30

Parameters 
minutes—
the idle timeout in minutes
Values—
1 to 1440
disable—
when the disable option is specified, a session will never time out. To re-enable idle timeout, enter the command without the disable option.

login-banner

Syntax 
[no] login-banner
Context 
config>system>login-control
Description 

This command enables or disables the display of a login banner. The login banner contains the 7705 SAR copyright and build date information for a console login attempt.

The no form of the command causes only the configured pre-login-message and a generic login prompt to display.

motd

Syntax 
motd {url url-prefix:source-url | text motd-text-string}
no motd
Context 
config>system>login-control
Description 

This command creates the message of the day that is displayed after a successful console login. Only one message can be configured.

The no form of the command removes the message.

Default 

no motd

Parameters 
url-prefix: source-url—
when the message of the day is present as a text file, provide both the url-prefix and the source-url of the file containing the message of the day. The URL prefix can be local or remote.
motd-text-string—
the text of the message of the day. The motd-text-string must be enclosed in double quotes. Multiple text strings are not appended to one another.

Some special characters can be used to format the message text. The “\n” character creates multi-line MOTDs and the “\r” character restarts at the beginning of the new line. For example, entering “\n\r” will start the string at the beginning of the new line, while entering “\n” will start the second line below the last character from the first line.

pre-login-message

Syntax 
pre-login-message login-text-string [name]
no pre-login-message
Context 
config>system>login-control
Description 

This command creates a message displayed prior to console login attempts on the console via Telnet.

Only one message can be configured. If multiple pre-login-messages are configured, the last message entered overwrites the previous entry.

The system name can be added to an existing message without affecting the current pre-login- message.

The no form of the command removes the message.

Default 

no pre-login-message

Parameters 
login-text-string—
a text string, up to 900 characters. Any printable, 7-bit ASCII characters can be used. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.
name—
when the keyword name is defined, the configured system name is always displayed first in the login message. To remove the name from the login message, the message must be cleared and a new message entered without the name.

telnet

Syntax 
telnet
Context 
config>system>login-control
Description 

This command creates the context to configure the Telnet login control parameters.

inbound-max-sessions

Syntax 
inbound-max-sessions value
no inbound-max-sessions
Context 
config>system>login-control>telnet
Description 

This parameter limits the number of inbound Telnet sessions. Each 7705 SAR router is limited to a total of 15 Telnet or SSH sessions (IPv4 and IPv6). The value controls inbound Telnet sessions only. Console sessions though the local serial (console) port cannot be disabled. SSH sessions are counted as inbound Telnet sessions in the login-control context.

The no form of the command reverts to the default value.

Default 

5

Parameters 
value—
the maximum number of concurrent inbound Telnet sessions, expressed as an integer
Values—
0 to 15

outbound-max-sessions

Syntax 
outbound-max-sessions value
no outbound-max-sessions
Context 
config>system>login-control>telnet
Description 

This parameter limits the number of outbound Telnet sessions. Each 7705 SAR router is limited to a total of 15 Telnet or SSH sessions (IPv4 and IPv6). The value controls Telnet outbound sessions only. The local serial port cannot be disabled. SSH sessions are counted as outbound Telnet sessions in the login-control context.

The no form of the command reverts to the default value.

Default 

5

Parameters 
value—
the maximum number of concurrent outbound Telnet sessions, expressed as an integer
Values—
0 to 15

Show Commands

Security Show Commands

access-group

Syntax 
access-group [group-name]
Context 
show>system>security
Description 

This command displays SNMP access group information.

Parameters 
group-name—
displays information for the specified access group
Output 

The following output is an example of system security access group information, and Table 7 describes the fields.

Sample Output
A:ALU-4# show system security access-group
===============================================================================
Access Groups                                                                  
===============================================================================
group name        security  security  read          write         notify       
                  model     level     view          view          view         
-------------------------------------------------------------------------------
snmp-ro           snmpv1    none      no-security                 no-security  
snmp-ro           snmpv2c   none      no-security                 no-security  
snmp-rw           snmpv1    none      no-security   no-security   no-security  
snmp-rw           snmpv2c   none      no-security   no-security   no-security  
snmp-rwa          snmpv1    none      iso           iso           iso          
snmp-rwa          snmpv2c   none      iso           iso           iso          
snmp-trap         snmpv1    none                                  iso          
snmp-trap         snmpv2c   none                                  iso          
===============================================================================
A:ALU-7#
Table 7:  Show System Security Access Group Output Fields   

Label

Description

Group name

The access group name

Security model

The security model required to access the views configured in this node

Security level

Specifies the required authentication and privacy levels to access the views configured in this node

Read view

Specifies the variable of the view to read the MIB objects

Write view

Specifies the variable of the view to configure the contents of the agent

Notify view

Specifies the variable of the view to send a trap about MIB objects

authentication

Syntax 
authentication [statistics]
Context 
show>system>security
Description 

This command displays system login authentication configuration and statistics.

Parameters 
statistics—
appends login and accounting statistics to the display
Output 

The following output is an example of system security authentication information, and Table 8 describes the fields.

Sample Output
A:ALU-4# show system security authentication
===============================================================================
Authentication                  sequence : radius tacplus local
===============================================================================
type                               status  timeout     single      retry
   server address                          (secs)      conn        count
-------------------------------------------------------------------------------
radius
   10.10.10.103                    up       5           n/a         5
radius
   10.10.0.1                       up       5           n/a         5
radius
   10.10.0.2                       up       5           n/a         5
tacplus
   10.10.0.9(49)                   down     5           true        n/a
-------------------------------------------------------------------------------
radius admin status  : up
tacplus admin status : down
health check         : enabled (interval 30)
-------------------------------------------------------------------------------
No. of Servers: 4
===============================================================================
A:ALU-4#
A:ALU-7>show>system>security# authentication statistics
===============================================================================
Authentication                  sequence : radius tacplus local
===============================================================================
type                               status  timeout     single      retry
   server address                          (secs)      conn        count
-------------------------------------------------------------------------------
radius
   10.10.10.103                    up        5         n/a         5
radius
   10.10.0.1                       up        5         n/a         5
radius
   10.10.0.2                       up        5         n/a         5
tacplus
   10.10.0.9(49)                   down      5         true        n/a
-------------------------------------------------------------------------------
radius admin status  : up
tacplus admin status : down
health check         : enabled (interval 30)
-------------------------------------------------------------------------------
No. of Servers: 4
===============================================================================
Login Statistics
===============================================================================
server address                                      conn    accepted   rejected 
                                                    errors  logins     logins
-------------------------------------------------------------------------------
10.10.10.103                                        0       0          0
10.10.0.1                                           0       0          0
10.10.0.2                                           0       0          0
10.10.0.9                                           0       0          0
local                                               n/a     1          0
===============================================================================
Authorization Statistics (TACACS+)
===============================================================================
server address                                      conn    sent       rejected 
                                                    errors  pkts       pkts
-------------------------------------------------------------------------------
10.10.0.9                                           0       0          0
===============================================================================
Accounting Statistics
===============================================================================
server address                                      conn    sent       rejected 
                                                    errors  pkts       pkts
-------------------------------------------------------------------------------
10.10.10.103                                        0       0          0
10.10.0.1                                           0       0          0
10.10.0.2                                           0       0          0
===============================================================================
A:ALU-7#
Table 8:  Show System Security Authentication Output Fields   

Label

Description

Sequence

The sequence in which authentication is processed

Server address

The IP address of the RADIUS server

Status

The current status of the RADIUS server

Type

The authentication type

Timeout (secs)

The number of seconds the router waits for a response from a RADIUS server

Single connection

Enabled: Specifies a single connection to the TACACS+ server and validates everything via that connection

Disabled: The TACACS+ protocol operation is disabled

Retry count

Displays the number of times the router attempts to contact the RADIUS server for authentication if there are problems communicating with the server

Connection errors

The number of times a user has attempted to log in irrespective of whether the login succeeded or failed

Accepted logins

The number of times the user has successfully logged in

Rejected logins

The number of unsuccessful login attempts

Sent packets

The number of packets sent

Rejected packets

The number of packets rejected

communities

Syntax 
communities
Context 
show>system>security
Description 

This command displays SNMP communities and characteristics.

Output 

The following output is an example of community information, and Table 9 describes the fields.

Sample Output
A:ALU-48# show system security communities
=============================================================================
Communities
=============================================================================
community           access  view                version   group name
-----------------------------------------------------------------------------
cli-readonly        r       iso                 v2c       cli-readonly
cli-readwrite       rw      iso                 v2c       cli-readwrite
public              r       no-security         v1 v2c    snmp-ro
-----------------------------------------------------------------------------
No. of Communities: 3
=============================================================================
A:ALU-48#
Table 9:  Show Communities Output Fields   

Label

Description

Community

The community string name for SNMPv1 and SNMPv2c access only

Access

r: The community string allows read-only access

rw: The community string allows read-write access

rwa: The community string allows read-write access

mgmt: The unique SNMP community string assigned to the management router

View

The view name

Version

The SNMP version

Group Name

The access group name

No of Communities

The total number of configured community strings

cpm-filter

Syntax 
cpm-filter ip-filter [entry entry-id]
cpm-filter ipv6-filter [entry entry-id]
Context 
show>system>security
Description 

This command displays information on CPM (CSM) filters.

If an entry number is not specified, all entries are displayed.

Parameters 
entry-id—
displays information about the specified CPM filter entry
Values—
1 to 9999
Values—
all filter entries
Output 

The following output is an example of CPM filter information, and Table 10 describes the fields.

Sample Output
A:ALU-35# show system security cpm-filter ip-filter 
===============================================================================
CPM IP Filters
===============================================================================
Entry-Id  Dropped   Forwarded Description                                      
-------------------------------------------------------------------------------
2         0         0         CPM filter #2                      
3         25880     0         CPM filter #3                       
4         25880     0         CPM filter #4                      
5         25882     0         CPM filter #5                      
6         25926     0         CPM filter #6                       
7         25926     0         CPM filter #7                       
8         25944     0         CPM filter #8                       
9         25950     0         CPM filter #9                       
10        25968     0         CPM filter #10                       
11        25984     0         CPM filter #11                      
12        26000     0         CPM filter #12                       
13        26018     0         CPM filter #13                       
14        26034     0         CPM filter #14                       
15        26050     0         CPM filter #15           
===============================================================================
A:ALU-35# 
A:ALU-35# show system security cpm-filter ip-filter entry 2
===============================================================================
CPM IP Filter Entry
===============================================================================
Entry Id           : 2                                                       
Description : CPM filter #2
-------------------------------------------------------------------------------
Filter Entry Match Criteria :
-------------------------------------------------------------------------------
Log Id             : 101                                                      
Src. IP            : 10.4.101.2/32      Src. Port          : 0                 
Dest. IP           : 10.4.101.1/32      Dest. Port         : 0                 
Protocol           : tcp                Dscp               : ef                
ICMP Type          : Undefined          ICMP Code          : Undefined         
Fragment           : True               Option-present     : Off               
IP-Option          : n/a                Multiple Option    : True              
TCP-syn            : Off                TCP-ack            : True              
Match action       : Drop  
Dropped pkts       : 0                  Forwarded pkts     : 0             
===============================================================================
A:ALU-35#
A:ALU-35# show system security cpm-filter ipv6-filter entry 101
===============================================================================
CPM IPv6 Filter Entry
===============================================================================
Entry Id : 1
Description : CPM-Filter 11::101:2 #101
-------------------------------------------------------------------------------
Filter Entry Match Criteria :
-------------------------------------------------------------------------------
Log Id : n/a
Src. IP : 11::101:2       Src. Port : 0
Dest. IP : 11::101:1      Dest. Port : 0
next-header : none Dscp : Undefined
ICMP Type : Undefined     ICMP Code : Undefined
TCP-syn : Off             TCP-ack : Off
Match action : Drop
Dropped pkts : 25880      Forwarded pkts : 0
===============================================================================
Table 10:  Show CPM Filter Output Fields   

Label

Description

CPM IP (or IPv6) Filter Entry

Entry-id

Displays information about the specified CPM filter entry

Dropped

The number of dropped events

Forwarded

The number of forwarded events

Description

The CPM filter description

Filter Entry Match Criteria

Log Id

The log ID where matched packets will be logged

Src. IP

The source IP address

Dest. IP

The destination IP address

Protocol

The Protocol field in the IP header (IPv4 filters only)

next-header

The next header ID. Undefined indicates no next header is specified. (IPv6 filters only)

ICMP Type

The ICMP type field in the ICMP header

Fragment

The 3-bit fragment flags or 13-bit fragment offset field (IPv4 filters only)

IP-Option

The IP option setting (IPv4 filters only)

TCP-syn

The SYN flag in the TCP header

Match action

When the criteria matches, displays drop or forward packet

Dropped pkts

The number of matched dropped packets

Src. Port

The source port number (range)

Dest. Port

The destination port number (range)

Dscp

The DSCP field in the IP header

ICMP Code

The ICMP code field in the ICMP header

Option-present

The option present setting (IPv4 filters only)

Multiple Option

The multiple option setting (IPv4 filters only)

TCP-ack

The ACK flag in the TCP header

Match action

When the criteria matches, displays drop or forward packet

Next Hop

If match action is forward, indicates destination of the matched packet

Forwarded pkts

Indicates number of matched forwarded packets

management-access-filter

Syntax 
management-access-filter ip-filter [entry entry-id]
management-access-filter ipv6-filter [entry entry-id]
Context 
show>system>security
Description 

This command displays management access control filter information.

If no specific entry number is specified, all entries are displayed.

Parameters 
entry-id—
displays information about the specified management access filter entry
Values—
1 to 9999
Values—
All filter entries
Output 

The following output is an example of management access filter information, and Table 11 describes the fields.

Sample Output
A:ALU-7# show system security management-access-filter ip-filter entry 1
=============================================================================
IPv4 Management Access Filters                                                    
=============================================================================
                                                                             
filter type:  : ip
Def. Action   : permit
Admin Status  : enabled (no shutdown)
-----------------------------------------------------------------------------
Entry         : 1
Description   : test description
Src IP        : 10.10.10.104
Src interface : undefined
Dest port     : 10.10.10.103
Protocol      : 6
Router        : undefined
Action        : permit
Log           : disabled
Matches       : 0
=============================================================================
A:ALU-7# 
A:ALU-7# show system security management-access-filter ipv6-filter entry 2
=============================================================================
IPv6 Management Access Filter
=============================================================================
filter type   : ipv6
Def. Action   : permit
Admin Status  : enabled (no shutdown)
-----------------------------------------------------------------------------
Entry         : 1
Src IP        : 2001::1/128
Flow label    : undefined
Src interface : undefined
Dest port     : undefined
Next-header   : undefined
Router        : undefined
Action        : permit
Log           : enabled
Matches       : 0
=============================================================================
A:ALU-7#
Table 11:  Show Management Access Filter Output Fields   

Label

Description

IPv4 (or IPv6) Management Access Filters

filter type

The management access filter type

Def. Action

Permit: Specifies that packets not matching the configured selection criteria in any of the filter entries are permitted

Deny: Specifies that packets not matching the configured selection criteria in any of the filter entries are denied and that a ICMP host unreachable message will be issued

Deny-host-unreachable: Specifies that packets not matching the configured selection criteria in the filter entries are denied

Admin Status

Up: indicates that the management access filter is administratively enabled

Down: indicates that the management access filter is administratively disabled

Entry

The entry ID in a policy or filter table

Description

A text string describing the filter

Src IP

The source IP address used for management access filter match criteria

Flow label

The flow label to match (IPv6 filters only)

Src interface

The interface name for the next hop to which the packet should be forwarded if it hits this filter entry

Dest port

The destination port

Next-header

The next header ID to match. Undefined indicates no next header is specified. (IPv6 filters only)

Protocol

The IP protocol to match (IPv4 filters only)

Action

The action to take for packets that match this filter entry

Matches

The number of times a management packet has matched this filter entry

password-options

Syntax 
password-options
Context 
show>system>security
Description 

This command displays configured password options.

Output 

The following output is an example of password options information, and Table 12 describes the fields.

Sample Output
A:ALU-7# show system security password-options
===============================================================================
Password Options                                                               
===============================================================================
Password aging in days                           : none                        
Number of invalid attempts permitted per login   : 3                           
Time in minutes per login attempt                : 5                           
Lockout period (when threshold breached)         : 10                          
Authentication order                             : radius tacplus local        
Configured complexity options                    :                             
Minimum password length                          : 6                           
===============================================================================
A:ALU-7#
Table 12:  Show Password Options Output Fields   

Label

Description

Password aging in days

The number of days a user password is valid before the user must change their password

Number of invalid attempts permitted per login

The number of unsuccessful login attempts allowed for the specified time

Time in minutes per login attempt

The period of time, in minutes, that a specified number of unsuccessful attempts can be made before the user is locked out

Lockout period (when threshold breached)

The lockout period, in minutes, where the user is not allowed to log in

Authentication order

The sequence in which password authentication is attempted among RADIUS, TACACS+, and local passwords

Configured complexity options

The complexity requirements of locally administered passwords, HMAC-MD5-96, HMAC-SHA-96 and DES-keys configured in the authentication section

Minimum password length

The minimum number of characters required for locally administered passwords, HMAC-MD5-96, HMAC-SHA-96, and DES-keys configured in the system security section

profile

Syntax 
profile user-profile-name
Context 
show>system>security
Description 

This command displays user profile information.

If the user-profile-name is not specified, then information for all profiles is displayed.

Parameters 
user-profile-name—
displays information for the specified user profile
Output 

The following output is an example of user profile information, and Table 13 describes the fields.

Sample Output
A:ALU-7# show system security profile administrative
=============================================================================== 
User Profile                                                                    
=============================================================================== 
User Profile : administrative                                                   
Def. Action  : permit-all
LI           : no                                                     
------------------------------------------------------------------------------- 
Entry        : 10                                                               
Description  :                                                                  
Match Command: configure system security                                        
Action       : permit                                                           
------------------------------------------------------------------------------- 
Entry        : 20                                                               
Description  :                                                                  
Match Command: show system security                                             
Action       : permit                                                           
-------------------------------------------------------------------------------
No. of profiles: 1
===============================================================================
A:ALU-7#
Table 13:  Show User Profile Output Fields   

Label

Description

User Profile

The profile name used to deny or permit user console access to a hierarchical branch or to specific commands

Def. action

Permit all: Permits access to all commands

Deny: Denies access to all commands

None: No action is taken

Entry

The entry ID in a policy or filter table

Description

Displays the text string describing the entry

Match Command

Displays the command or subtree commands in subordinate command levels

Action

Permit all: Commands matching the entry command match criteria are permitted

Deny: Commands not matching the entry command match criteria are not permitted

No. of profiles

The total number of profiles listed

source-address

Syntax 
source-address
Context 
show>system>security
Description 

This command displays the source address configured for applications.

Output 

The following output is an example of source address information, and Table 14 describes the fields.

Sample Output
A:ALU-1# show system security source-address
===============================================================================
Source-Address applications
===============================================================================
Application         IP address/Interface Name                    Oper status
-------------------------------------------------------------------------------
telnet              10.20.1.7                                    Up
radius              loopback1                                    Up
===============================================================================
A:ALU-1#
Table 14:  Show Source Address Output Fields   

Label

Description

Application

The source-address application

IP address: Interface Name

The source address IP address or interface name

Oper status

Up: The source address is operationally up

Down: The source address is operationally down

ssh

Syntax 
ssh
Context 
show>system>security
Description 

This command displays all the SSH sessions as well as the SSH status and fingerprint.

Output 

The following outputs are examples of SSH information (IPv4 and IPv6), and Table 15 describes the fields.

Sample Output (IPv4)
ALU-7# show system security ssh 
SSH is enabled
SSH preserve key: Enabled
SSH protocol version 1: Enabled
RSA host key finger print:c6:a9:57:cb:ee:ec:df:33:1a:cd:d2:ef:3f:b5:46:34
 
SSH protocol version 2: Enabled
DSA host key fingerprint:c0:be:4a:da:55:87:e0:92:da:33:b8:55:fb:42:71:58
RSA host key fingerprint:79:28:68:61:d8:8b:c0:f0:5c:f5:bc:0b:fa:02:24:d8
=======================================================
Connection          Username            Version
=======================================================
192.168.xxx.xxx     admin               1-2
-------------------------------------------------------
Number of SSH sessions : 1
Sample Output (IPv6)
*A:7705:Dut-C> # show system security ssh
===============================================================================
SSH Server
===============================================================================
Administrative State      : Enabled
Operational State         : Up
Preserve Key              : Disabled
 
SSH Protocol Version 1    : Disabled
 
SSH Protocol Version 2    : Enabled
DSA Host Key Fingerprint  : bd:fe:f5:fc:15:9d:86:65:f5:63:02:d5:55:16:d1:50
RSA Host Key Fingerprint  : 00:d6:b3:83:41:2f:50:ea:63:ef:5d:71:30:ef:93:ad
-------------------------------------------------------------------------------
Connection          Username            Version ServerName  Status
-------------------------------------------------------------------------------
3301::xxxx:xxxx     admin               2       cli         connected
-------------------------------------------------------------------------------
Number of SSH sessions : 1
Table 15:  Show SSH Output Fields   

Label

Description

Administrative State

The administrative state of the SSH server: enabled or disabled

Operational State

The operational state of the SSH server: up or down

Preserve Key

Enabled: preserve-key is enabled

Disabled: preserve-key is disabled

SSH Protocol Version 1

Enabled: SSH1 is enabled

Disabled: SSH1 is disabled

SSH Protocol Version 2

Enabled: SSH2 is enabled

Disabled: SSH2 is disabled

DSA Host Key Fingerprint

RSA Host Key Fingerprint

The key fingerprint is the digital signal algorithm (DSA) or Rivest, Shamir, and Adleman (RSA) host server’s identity. Clients trying to connect to the server verify the server’s fingerprint. If the server fingerprint is not known, the client may not continue with the SSH session since the server might be spoofed.

Connection

The IP address of the connected routers (remote client)

Username

The name of the user

Version

The SSH version

ServerName

The name of the server

Status

The status of the connection

Number of SSH sessions

The total number of SSH sessions

user

Syntax 
user [user-id] [detail]
Context 
show>system>security
Description 

This command displays user registration information.

If no command line options are specified, summary information for all users displays.

Parameters 
user-id—
displays information for the specified user
Values—
all users
detail—
displays detailed user information to the summary output
Output 

The following output is an example of user information, and Table 16 describes the fields.

Sample Output
ALU-7# show system security user
===============================================================================
Users                                                                          
===============================================================================
user id           New  User Permissions  Password    Login        Failed  Local
                  Pwd  Console ftp snmp  Expires     Attempts     Logins  Conf 
-------------------------------------------------------------------------------
                                                                        
admin             n    y       n   n     never       21           0       y    
testuser          n    n       n   n     never       0            0       y
-------------------------------------------------------------------------------
Number of users: 2
===============================================================================
ALU-7# 
ALU-7# show system security user detail
===============================================================================
Users                                                                          
===============================================================================
user id           New  User Permissions  Password    Login        Failed  Local
                  Pwd  Console ftp snmp  Expires     Attempts     Logins  Conf 
-------------------------------------------------------------------------------
                                                                        
admin             n    y       n   n     never       21           0       y    
testuser          n    n       n   n     never       0            0       y
-------------------------------------------------------------------------------
Number of users: 2
===============================================================================
                                                                               
===============================================================================
User Configuration Detail                                                      
===============================================================================
===============================================================================
user id            : admin                                                     
-------------------------------------------------------------------------------
console parameters                                                             
-------------------------------------------------------------------------------
new pw required    : no                 cannot change pw   : no                
home directory     : cf3:\                                                     
restricted to home : no                                                        
login exec file    :                                                           
profile            : administrative                                            
-------------------------------------------------------------------------------
snmp parameters                                                                
-------------------------------------------------------------------------------
===============================================================================
ALU-7# 
Table 16:  Show User Output Fields   

Label

Description

User ID

The name of a system user

Need new pwd

Y: The user must change their password at the next login

N: The user is not forced to change their password at the next login

Cannot change pw

Y: The user has the ability to change the login password

N: The user does not have the ability to change the login password

User permissions

Console: Y - The user is authorized for console access

N - The user is not authorized for console access

FTP: Y - The user is authorized for FTP access

N - The user is not authorized for FTP access

SNMP: Y - The user is authorized for SNMP access

N - The user is not authorized for SNMP access

Password expires

The number of days the user has left before they must change their login password

Attempted logins

The number of times the user has attempted to log in irrespective of whether the login succeeded or failed

Failed logins

The number of unsuccessful login attempts

Local conf

Y: Password authentication is based on the local password database

N: Password authentication is not based on the local password database

Home directory

Specifies the local home directory for the user for both console and FTP access

Restricted to home

Yes: The user is not allowed to navigate to a directory higher in the directory tree on the home directory device

No: The user is allowed to navigate to a directory higher in the directory tree on the home directory device

Login exec file

Displays the user’s login exec file which executes whenever the user successfully logs in to a console session

view

Syntax 
view [view-name] [detail] [capabilities]
Context 
show>system>security
Description 

This command displays one or all views and permissions in the MIB-OID tree.

Parameters 
view-name—
specifies the name of the view to display. If no view name is specified, the complete list of views displays.
detail—
displays detailed view information
Output 

The following output is an example of view information, and Table 17 describes the fields.

Sample Output
A:ALU-48# show system security view
===============================================================================
Views
===============================================================================
view name         oid tree                        mask              permission
-------------------------------------------------------------------------------
iso               1                                                 included
read1             1.1.1.1                         11111111          included
write1            2.2.2.2                         11111111          included
testview          1                               11111111          included
testview          1.3.6.1.2                       11111111          excluded
mgmt-view         1.3.6.1.2.1.2                                     included
mgmt-view         1.3.6.1.2.1.4                                     included
mgmt-view         1.3.6.1.2.1.5                                     included
mgmt-view         1.3.6.1.2.1.6                                     included
mgmt-view         1.3.6.1.2.1.7                                     included
mgmt-view         1.3.6.1.2.1.31                                    included
mgmt-view         1.3.6.1.2.1.77                                    included
mgmt-view         1.3.6.1.4.1.6527.3.1.2.3.7                        included
mgmt-view         1.3.6.1.4.1.6527.3.1.2.3.11                       included
vprn-view         1.3.6.1.2.1.2                                     included
vprn-view         1.3.6.1.2.1.4                                     included
vprn-view         1.3.6.1.2.1.5                                     included
vprn-view         1.3.6.1.2.1.6                                     included
vprn-view         1.3.6.1.2.1.7                                     included
vprn-view         1.3.6.1.2.1.15                                    included
vprn-view         1.3.6.1.2.1.23                                    included
vprn-view         1.3.6.1.2.1.31                                    included
vprn-view         1.3.6.1.2.1.68                                    included
vprn-view         1.3.6.1.2.1.77                                    included
vprn-view         1.3.6.1.4.1.6527.3.1.2.3.7                        included
vprn-view         1.3.6.1.4.1.6527.3.1.2.3.11                       included
vprn-view         1.3.6.1.4.1.6527.3.1.2.20.1                       included
no-security       1                                                 included
no-security       1.3.6.1.6.3                                       excluded
no-security       1.3.6.1.6.3.10.2.1                                included
no-security       1.3.6.1.6.3.11.2.1                                included
no-security       1.3.6.1.6.3.15.1.1                                included
on-security       2                               00000000          included
-------------------------------------------------------------------------------
No. of Views: 33
===============================================================================
A:ALU-48#
Table 17:  Show View Output Fields  

Label

Description

view name

The name of the view. Views control the accessibility of a MIB object within the configured MIB view and subtree

oid tree

The object identifier of the ASN.1 subtree

mask

The bit mask that defines a family of view subtrees

permission

Indicates whether each view is included or excluded

No. of Views

The total number of views

Login Control Show Commands

users

Syntax 
users
Context 
show
Description 

This command displays console user login and connection information.

Output 

The following output is an example of view information, and Table 18 describes the fields.

Sample Output
A:ALU-7# show users
===============================================================================
User           Type     Login time                            Idle time
  From
===============================================================================
admin          Console  27MAY2014 13:16:59                    10d 07:35:04  A
  --
admin          SSHv2    29MAY2014 17:32:47                    0d 00:05:10
  3301::xxxx:xxxx
admin          Telnet   06JUN2014 14:23:35                    0d 00:00:00
  138.120.xxx.xxx
-------------------------------------------------------------------------------
Number of users : 1
'A' indicates user is in admin mode
===============================================================================
A:ALU-7#
Table 18:  Show Users Output Fields   

Label

Description

User

The user name

Type

The type of user access

From

The originating IP address

Login time

The time the user logged in

Idle time

The amount of idle time for a specific login

Number of users

The total number of users logged in

Clear Commands

statistics

Syntax 
statistics [interface ip-int-name | ip-address]
Context 
clear>router>authentication
Description 

This command clears authentication statistics.

Parameters 
ip-int-name —
clears the authentication statistics for the specified interface name. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.
ip-address—
clears the authentication statistics for the specified IP address

Debug Commands

radius

Syntax 
radius [detail] [hex]
no radius
Context 
debug
Description 

This command enables debugging for RADIUS connections.

The no form of the command disables the debugging.

Parameters 
detail—
displays detailed output
hex—
displays the packet dump in hexadecimal format