Chapter 23: Access Management and Security (CLI)
Blocking Telnet Access (CLI)
phn-3965_006v002
Page 23-19
Configuring HTTPS Cipher Hardening (CLI)
You can configure the PTP 820 to operate in HTTPS strong mode. In HTTPS strong mode, SSLv3, TLSv1.0, and
TLSv1.1 are disabled completely and only certain ciphers are supported in TLSv1.2.
For a list of supported HTTPS ciphers, including an indication of which ciphers are supported in HTTPS strong
mode,
To set HTTPS strong mode, enter the following command:
root> platform security https-ciphers-hardening-level-set level strong
To set HTTPS normal mode, enter the following command:
root> platform security https-ciphers-hardening-level-set level normal
Note:
The default HTTP cipher mode is normal.
To display the current HTTPS cipher mode, enter the following command:
root> platform security https-ciphers-hardening-level-show
Blocking Telnet Access (CLI)
You can block telnet access to the unit. By default, telnet access is not blocked.
To block telnet access, enter the following command:
root> platform security protocols-control telnet admin set disable
To unblock telnet access, enter the following command:
root> platform security protocols-control telnet admin set enable
To display whether telnet is currently allowed (enable) or blocked (disable), enter the following command:
root> platform security protocols-control telnet show
Note:
When you block telnet, any current telnet sessions are immediately disconnected.
Summary of Contents for PTP 820 Series
Page 1: ...User Guide ...
Page 49: ...Chapter 1 Introduction Configuration Tips phn 3965_006v002 Page 1 3 ...
Page 162: ...Chapter 3 Configuration Guide System Configurations phn 3965_006v002 Page 3 4 ...
Page 294: ...Chapter 4 Unit Management Upgrading the Software phn 3965_006v002 Page 4 19 5 Select FTP ...
Page 713: ...Chapter 14 Getting Started CLI Configuring the Activation Key CLI phn 3965_006v002 Page 14 18 ...
Page 731: ...Chapter 14 Getting Started CLI Operating in FIPS Mode CLI phn 3965_006v002 Page 14 36 ...