![Cisco 350XG series Administration Manual Download Page 491](http://html.mh-extra.com/html/cisco/350xg-series/350xg-series_administration-manual_67491491.webp)
Security: Secure Sensitive Data Management
SSD Properties
Cisco 350XG & 550XG Series 10G Stackable Managed Switches
472
21
Local Passphrase
A device maintains a local passphrase which is the passphrase of its Running
Configuration. SSD normally performs encryption and decryption of sensitive data
with the key generated from the local passphrase.
The local passphrase can be configured to be either the default passphrase or a
user-defined passphrase. By default, the local passphrase and default
passphrase are identical. It can be changed by administrative actions from either
the Command Line Interface (if available) or the web-based interface. It is
automatically changed to the passphrase in the startup configuration file, when the
startup configuration becomes the running configuration of the device. When a
device is reset to factory default, the local passphrase is reset to the default
passphrase.
Configuration File Passphrase Control
File passphrase control provides additional protection for a user-defined
passphrase, and the sensitive data that are encrypted with the key generated
from the user-defined passphrase, in text-based configuration files.
The following are the existing passphrase control modes:
•
Unrestricted (default)—The device includes its passphrase when creating a
configuration file. This enables any device accepting the configuration file
to learn the passphrase from the file.
•
Restricted—The device restricts its passphrase from being exported into a
configuration file. Restricted mode protects the encrypted sensitive data in
a configuration file from devices that do not have the passphrase. This
mode should be used when a user does not want to expose the passphrase
in a configuration file.
After a device is reset to the factory default, its local passphrase is reset to the
default passphrase. As a result, the device will be not able to decrypt any
sensitive data encrypted based on a user-defined passphrase entered from a
management session (GUI/CLI), or in any configuration file with restricted mode,
including the files created by the device itself before it is reset to factory default.
This remains until the device is manually reconfigured with the user-defined
passphrase, or learns the user-defined passphrase from a configuration file.