Security: Secure Sensitive Data Management
SSD Rules
323
Cisco Sx350, SG350X, SG350XG, Sx550X & SG550XG Series Managed Switches, Firmware Release 2.2.5.x
18
SSD Rules and User Authentication
SSD grants SSD permission only to authenticated and authorized users and according to the
SSD rules. A device depends on its user authentication process to authenticate and authorize
management access. To protect a device and its data including sensitive data and SSD
configurations from unauthorized access, it is recommended that the user authentication
process on a device is secured. To secure the user authentication process, you can use the local
authentication database, as well as secure the communication through external authentication
servers, such as a RADIUS server. The configuration of the secure communication to the
external authentication servers are sensitive data and are protected under SSD.
NOTE
The user credential in the local authenticated database is already protected by a non SSD related
mechanism
If a user from a channel issues an action that uses an alternate channel, the device applies the
read permission and default read mode from the SSD rule that match the user credential and
the alternate channel. For example, if a user logs in via a secure channel and starts a TFTP
upload session, the SSD read permission of the user on the insecure channel (TFTP) is applied
Default SSD Rules
The device has the following factory default rules:
The default rules can be modified, but they cannot be deleted. If the SSD default rules have
been changed, they can be restored.
Table 1
Rule Key
Rule Action
User Channel
Read
Permission Default
Read
Mode
Level 15
Secure XML
SNMP
Plaintext Only
Plaintext
Level 15
Secure
Both
Encrypted
Level 15
Insecure
Both
Encrypted
All Insecure
XML
SNMP
Exclude Exclude
All Secure
Encrypted
Only
Encrypted
All Insecure
Encrypted
Only
Encrypted