20
Views
System view
Predefined user roles
network-admin
Parameters
plain-password
: Specifies a key in plaintext form. The
plain-password
argument is a
case-sensitive string of 1 to 64 characters.
mode
: Specifies an authentication algorithm and encryption algorithm. The device supports the
HMAC-MD5 and HMAC-SHA1 authentication algorithms. The HMAC-MD5 algorithm is faster than
the HMAC-SHA1 algorithm. The HMAC-SHA1 algorithm provides more security than the
HMAC-MD5 algorithm. The AES256, AES192, AES, 3DES, and DES encryption algorithms (in
descending order of security strength) are available for the device. A more secure algorithm
calculates slower. DES is enough to meet general security requirements.
•
3desmd5
: Calculates the encrypted form for the encryption key by using the 3DES encryption
algorithm and HMAC-MD5 authentication algorithm.
•
3dessha
: Calculates the encrypted form for the encryption key by using the 3DES encryption
algorithm and HMAC-SHA1 authentication algorithm.
•
aes192md5
: Calculates the encrypted form for the encryption key by using the AES192
encryption algorithm and the HMAC-MD5 authentication algorithm.
•
aes192sha
: Calculates the encrypted form for the encryption key by using the AES192
encryption algorithm and the HMAC-SHA1 authentication algorithm.
•
aes256md5
: Calculates the encrypted form for the encryption key by using the AES256
encryption algorithm and the HMAC-MD5 authentication algorithm.
•
aes256
sha
: Calculates the encrypted form for the encryption key by using the AES256
encryption algorithm and the HMAC-SHA1 authentication algorithm.
•
md5
: Calculates the encrypted form for the authentication key or encryption key by using the
HMAC-MD5 authentication algorithm and AES or DES encryption algorithm. When the
HMAC-MD5 authentication algorithm is used, you can get the same authentication key or
encryption key in encrypted form regardless of whether the AES or DES encryption algorithm is
used.
•
sha
: Calculates the encrypted form for the authentication key or encryption key by using
HMAC-SHA1 authentication algorithm and AES or DES encryption algorithm. When the
HMAC-SHA1 authentication algorithm is used, you can get the same authentication key or
encryption key in encrypted form regardless of whether the AES or DES encryption algorithm is
used.
local-engineid
: Uses the local engine ID to calculate the encrypted form for the key. You can
configure the local engine ID by using the
snmp-agent local-engineid
command.
specified-engineid engineid
: Uses a user-defined engine ID to calculate the encrypted
form for the key. The
engineid
argument is an even number of case-insensitive hexadecimal
characters. All-zero and all-F strings are invalid. The even number is in the range of 10 to 64.
Usage guidelines
Make sure the SNMP agent is enabled before you execute the
snmp-agent
calculate-password
command.
For security purposes, use the encrypted-form key generated by using this command when you
create SNMPv3 users by specifying the
cipher
keyword in the
snmp-agent usm-user v3
command.
The encrypted form of the key is valid only under the engine ID specified for key conversion.
Summary of Contents for SOHO IE4300
Page 285: ...i Contents Tcl commands 1 cli 1 tclquit 1 tclsh 2...
Page 288: ...i Contents Python commands 1 exit 1 python 1 python filename 2...
Page 291: ...i Contents Automatic configuration commands 1 autodeploy udisk enable 1...
Page 323: ...25 Sysname Ten GigabitEthernet1 0 51 undo shutdown Related commands irf port...
Page 465: ...ii stp vlan enable 55 vlan mapping modulo 55...
Page 602: ...12 Related commands display mvrp statistics...
Page 609: ...i Contents VLAN mapping commands 1 display vlan mapping 1 vlan mapping 2...
Page 678: ...9 Related commands reset pppoe relay statistics...
Page 846: ...i Contents Basic IP forwarding commands 1 display fib 1 ip forwarding table save 2...
Page 1770: ...i Contents Time range commands 1 display time range 1 time range 1...
Page 2026: ...34 Related commands display mac authentication...
Page 2028: ...ii...
Page 2143: ...i Contents User profile commands 1 display user profile 1 user profile 2...
Page 2308: ...61 ipsec transform set...
Page 2531: ...i Contents SAVI commands 1 ipv6 savi down delay 1 ipv6 savi log enable 1 ipv6 savi strict 2...
Page 2534: ...3 Sysname ipv6 savi strict Related commands ipv6 verify source...
Page 2791: ...14 Sysname track 1 Related commands delay display track...
Page 2939: ...9 sntp authentication keyid sntp reliable authentication keyid...
Page 2967: ...27 Related commands apply poe profile poe enable poe max power interface view poe priority...