110
•
Two adjacent sections are separated by a pound sign (#).
•
The configuration file ends with the word
return
.
The following is a sample configuration file excerpt:
#
local-user root class manage
password hash
$h$6$Twd73mLrN8O2vvD5$Cz1vgdpR4KoTiRQNE9pg33gU14Br2p1VguczLSVyJLO2huV5Syx/LfDIf8ROLtV
ErJ/C31oq2rFtmNuyZf4STw==
service-type ssh telnet terminal
authorization-attribute user-role network-admin
authorization-attribute user-role network-operator
#
interface Vlan-interface1
ip address 192.168.1.84 255.255.255.0
#
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more
information about FIPS mode, see
Security Configuration Guide
.
Enabling configuration encryption
Configuration encryption enables the device to encrypt a startup configuration file automatically
when it saves the running configuration. All devices running Comware 7 software use the same
method to encrypt configuration files.
NOTE:
Any devices running Comware 7 software can decrypt the encrypted configuration files. To prevent
an encrypted file from being decoded by unauthorized users, make sure the file is accessible only to
authorized users.
To enable configuration encryption:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable configuration
encryption.
configuration encrypt
{
private-key
|
public-key
}
By default, configuration
encryption is disabled.
Configuration is saved
unencrypted.
Comparing configurations for their differences
You can compare configuration files or compare a configuration file with the running configuration for
their differences.
If you specify the next-startup configuration for a comparison, the system selects the next-startup
configuration file to be compared with in the following order:
Summary of Contents for FlexNetwork 10500 Series
Page 139: ...130 Sysname display version ...