General Security Commands
Page 108
7950 SR OS System Management Guide
config>system>security>keychain>direction>uni>send>entry
config>system>security>pki>ca-profile
config>sys>sec>cpm>mac-filter>entry
Description
The
shutdown
command administratively disables the entity. When disabled, an entity does not
change, reset, or remove any configuration settings or statistics. Many entities must be explicitly
enabled using the
no shutdown
command. The operational state of the entity is disabled as well as
the operational state of any entities contained within. Many objects must be shut down before they
may be deleted.
The
no
form of the command puts an entity into the administratively enabled state.
Default
no shutdown
ftp-server
Syntax
[
no
]
ftp-server
Context
config>system>security
Description
This command enables FTP servers running on the system.
FTP servers are disabled by default. At system startup, only SSH server are enabled.
The
no
form of the command disables FTP servers running on the system.
hash-control
Syntax
hash-control
[
read-version
{
1 | 2 | all
}] [
write-version
{
1 | 2
}]
no hash-control
Context
config>system>security
Description
Whenever the user executes a
save
or
info
command, the system will encrypt all passwords, MD5
keys, etc., for security reasons. At present, two algorithms exist.
The first algorithm is a simple, short key that can be copied and pasted in a different location when
the user wants to configure the same password. However, because it is the same password and the
hash key is limited to the password/key, even the casual observer will notice that it is the same key.
The second algorithm is a more complex key, and cannot be copied and pasted in different locations
in the configuration file. In this case, if the same key or password is used repeatedly in different con-
texts, each encrypted (hashed) version will be different.
Default
all — read-version set to accept both versions 1 and 2
Parameters
read-version
{
1 | 2 | all
}
—
When the read-version is configured as “all,” both versions 1 and 2 will
be accepted by the system. Otherwise, only the selected version will be accepted when reading con-
figuration or exec files. The presence of incorrect hash versions will abort the script/startup.
Содержание 7950 SR
Страница 10: ...Page 10 7950 SR OS System Management Guide List of Figures...
Страница 14: ...About This Guide Page 14 7950 SR OS System Management Guide...
Страница 16: ...Alcatel Lucent 7950 SR Router Configuration Process Page 16 7950 SR OS System Management Guide...
Страница 56: ...Configuration Notes Page 56 7950 SR OS System Management Guide...
Страница 88: ...Configuring Login Controls Page 88 7950 SR OS System Management Guide...
Страница 106: ...Security Command Reference Page 106 7950 SR OS System Management Guide...
Страница 206: ...Distributed CPU Protection Commands Page 206 7950 SR OS System Management Guide...
Страница 244: ...Debug Commands Page 244 7950 SR OS System Management Guide...
Страница 254: ...Configuration Notes Page 254 7950 SR OS System Management Guide...
Страница 276: ...SNMP Security Commands Page 276 7950 SR OS System Management Guide...
Страница 296: ...Show Commands Page 296 7950 SR OS System Management Guide...
Страница 322: ...Configuration Notes Page 322 7950 SR OS System Management Guide...
Страница 358: ...Log Management Tasks Page 358 7950 SR OS System Management Guide...
Страница 454: ...Facility Alarm List Page 454 7950 SR OS System Management Guide...
Страница 460: ...Standards and Protocols Page 460 Standards and Protocols...