hit counter script

Cisco 300 Series Administration Manual page 481

Managed switch
Hide thumbs Also See for 300 Series:
Table of Contents

Advertisement

Security: Secure Sensitive Data Management
SSD Rules
NOTE
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)
is recommended that the user authentication process on a device is secured. To
secure the user authentication process, you can use the local authentication
database, as well as secure the communication through external authentication
servers, such as a RADIUS server. The configuration of the secure communication
to the external authentication servers are sensitive data and are protected under
SSD.
The user credential in the local authenticated database is already protected by a
non SSD related mechanism
If a user from a channel issues an action that uses an alternate channel, the device
applies the read permission and default read mode from the SSD rule that match
the user credential and the alternate channel. For example, if a user logs in via a
secure channel and starts a TFTP upload session, the SSD read permission of the
user on the insecure channel (TFTP) is applied
Default SSD Rules
The device has the following factory default rules:
Table 3
Rule Key
User
Channel
Level
Secure XML
15
SNMP
Level
Secure
15
Level
Insecure
15
All
Insecure XML
SNMP
All
Secure
All
Insecure
The default rules can be modified, but they cannot be deleted. If the SSD default
rules have been changed, they can be restored.
Rule Action
Read
Default Read Mode
Permission
Plaintext Only
Plaintext
Both
Encrypted
Both
Encrypted
Exclude
Exclude
Encrypted Only
Encrypted
Encrypted Only
Encrypted
21
443

Advertisement

Table of Contents
loading

Table of Contents