hit counter script

Ssd File Integrity Control - Cisco 300 Series Cli Manual

Stackable managed switches
Hide thumbs Also See for 300 Series:
Table of Contents

Advertisement

47
935
If a user-defined passphrase in Unrestricted mode are configured, it is highly
recommended to enable SSD File Integrity Control. Enabling SSD File Integrity
Control protects configuration files from tampering.
Examples
console(ssd-config)# ssd file passphrase control restricted
console(ssd-config)# no ssd file passphrase control
47.8

ssd file integrity control

To instruct the device to protect newly-generated configuration files that contain
encrypted sensitive data from tampering, use ssd file integrity control command in
SSD Configuration mode.
To disable Integrity Control, use no ssd file integrity control.
Syntax
ssd file integrity control
no ssd file integrity control
Parameters
enabled—Enable file integrity control to protect newly-generated
configuration files from tampering.
Default
The default file input control is disable.
Command Mode
SSD Configuration mode.
User Guidelines
TA user can protect a configuration file from being tampered by creating the file
with File Integrity Control enabled. It is recommended that File Integrity Control be
enabled when a devices users a user-defined passphrase with Unrestricted
Configuration File Passphrase Control.
enabled
OL-32830-01 Command Line Interface Reference Guide
SSD Commands

Advertisement

Table of Contents
loading

Table of Contents