Cisco 350 Series Administration Manual page 555

Managed switches
Hide thumbs Also See for 350 Series:
Table of Contents

Advertisement

Security: Secure Sensitive Data Management
SSD Properties
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
Default and User-defined Passphrases
All devices come with a default, out-of-the box passphrase that is transparent to users. The
default passphrase is never displayed in the configuration file or in the CLI/GUI.
If better security and protection are desired, an administrator should configure SSD on a
device to use a user-defined passphrase instead of the default passphrase. A user-defined
passphrase should be treated as a well-guard secret, so that the security of the sensitive data on
the device is not compromised.
A user-defined passphrase can be configured manually in plain text. It can also be derived
from a configuration file. (See
always displays user-defined passphrases encrypted.
Local Passphrase
A device maintains a local passphrase that is the passphrase of its Running Configuration.
SSD normally performs encryption and decryption of sensitive data with the key generated
from the local passphrase.
The local passphrase can be configured to be either the default passphrase or a user-defined
passphrase. By default, the local passphrase and default passphrase are identical. It can be
changed by administrative actions from either the Command Line Interface (if available) or
the web-based interface. It is automatically changed to the passphrase in the startup
configuration file, when the startup configuration becomes the running configuration of the
device. When a device is reset to factory default, the local passphrase is reset to the default
passphrase.
Configuration File Passphrase Control
File passphrase control provides additional protection for a user-defined passphrase, and the
sensitive data that are encrypted with the key generated from the user-defined passphrase, in
text-based configuration files.
The following are the existing passphrase control modes:
Unrestricted (default)—The device includes its passphrase when creating a
configuration file. This enables any device accepting the configuration file to learn the
passphrase from the file.
Restricted—The device restricts its passphrase from being exported into a
configuration file. Restricted mode protects the encrypted sensitive data in a
configuration file from devices that do not have the passphrase. This mode should be
used when a user does not want to expose the passphrase in a configuration file.
Sensitive Data Zero-Touch Auto
19
Configuration). A device
369

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents