Cisco 350 Series Administration Manual page 558

Managed switches
Hide thumbs Also See for 350 Series:
Table of Contents

Advertisement

19
372
Startup Configuration File
The device currently supports copying from the Running, Backup, Mirror, and Remote
Configuration files to a Startup Configuration file. The configurations in the Startup
Configuration are effective and become the Running Configuration after reboot. A user can
retrieve the sensitive data encrypted or in plaintext from a startup configuration file, subject to
the SSD read permission and the current SSD read mode of the management session.
Read access of sensitive data in the startup configuration in any forms is excluded if the
passphrase in the Startup Configuration file and the local passphrase are different.
SSD adds the following rules when copying the Backup, Mirror, and Remote Configuration
files to the Startup Configuration file:
After a device is reset to factory default, all of its configurations, including the SSD
rules and properties are reset to default.
If a source configuration file contains encrypted sensitive data, but is missing an SSD
control block, the device rejects the source file and the copy fails.
If there is no SSD control block in the source configuration file, the SSD configuration
in the Startup Configuration file is reset to default.
If there is a passphrase in the SSD control block of the source configuration file, the
device will reject the source file, and the copy fails if there is encrypted sensitive data
in the file not encrypted by the key generated from the passphrase in the SSD control
block.
If there is an SSD control block in the source configuration file and the file fails the
SSD integrity check, and/or file integrity check, the device rejects the source file and
fails the copy.
If there is no passphrase in the SSD control block of the source configuration file, all
the encrypted sensitive data in the file must be encrypted by either the key generated
from the local passphrase, or the key generated from the default passphrase, but not
both. Otherwise, the source file is rejected and the copy fails.
The device configures the passphrase, passphrase control, and file integrity, if any,
from the SSD Control Block in the source configuration file to the Startup
Configuration file. It configures the Startup Configuration file with the passphrase that
is used to generate the key to decrypt the sensitive data in the source configuration file.
Any SSD configurations that are not found are reset to the default.
If there is an SSD control block in the source configuration file and the file contains
plaintext, sensitive data excluding the SSD configurations in the SSD control block,
the file is accepted.
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
Security: Secure Sensitive Data Management
Configuration Files

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents