Alcatel-Lucent 7705 SAR System Management Manual page 79

Service aggregation router os
Hide thumbs Also See for 7705 SAR:
Table of Contents

Advertisement

hash-control
Syntax
hash-control [read-version {1 | 2 | all}] [write-version {1 | 2}]
no hash-control
Context
config>system>security
Description
Whenever the user executes a save or info command, the system will encrypt all passwords, keys, and
so on for security reasons. At present, two algorithms exist.
The first algorithm is a simple, short key that can be copied and pasted in a different location when the
user wants to configure the same password. However, because it is the same password and the hash
key is limited to the password/key, it is obvious that it is the same key.
The second algorithm is a more complex key, and cannot be copied and pasted in different locations
in the configuration file. In this case, if the same key or password is used repeatedly in different
contexts, each encrypted (hashed) version will be different.
Default
all — read-version set to accept both versions 1 and 2
Parameters
read-version {1 | 2 | all} — when the read-version is configured as "all," both versions 1 and 2
write-version {1 | 2} — selects the hash version that will be used the next time the configuration
source-address
Syntax
source-address
Context
config>system>security
Description
This command specifies the source address that should be used in all unsolicited packets sent by the
application.
application
Syntax
application app [ip-int-name | ip-address]
no application app
Context
config>system>security>source-address
Description
This command specifies the application to use the source IPv4 address specified by the source-
address command.
7705 SAR OS System Management Guide
will be accepted by the system. Otherwise, only the selected version will be accepted when
reading configuration or exec files. The presence of incorrect hash versions will abort the
script/startup.
file is saved (or an info command is executed). Be careful to save the read and write version
correctly, so that the file can be properly processed after the next reboot or exec.
Security
79

Advertisement

Table of Contents
loading

Table of Contents