Alcatel-Lucent 7705 SAR-8 System Management Manual page 81

Service aggregation router os
Table of Contents

Advertisement

hash-control
Syntax
hash-control [read-version {1 | 2 | all}] [write-version {1 | 2}]
no hash-control
Context
config>system>security
Description
Whenever the user executes a save or info command, the system will encrypt all passwords and keys,
and so on for security reasons. At present, two algorithms exist.
The first algorithm is a simple, short key that can be copied and pasted in a different location when the
user wants to configure the same password. However, because it is the same password and the hash
key is limited to the password/key, it is obvious that it is the same key.
The second algorithm is a more complex key, and cannot be copied and pasted in different locations
in the configuration file. In this case, if the same key or password is used repeatedly in different
contexts, each encrypted (hashed) version will be different.
Default
all — read-version set to accept both versions 1 and 2
Parameters
read-version {1 | 2 | all} — when the read-version is configured as "all," both versions 1 and 2 will
be accepted by the system. Otherwise, only the selected version will be accepted when reading
configuration or exec files. The presence of incorrect hash versions will abort the script/startup.
write-version {1 | 2} — selects the hash version that will be used the next time the configuration file
is saved (or an info command is executed). Be careful to save the read and write version correctly, so
that the file can be properly processed after the next reboot or exec.
source-address
Syntax
source-address
Context
config>system>security
Description
This command specifies the source address that should be used in all unsolicited packets sent by the
application.
application
Syntax
application app [ip-int-name | ip-address]
no application app
Context
config>system>security>source-address
Description
This command specifies the application to use the source IP address specified by the source-address
command.
The no form of the command removes the specified source address from the application, causing the
application to use the system IP address as the source address.
7705 SAR OS System Management Guide
Security
Page 81

Advertisement

Table of Contents
loading

This manual is also suitable for:

7705 sar-f7705

Table of Contents