Configuring enhanced security
Prerequisites
If you have switch configuration that you want to retain, create a backup. This procedure erases all configuration, including the current running configuration, the startup configuration, and all historical configuration checkpoints.
Procedure
- Set enhanced security mode:
- Ensure adequate password requirements:
- Before adding users, enable and configure password complexity as described in
password complexity
. To maintain enhanced security, configure thepassword complexity
subcommand settings no smaller than their defaults. - Configure passwords for all users, including
admin
. To make your password complexity settings applicable to the default admin user, change the admin password after enabling password complexity. The new admin password must respect your password complexity settings.
- Before adding users, enable and configure password complexity as described in
- Ensure proper login management as follows:
- Configure local user session management as described inCLI user session management commandsusing
cli-session
and its subcommandsmax-per-user
,timeout
, andtracking-range
to achieve the wanted configuration. To maintain enhanced security, configurecli-session
subcommand settings no smaller than their defaults. - Restrict remote SSH connections to only use certified crypto algorithms using
ssh certified-algorithms-only
. - Configure pre- and post-login banners using respectively,
banner motd
, andbanner exec
.
- Configure local user session management as described inCLI user session management commandsusing
- Ensure that the switch date and time is accurately set using
clock datetime
. - When logging to a remote syslog server is required, ensure that the connection to the server is cryptographically secure. SeeConfiguring remote logging using SSH reverse tunnel.
To ensure that enhanced security is maintained, also respect these requirements:
Do not configure remote logging with a remote server directly without setting up an SSH tunnel.
不使用t配置密码和密钥he plaintext option.
NOTE:
When in enhanced security mode, the switch (Product OS)
start-shell
command is disabled for security purpose. If you attempt to use this command while in enhanced security mode, it is rejected and the following error message is displayed:The start-shell command is not available in enhanced secure mode.
NOTE:
When in enhanced security mode, the following Service OS commands are disabled for security purposes:config-clear
,password
,sh
, andupdate
. If you attempt to use any of these Service OS commands while in enhanced security mode, the command is rejected and an error message is displayed: