Access Security Guide K/KA/KB.15.15

Contents
1 Configuring Username and Password Security..............................................20
Console access......................................................................................................................20
Creating password security......................................................................................................20
Setting an inactivity timer....................................................................................................21
Configuring local password security.....................................................................................21
Deleting password protection...............................................................................................22
Recovering from a lost manager password............................................................................22
Setting passwords and user names in the CLI.........................................................................22
Removing password protection using the CLI..........................................................................23
General password rules......................................................................................................24
Local user and password Length......................................................................................24
Restrictions for the setmib command.................................................................................25
Additional restrictions....................................................................................................25
Upgrading or downgrading software versions implications for passwords ............................25
Unable to use previous password....................................................................................26
Security credentials ................................................................................................................26
Local manager and operator credentials...............................................................................26
Password command options................................................................................................26
SNMP Security Credentials.................................................................................................27
802.1X port access credentials............................................................................................28
TACACS+ encryption key authentication...............................................................................28
RADIUS shared-secret key authentication...............................................................................29
SSH client public-key authentication......................................................................................29
Restrictions to enabling security credentials............................................................................31
Include-Credentials.................................................................................................................31
include-credentials radius-tacacs-only option..........................................................................31
Displaying the status of include-credentials on the switch.........................................................32
Executing include-credentials or include-credentials store-in-config............................................33
Storage states when using include-credentials........................................................................33
[no]include-credentials store-in-config option..........................................................................34
Enabling the storage and display of security credentials..........................................................34
Setting an encrypted password.................................................................................................35
Encrypting credentials in the configuration file.......................................................................36
Enabling Encrypt-Credentials..........................................................................................36
Displaying the state of encrypt-credentials.........................................................................37
Affected commands.......................................................................................................37
Front panel security.................................................................................................................38
Front panel security............................................................................................................38
When security is important.............................................................................................38
Front-panel button functions............................................................................................39
Clearbutton.............................................................................................................39
Reset button.............................................................................................................39
Configuring front panel security...........................................................................................40
Disabling the clear password function of the Clear button........................................................41
Setting the Clear button functionality....................................................................................42
To enable password-clear with reset-on-clear disabled........................................................42
To enable password-clear with reset-on-clear also enabled..................................................42
Changing what the Reset+Clear button combination does.......................................................42
Restoring the factory default configuration.............................................................................43
Enabling and disabling password recovery...........................................................................44
Recovering passwords........................................................................................................45
4 Contents