Cisco SR224T Administration Guide - Page 256

Secure Sensitive Data, Table 2, Default Read Modes for Read Permissions, Read Permission

Page 256 highlights

Secure Sensitive Data SSD Rules 19 Table 2 Default Read Modes for Read Permissions Read Permission Default Read Mode Allowed Both *Plaintext, Encrypted * The Read mode of a session can be temporarily changed in the SSD Properties page if the new read mode does not violate the read permission. NOTE Note the following: • The default Read mode for the Secure XML SNMP and Insecure XML SNMP management channels must be identical to their read permission. • Read permission Exclude is allowed only for Secure XML SNMP and Insecure XML SNMP management channels; Exclude is not allowed for regular secure and insecure channels. • Exclude sensitive data in secure and Insecure XML-SNMP management channels means that the sensitive data is presented as a 0 (meaning null string or numeric 0). If the user wants to view sensitive data, the rule must be changed to plaintext. • By default, an SNMPv3 user with privacy and XML-over-secure channels permissions is considered to be a level-15 user. • SNMP users on Insecure XML and SNMP (SNMPv1,v2, and v3 with no privacy) channel are considered as All users. • There must always be at least one rule with read permission: Plaintext Only or Both, because only users with those permissions are able to access the SSD pages. • Changes in the default read mode and read permissions of a rule will become effective, and will be applied to the affected user(s) and channel of all active management sessions immediately, excluding the session making the changes even if the rule is applicable. When a rule is changed (add, delete, edit), a system will update all the affected CLI/GUI sessions. NOTE When the SSD rule applied upon the session login is changed from within that session, the user must log out and back in to see the change. Cisco Small Business 200 Series Smart Switch Administration Guide 257

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283

Secure Sensitive Data
SSD Rules
Cisco Small Business 200 Series Smart Switch Administration Guide
257
19
* The Read mode of a session can be temporarily changed in the SSD
Properties
page if the new read mode does not violate the read permission.
NOTE
Note the following:
The default Read mode for the Secure XML SNMP and Insecure XML SNMP
management channels must be identical to their read permission.
Read permission Exclude is allowed only for Secure XML SNMP and
Insecure XML SNMP management channels; Exclude is not allowed for
regular secure and insecure channels.
Exclude sensitive data in secure and Insecure XML-SNMP management
channels means that the sensitive data is presented as a 0 (meaning null
string or numeric 0). If the user wants to view sensitive data, the rule must
be changed to plaintext.
By default, an SNMPv3 user with privacy and XML-over-secure channels
permissions is considered to be a level-15 user.
SNMP users on Insecure XML and SNMP (SNMPv1,v2, and v3 with no
privacy) channel are considered as All users.
There must always be at least one rule with read permission: Plaintext Only
or Both, because only users with those permissions are able to access the
SSD pages.
Changes in the default read mode and read permissions of a rule will
become effective, and will be applied to the affected user(s) and channel of
all active management sessions immediately, excluding the session making
the changes even if the rule is applicable. When a rule is changed (add,
delete, edit), a system will update all the affected CLI/GUI sessions.
NOTE
When the SSD rule applied upon the session login is changed from
within that session, the user must log out and back in to see the change.
Both
*Plaintext, Encrypted
Table 2
Default Read Modes for Read Permissions
Read Permission
Default Read Mode Allowed