- sa ipsec through sessions maximum
- set aggressive-mode client-endpoint through show content-scan
- show diameter peer through show object-group
- show parameter-map type consent through show users
- show vlan group through switchport port-security violation
- tacacs-server administration through title-color
- traffic-export through zone security
- Index
sa ipsec through sessions maximum
- server_(Diameter)
- server (RADIUS)
- server name (IPv6 TACACS+)
- server-private (RADIUS)
- server-private (TACACS+)
- service password-encryption
- service password-recovery
server_(Diameter)
To associate a Diameter server with a Diameter authentication, authorization, and accounting (AAA) server group, use the server command in Diameter server group configuration submode. To remove a server from the server group, enter the no form of this command.
server name
no server name
Syntax Description
name |
Character string used to name the Diameter server.
|
Command Default
No server is associated with a Diameter AAA server group.
Command Modes
Diameter server group configuration
Command History
Release |
Modification |
---|---|
12.4(9)T |
This command was introduced. |
Usage Guidelines
The server command allows you to associate a Diameter server with a Diameter server group.
Examples
The following example shows how to associate a Diameter server with a Diameter server group:
Router (config-sg-diameter)# server
dia_peer_1
Related Commands
Command |
Description |
---|---|
aaa accounting |
Enables AAA accounting of requested services for billing or security purposes. |
aaa authentication login |
Set AAA authentication at login. |
aaa authorization |
Sets parameters that restrict user access to a network. |
aaa group server diameter |
Configures a server group for Diameter. |
server (RADIUS)
To configure the IP address of the RADIUS server for the group server, use the servercommand in server-group configuration mode. To remove the associated server from the authentication, authorization, and accounting (AAA) group server, use the no form of this command.
server ip-address [ auth-port port-number ] [ acct-port port-number ]
no server ip-address [ auth-port port-number ] [ acct-port port-number ]
Syntax Description
ip-address |
IP address of the RADIUS server host. |
auth-port port-number |
(Optional) Specifies the User Datagram Protocol (UDP) destination port for authentication requests. The port-number argument specifies the port number for authentication requests. The host is not used for authentication if this value is set to 0. |
acct-port port-number |
(Optional) Specifies the UDP destination port for accounting requests. The port number argument specifies the port number for accounting requests. The host is not used for accounting services if this value is set to 0. |
Command Default
If no port attributes are defined, the defaults are as follows:
Authentication port: 1645
Accounting port: 1646
Command Modes
Server-group configuration
Command History
Usage Guidelines
Use the server command to associate a particular server with a defined group server. There are two different ways in which you can identify a server, depending on the way you want to offer AAA services. You can identify the server simply by using its IP address, or you can identify multiple host instances or entries using the optional auth-port and acct-port keywords.
When you use the optional keywords, the network access server identifies RADIUS security servers and host instances associated with a group server on the basis of their IP address and specific UDP port numbers. The combination of the IP address and UDP port number creates a unique identifier, allowing different ports to be individually defined as RADIUS host entries providing a specific AAA service. If two different host entries on the same RADIUS server are configured for the same service--for example, accounting--the second host entry configured acts as failover backup to the first one. Using this example, if the first host entry fails to provide accounting services, the network access server will try the second host entry configured on the same device for accounting services. (The RADIUS host entries will be tried in the order they are configured.)
Examples
Examples
The following example shows the network access server configured to recognize several RADIUS host entries with the same IP address. Two different host entries on the same RADIUS server are configured for the same services--authentication and accounting. The second host entry configured acts as fail-over backup to the first one. (The RADIUS host entries are tried in the order in which they are configured.)
! This command enables AAA. aaa new-model ! The next command configures default RADIUS parameters. aaa authentication ppp default radius ! The next set of commands configures multiple host entries for the same IP address. radius-server host 172.20.0.1 auth-port 1000 acct-port 1001 radius-server host 172.20.0.1 auth-port 2000 acct-port 2000
Examples
In this example, the network access server is configured to recognize two different RADIUS group servers. One of these groups, group1, has two different host entries on the same RADIUS server configured for the same services. The second host entry configured acts as failover backup to the first one.
! This command enables AAA. aaa new-model ! The next command configures default RADIUS parameters. aaa authentication ppp default group group1 ! The following commands define the group1 RADIUS group server and associates servers ! with it. aaa group server radius group1 server 172.20.0.1 auth-port 1000 acct-port 1001 ! The following commands define the group2 RADIUS group server and associates servers ! with it. aaa group server radius group2 server 172.20.0.1 auth-port 2000 acct-port 2001 ! The following set of commands configures the RADIUS attributes for each host entry ! associated with one of the defined group servers. radius-server host 172.20.0.1 auth-port 1000 acct-port 1001 radius-server host 172.20.0.1 auth-port 1000 acct-port 1001 radius-server host 172.31.0.1 auth-port 1645 acct-port 1646
Related Commands
Command |
Description |
---|---|
aaa group server |
Groups different server hosts into distinct lists and distinct methods. |
aaa new-mode l |
Enables the AAA access control model. |
radius-server host |
Specifies a RADIUS server host. |
server name (IPv6 TACACS+)
To specify an IPv6 TACACS+ server, use the server namecommand in TACACS+ group server configuration mode. To remove the IPv6 TACACS+ server from configuration, use the no form of this command.
server name server-name
no server name server-name
Syntax Description
server-name |
The IPv6 TACACS+ server to be used. |
Command Default
No server name is specified.
Command Modes
TACACS+ group server configuration (config-sg-tacacs+)
Command History
Release |
Modification |
---|---|
Cisco IOS XE Release 3.2S |
This command was introduced. |
Usage Guidelines
You must configure the aaa group server tacacs command before configuring this command.
Enter the server name command to specify an IPv6 TACACS+ server.
Examples
The following example shows how to specify an IPv6 TACACS+ server named server1:
Router(config)# aaa group server tacacs+ Router(config-sg-tacacs+)# server name server1
Related Commands
Command |
Description |
---|---|
aaa group server tacacs |
Configures the TACACS+ server for IPv6 or IPv4 and enters TACACS+ server configuration mode. |
server-private (RADIUS)
To configure the IP address of the private RADIUS server for the group server, use the server-private command in RADIUS server-group configuration mode. To remove the associated private server from the authentication, authorization, and accounting (AAA) group server, use the no form of this command.
server-private ip-address [ auth-port port-number | acct-port port-number ] [non-standard] [ timeout seconds ] [ retransmit retries ] [ key string ]
no server-private ip-address [ auth-port port-number | acct-port port-number ] [non-standard] [ timeout seconds ] [ retransmit retries ] [ key string ]
Syntax Description
ip-address |
IP address of the private RADIUS server host. |
auth-port port-number |
(Optional) User Datagram Protocol (UDP) destination port for authentication requests. The default value is 1645. |
acct-port port-number |
Optional) UDP destination port for accounting requests. The default value is 1646. |
non-standard |
(Optional) RADIUS server is using vendor-proprietary RADIUS attributes. |
timeout seconds |
(Optional) Time interval (in seconds) that the router waits for the RADIUS server to reply before retransmitting. This setting overrides the global value of the radius-server timeout command. If no timeout value is specified, the global value is used. |
retransmit retries |
(Optional) Number of times a RADIUS request is resent to a server, if that server is not responding or responding slowly. This setting overrides the global setting of the radius-server retransmit command. |
key string |
(Optional) Authentication and encryption key used between the router and the RADIUS daemon running on the RADIUS server. This key overrides the global setting of the radius-server key command. If no key string is specified, the global value is used. The string can be 0 (specifies that an unencrypted key follows), 6 (specifies that an advanced encryption scheme [AES] encrypted key follows), 7 (specifies that a hidden key follows), or a line specifying the unencrypted (clear-text) server key. |
Command Default
If server-private parameters are not specified, global configurations will be used; if global configurations are not specified, default values will be used.
Command Modes
RADIUS server-group configuration (config-sg-radius)
Command History
Release |
Modification |
---|---|
12.2(1)DX |
This command was introduced on the Cisco 7200 series and Cisco 7401ASR. |
12.2(2)DD |
This command was integrated into Cisco IOS Release 12.2(2)DD. |
12.2(4)B |
This command was integrated into Cisco IOS Release 12.2(4)B. |
12.2(13)T |
This command was integrated into Cisco IOS Release 12.2(13)T. |
12.2(28)SB |
This command was integrated into Cisco IOS Release 12.2(28)SB. |
12.2(33)SRC |
This command was integrated into Cisco IOS Release 12.2(33)SRC. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
12.2(33)SXI |
This command was integrated into Cisco IOS Release 12.2(33)SXI. |
15.4(1)T |
This command was modified. The 6 keyword was added. |
Usage Guidelines
Use the server-private command to associate a particular private server with a defined server group. To prevent possible overlapping of private addresses between virtual route forwarding (VRF) instances, private servers (servers with private addresses) can be defined within the server group and remain hidden from other groups, while the servers in the global pool (default "radius" server group) can still be referred to by IP addresses and port numbers. Thus, the list of servers in server groups includes references to the hosts in the global configuration and the definitions of private servers.
Note | If the radius-server directed-request command is configured, then a private RADIUS server cannot be used as the group server by configuring the server-private (RADIUS) command. |
Use the password encryption aes command to configure type 6 AES encrypted keys.
Examples
The following example shows how to define the sg_water RADIUS group server and associate private servers with it:
Device> enable Device# configure terminal Device(config)# aaa new-model Device(config)# aaa group server radius sg_water Device(config-sg-radius)# server-private 10.1.1.1 timeout 5 retransmit 3 key xyz Device(config-sg-radius)# server-private 10.2.2.2 timeout 5 retransmit 3 key xyz
Related Commands
Command |
Description |
---|---|
aaa group server |
Groups different server hosts into distinct lists and distinct methods. |
aaa new-model |
Enables the AAA access control model. |
password encryption aes |
Enables a type 6 encrypted preshared key. |
radius-server host |
Specifies a RADIUS server host. |
radius-server directed-request |
Allows users to log in to a Cisco NAS and select a RADIUS server for authentication. |
server-private (TACACS+)
To configure the IPv4 or IPv6 address of the private TACACS+ server for the group server, use the server-private command in TACACS+ server-group configuration mode. To remove the associated private server from the authentication, authorization, and accounting (AAA) group server, use the no form of this command.
server-private { ip-address | name | ipv6-address } [nat] [single-connection] [ port port-number ] [ timeout seconds ] [ key [ 0 | 6 | 7 ] string ]
no server-private
Syntax Description
Command Default
If server-private parameters are not specified, global configurations are used; if global configurations are not specified, default values are used.
Command Modes
TACACS+ server-group configuration (config-sg-tacacs+)
Command History
Release |
Modification |
---|---|
12.3(7)T |
This command was introduced. |
12.2(33)SRA1 |
This command was integrated into Cisco IOS Release 12.2(33)SRA1. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
12.2(33)SXI |
This command was integrated into Cisco IOS Release 12.2(33)SXI. |
12.2(54)SG |
This command was integrated into Cisco IOS Release 12.2(54)SG. |
Cisco IOS XE Release 3.2S |
This command was modified. The ipv6-address argument was added. |
15.4(1)T |
This command was modified. The 6 keyword was added. |
Usage Guidelines
Use the server-private command to associate a particular private server with a defined server group. To prevent possible overlapping of private addresses between virtual route forwardings (VRFs), private servers (servers with private addresses) can be defined within the server group and remain hidden from other groups, while the servers in the global pool (default "TACACS+" server group) can still be referred to by IP addresses and port numbers. Thus, the list of servers in server groups includes references to the hosts in the global configuration and the definitions of private servers.
Use the password encryption aes command to configure type 6 AES encrypted keys.
Examples
The following example shows how to define the tacacs1 TACACS+ group server and associate private servers with it:
Device> enable Device# configure terminal Device(config)# aaa new-model Device(config)# aaa group server tacacs+ tacacs1 Device(config-sg-tacacs+)# server-private 10.1.1.1 port 19 key cisco Device(config-sg-tacacs+)# exit Device(config)# ip vrf cisco Device(config-vrf)# rd 100:1 Device(config-vrf)# exit Device(config)# interface Loopback0 Device(config-if)# ip address 10.0.0.2 255.0.0.0 Device(config-if)# ip vrf forwarding cisco Device(config-if)# exit
Related Commands
Command |
Description |
---|---|
aaa group server |
Groups different server hosts into distinct lists and distinct methods. |
aaa new-model |
Enables the AAA access control model. |
ip tacacs source-interface |
Uses the IP address of a specified interface for all outgoing TACACS+ packets. |
ip vrf forwarding (server-group) |
Configures the VRF reference of an AAA RADIUS or TACACS+ server group. |
password encryption aes |
Enables a type 6 encrypted preshared key. |
tacacs-server host |
Specifies a TACACS+ server host. |
service password-encryption
To automatically convert unencrypted passwords to encrypted passwords, use the service password-encryption command in global configuration mode. To restore the default, use the no form of this command.
service password-encryption
no service password-encryption
Syntax Description
This command has no arguments or keywords.
Command Default
No passwords are encrypted.
Command Modes
Global configuration
Command History
Release |
Modification |
---|---|
10.0 |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
12.2(33)SB |
This command was integrated into Cisco IOS Release 12.2(33)SB. |
Usage Guidelines
The actual encryption process occurs when the current configuration is written or when a password is configured. Password encryption is applied to all passwords, including username passwords, authentication key passwords, the privileged command password, console and virtual terminal line access passwords, and Border Gateway Protocol neighbor passwords. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file.
When password encryption is enabled, the encrypted form of the passwords is displayed when a more system:running-config command is entered.
Caution | This command does not provide a high level of network security. If you use this command, you should also take additional network security measures. |
Note | You cannot recover a lost encrypted password. You must clear NVRAM and set a new password. |
Examples
The following example causes password encryption to take place:
service password-encryption
Related Commands
Command |
Description |
---|---|
enable password |
Sets a local password to control access to various privilege levels. |
key-string (authentication) |
Specifies the authentication string for a key. |
neighbor password |
Enables MD5 authentication on a TCP connection between two BGP peers. |
service password-recovery
To enable password recovery capability, use the service password-recovery command in global configuration mode. To disable password recovery capability, use the no service password-recovery [strict] command.
service password-recovery
no service password-recovery[strict]
Syntax Description
[strict] |
(Optional) Restricts device recovery. |
Command Default
Password recovery capability is enabled.
Command Modes
Global configuration
Command History
Release |
Modification |
---|---|
12.3(8)YA |
This command was introduced. |
12.3(14)T |
This command was integrated into Cisco IOS Release 12.3(14)T. |
15.1(1)SY |
This command was integrated into Cisco IOS Release 15.1(1)SY. |
Cisco IOS XE Release 3.10S |
This command was integrated into Cisco IOS XE Release 3.10S. The strict keyword was added to the no form of this command. |
Usage Guidelines
Note | This command is not available on all platforms. Use Feature Navigator to ensure that it is available on your platform. |
If you plan to disable the password recovery capability with the no service password-recovery command, we recommend that you save a copy of the system configuration file in a location away from the device. If you are using a device that is operating in VTP transparent mode, we recommend that you also save a copy of the vlan.dat file in a location away from the device.
Caution | Entering the no service password-recovery command at the command line disables password recovery. Always disable this command before downgrading to an image that does not support password recovery capability, because you cannot recover the password after the downgrade. |
The configuration register boot bit must be enabled so that there is no way to break into ROMMON when this command is configured. Cisco IOS software should prevent the user from configuring the boot field in the config register.
Bit 6, which ignores the startup configuration, and bit 8, which enables a break should be set.
The Break key should be disabled while the router is booting up and disabled in Cisco IOS software when this feature is enabled.
It may be necessary to use the config-register global configuration command to set the configuration register to autoboot before entering the no service password-recovery command. The last line of the show version EXEC command displays the configuration register setting. Use the show version EXEC command to obtain the current configuration register value, configure the router to autoboot with the config-register command if necessary, then enter the no service password-recovery command.
Once disabled, the following configuration register values are invalid for the no service password-recovery command:
The no service password-recoverystrict command does not allow device recovery and prevents the send break command, which is used to recover a device from the no service password-recovery feature, from having any effect during bootup.
The strict keyword is supported on the Cisco ASR 1000 Series platform, effective from Cisco IOS XE Release 3.10.
Note | Since the strict keyword makes the router unrecoverable, before you use the keyword, ensure that you configure the password and configuration register, set up the autoboot image, save the configuration and reboot the router. Only if the correct image is autobooted and the enable password works, should you add the no service password-recovery strict command to the configuration. If the enable password is lost, the router should be shipped back to the Cisco support center to fix it. |
Catalyst Switch Operation
Use the service password-recovery command to reenable the password-recovery mechanism (the default). This mechanism allows a user with physical access to the switch to hold down the Mode button and interrupt the boot process while the switch is powering up and to assign a new password. Use the no form of this command to disable the password-recovery capability.
When the password-recovery mechanism is disabled, interrupting the boot process is allowed only if the user agrees to set the system back to the default configuration. Use the show version EXEC command to verify if password recovery is enabled or disabled on a switch.
The service password-recovery command is valid only on Catalyst 3550 Fast Ethernet switches; it is not available for Gigabit Ethernet switches.
Examples
The following example shows how to obtain the configuration register setting (which in this example is set to autoboot), disable the password-recovery capability, and then verify that the configuration persists through a system reload. The noconfirm keyword prevents a confirmation prompt from interrupting the booting process.
Router# show version Cisco Internetwork Operating System Software IOS (tm) 5300 Software (C7200-P-M), Version 12.3(8)YA, RELEASE SOFTWARE (fc1) TAC Support: http://www.cisco.com/tac Copyright (c) 1986-2004 by Cisco Systems, Inc. Compiled Wed 05-Mar-03 10:16 by xxx Image text-base: 0x60008954, data-base: 0x61964000 ROM: System Bootstrap, Version 12.3(8)YA, RELEASE SOFTWARE (fc1) BOOTLDR: 7200 Software (C7200-KBOOT-M), Version 12.3(8)YA, RELEASE SOFTWARE (fc1) Router uptime is 10 minutes System returned to ROM by reload at 16:28:11 UTC Thu Mar 6 2003 . . . 125440K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes). 8192K bytes of Flash internal SIMM (Sector size 256K). Configuration register is 0x2012 Router# configure terminal Router(config)# no service password-recovery noconfirm WARNING: Executing this command will disable the password recovery mechanism. Do not execute this command without another plan for password recovery. Are you sure you want to continue? [yes/no]: yes . . . Router(config)# exit Router# Router# reload Proceed with reload? [confirm] yes 00:01:54: %SYS-5-RELOAD: Reload requested System Bootstrap, 12.3(8)YA... Copyright (c) 1994-2004 by cisco Systems, Inc. C7400 platform with 262144 Kbytes of main memory PASSWORD RECOVERY FUNCTIONALITY IS DISABLED . . .
The following example shows what happens when a break is confirmed and when a break is not confirmed.
Examples
PASSWORD RECOVERY FUNCTIONALITY IS DISABLED program load complete, entry point: 0x80013000, size: 0x8396a8 Self decompressing the image : ########################################################################################################################### [OK] !The 5-second window starts. telnet> send break Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 Cisco IOS Software, C831 Software (C831-K9O3SY6-M), Version 12.3(8)YA Copyright (c) 1986-2004 by Cisco Systems, Inc. Compiled Fri 13-Aug-04 03:21 Image text-base: 0x80013200, data-base: 0x81020514 PASSWORD RECOVERY IS DISABLED. Do you want to reset the router to factory default configuration and proceed [y/n]? !The user enters "y" here. Reset router configuration to factory default. This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to export@cisco.com. Cisco C831 (MPC857DSL) processor (revision 0x00) with 46695K/2457K bytes of memory. Processor board ID 0000 (1314672220), with hardware revision 0000 CPU rev number 7 3 Ethernet interfaces 4 FastEthernet interfaces 128K bytes of NVRAM 24576K bytes of processor board System flash (Read/Write) 2048K bytes of processor board Web flash (Read/Write) --- System Configuration Dialog --- Would you like to enter the initial configuration dialog? [yes/no]: no !Start up config is erased. SETUP: new interface FastEthernet1 placed in "up" state SETUP: new interface FastEthernet2 placed in "up" state SETUP: new interface FastEthernet3 placed in "up" state SETUP: new interface FastEthernet4 placed in "up" state Press RETURN to get started! Router> enable Router# show startup configuration startup-config is not present Router# show running-config | incl service no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption !The "no service password-recovery" is disabled. ==========================================================================================
Examples
PASSWORD RECOVERY FUNCTIONALITY IS DISABLED telnet> send break program load complete, entry point: 0x80013000, size: 0x8396a8 Self decompressing the image : #################################################################################################################################################################### [OK] telnet> send break Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 Cisco IOS Software, C831 Software (C831-K9O3SY6-M), Version 12.3(8)YA Copyright (c) 1986-2004 by Cisco Systems, Inc. Compiled Fri 13-Aug-04 03:21 Image text-base: 0x80013200, data-base: 0x81020514 PASSWORD RECOVERY IS DISABLED. Do you want to reset the router to factory default configuration and proceed [y/n]? !The user enters "n" here. This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to export@cisco.com. Cisco C831 (MPC857DSL) processor (revision 0x00) with 46695K/2457K bytes of memory. Processor board ID 0000 (1314672220), with hardware revision 0000 CPU rev number 7 3 Ethernet interfaces 4 FastEthernet interfaces 128K bytes of NVRAM 24576K bytes of processor board System flash (Read/Write) 2048K bytes of processor board Web flash (Read/Write) Press RETURN to get started! !The Cisco IOS software boots as if it is not interrupted. Router> enable Router# show startup configuration Using 984 out of 131072 bytes ! version 12.3 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption no service password-recovery ! hostname Router ! boot-start-marker boot-end-marker ! memory-size iomem 5 ! no aaa new-model ip subnet-zero ! ip ips po max-events 100 no ftp-server write-enable ! interface Ethernet0 no ip address shutdown ! interface Ethernet1 no ip address shutdown duplex auto ! interface Ethernet2 no ip address shutdown ! interface FastEthernet1 no ip address duplex auto speed auto ! interface FastEthernet2 no ip address duplex auto speed auto ! interface FastEthernet3 no ip address duplex auto speed auto ! interface FastEthernet4 no ip address duplex auto speed auto ! ip classless ! ip http server no ip http secure-server ! control-plane ! line con 0 no modem enable transport preferred all transport output all line aux 0 line vty 0 4 ! scheduler max-task-time 5000 end Router# show running-configuration | incl service no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption no service password-recovery
Examples
The no service password-recovery command expects the router configuration register to be configured to autoboot. If the configuration register is set to something other than to autoboot before the no service password-recovery command is entered, a prompt like the one shown in the following example asking you to use the config-register global configuration command to change the setting.
Router(config)# no service password-recovery Please setup auto boot using config-register first.
Note | To avoid any unintended result due to the behavior of this command, use the show version command to obtain the current configuration register value. If not set to autoboot, then the router needs to be configured to autoboot with the config-register command before entering the no service password-recovery command. |
Once password recovery is disabled, you cannot set the bit pattern value to 0x40, 0x8000, or 0x0 (disables autoboot). The following example shows the messages displayed when invalid configuration register settings are attempted on a router with password recovery disabled.
Router(config)# config-register 0x2143 Password recovery is disabled, cannot enable diag or ignore configuration.
The command resets the invalid bit pattern and continue to allow modification of nonrelated bit patterns. The configuration register value resets to 0x3 at the next system reload, which can be verified by checking the last line of the show version command output:
Configuration register is 0x2012 (will be 0x3 at next reload)
Examples
The following example shows how to disable password recovery on a switch so that a user can only reset a password by agreeing to return to the default configuration:
Switch(config)# no service-password recovery Switch(config)# exit
To use the password-recovery procedure, a user with physical access to the switch holds down the Mode button while the unit powers up and for a second or two after the LED above port 1X goes off. When the button is released, the system continues with initialization. If the password-recovery mechanism is disabled, the following message is displayed:
The password-recovery mechanism has been triggered, but is currently disabled. Access to the boot loader prompt through the password-recovery mechanism is disallowed at this point. However, if you agree to let the system be reset back to the default system configuration, access to the boot loader prompt can still be allowed. Would you like to reset the system back to the default configuration (y/n)?
If you choose not to reset the system back to the default configuration, the normal boot process continues, as if the Mode button had not been pressed. If you choose to reset the system back to the default configuration, the configuration file in flash memory is deleted and the VLAN database file, flash:vlan.dat (if present), is deleted.
The following is sample output from the show version command on a device when password recovery is disabled:
Switch# show version Cisco Internetwork Operating System Software IOS (tm) C3550 Software (C3550-I9Q3L2-M), Version 12.3(8)YA, RELEASE SOFTWARE (fc1) Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Wed 24-Oct-01 06:20 by xxx Image text-base: 0x00003000, data-base: 0x004C1864 ROM: Bootstrap program is C3550 boot loader flam-1-6 uptime is 1 week, 6 days, 3 hours, 59 minutes System returned to ROM by power-on Cisco WS-C3550-48 (PowerPC) processor with 65526K/8192K bytes of memory. Last reset from warm-reset Running Layer2 Switching Only Image Ethernet-controller 1 has 12 Fast Ethernet/IEEE 802.3 interfaces Ethernet-controller 2 has 12 Fast Ethernet/IEEE 802.3 interfaces Ethernet-controller 3 has 12 Fast Ethernet/IEEE 802.3 interfaces Ethernet-controller 4 has 12 Fast Ethernet/IEEE 802.3 interfaces Ethernet-controller 5 has 1 Gigabit Ethernet/IEEE 802.3 interface Ethernet-controller 6 has 1 Gigabit Ethernet/IEEE 802.3 interface 48 FastEthernet/IEEE 802.3 interface(s) 2 Gigabit Ethernet/IEEE 802.3 interface(s) The password-recovery mechanism is disabled. 32K bytes of flash-simulated non-volatile configuration memory. Base ethernet MAC Address: AA:00:0B:2B:02:00 Configuration register is 0x10F
Disabling Password Recovery Example
The following example shows how to disable password recovery capability using the no service password-recovery strict command:
Router# configure terminal Router(config)# no service password-recovery strict WARNING: Executing this command will disable the password recovery mechanism. Do not execute this command without another plan for password recovery. Are you sure you want to continue? [yes]: yes . .
Related Commands
Command |
Description |
---|---|
config-register |
Changes the configuration register settings. |
show version |
Displays version information for the hardware and firmware. |