Security
7705 SAR OS System Management Guide Page 81
hash-control
Syntax hash-control [read-version {1 | 2 | all}] [write-version {1 | 2}]
no hash-control
Context config>system>security
Description Whenever the user executes a save or info command, the system will encrypt all passwords and keys,
and so on for security reasons. At present, two algorithms exist.
The first algorithm is a simple, short key that can be copied and pasted in a different location when the
user wants to configure the same password. However, because it is the same password and the hash
key is limited to the password/key, it is obvious that it is the same key.
The second algorithm is a more complex key, and cannot be copied and pasted in different locations
in the configuration file. In this case, if the same key or password is used repeatedly in different
contexts, each encrypted (hashed) version will be different.
Default all — read-version set to accept both versions 1 and 2
Parameters read-version {1 | 2 | all} — when the read-version is configured as “all,” both versions 1 and 2 will
be accepted by the system. Otherwise, only the selected version will be accepted when reading
configuration or exec files. The presence of incorrect hash versions will abort the script/startup.
write-version {1 | 2} — selects the hash version that will be used the next time the configuration file
is saved (or an info command is executed). Be careful to save the read and write version correctly, so
that the file can be properly processed after the next reboot or exec.
source-address
Syntax source-address
Context config>system>security
Description This command specifies the source address that should be used in all unsolicited packets sent by the
application.
application
Syntax application app [ip-int-name | ip-address]
no application app
Context config>system>security>source-address
Description This command specifies the application to use the source IP address specified by the source-address
command.
The no form of the command removes the specified source address from the application, causing the
application to use the system IP address as the source address.