Security: Secure Sensitive Data Management
Configuring SSD
457 Cisco 500 Series Stackable Managed Switch Administration Guide Release 1.3
23
- Level 15—Indicates that this rule applies to all users with privilege level 
15.
- All—Indicates that this rule applies to all users.
• Channel—This defines the security level of the input channel to which the 
rule applies: Select one of the following options:
- Secure—Indicates that this rule applies only to secure channels 
(console, SCP, SSH and HTTPS), not including the
 SNMP and XML 
channels.
- Insecure—Indicates that this rule applies only to insecure channels 
(Telnet, TFTP and HTTP), not including the SNMP and XML channels.
- Secure XML SNMP—Indicates that this rule applies only to XML over 
HTTPS and SNMPv3 with privacy.
- Insecure XML SNMP—Indicates that this rule applies only to XML over 
HTTP or and SNMPv1/v2and SNMPv3 without privacy.
• Read Permission—The read permissions associated with the rule. These 
can be the following:
- Exclude—Lowest read permission. Users are not permitted to get 
sensitive data in any form.
- Plaintext Only—Higher read permission than above ones. Users are 
permitted to get sensitive data in plaintext only.
- Encrypted Only—Middle read permission. Users are permitted to get 
sensitive data as encrypted only.
- Both (Plaintext and Encrypted)—Highest read permission. Users have 
both encrypted and plaintext permissions and are permitted to get 
sensitive data as encrypted and in plaintext
• Default Read Mode—All default read modes are subjected to the read 
permission of the rule. The following options exist, but some might be 
rejected, depending on the rule’s read permission.
- Exclude—Do not allow reading the sensitive data.
- Encrypted—Sensitive data is presented encrypted.
- Plaintext—Sensitive data is presented as plaintext.
STEP  3 The following actions can be performed:
• Restore to Default—Restore a user-modified default rule to the default rule.