Summary of Contents for Cisco Cisco NCS 5000 Series
Page 1
System Security Command Reference for Cisco NCS 5000 Series Routers First Published: 2015-12-23 Last Modified: 2017-03-16 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883...
Page 2
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks . Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
(line) authorization (line) description (AAA) group (AAA) inherit taskgroup inherit usergroup key (TACACS+) login authentication password (AAA) radius-server dead-criteria time radius-server dead-criteria tries radius-server deadtime (BNG) radius-server key (BNG) System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 4
(TACACS+) timeout login response usergroup username users group System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 5
(Interactive Mode) show netconf-yang clients show netconf-yang statistics show ssh show ssh session details ssh client knownhost ssh client source-interface ssh server System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 6
Contents ssh server logging ssh server rate-limit ssh server session-limit ssh server v2 ssh server netconf ssh timeout System Security Command Reference for Cisco NCS 5000 Series Routers...
What's New in Cisco Product Documentation. To receive new and revised Cisco technical content directly to your desktop, you can subscribe to the What's New in Cisco Product Documentation RSS feed. RSS feeds are a free service.
Page 8
Preface Obtaining Documentation and Submitting a Service Request System Security Command Reference for Cisco NCS 5000 Series Routers viii...
Page 9
For detailed information about AAA concepts, configuration tasks, and examples, see the Configuring AAA Services chapter in the System Security Configuration Guide for Cisco NCS 5000 Series Routers. Currently, only default VRF is supported. VPNv4, VPNv6 and VPN routing and forwarding (VRF) address Note families will be supported in a future release.
• group radius—Uses the list of all RADIUS servers for accounting. • group named-group—Uses a named subset of TACACS+ or RADIUS servers for accounting, as defined by the aaa group server tacacs+ or aaa group server radius command. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 13
The list name can be applied to a line (console, aux, or vty template) to enable accounting on that particular line. The Cisco IOS XR software supports both TACACS+ and RADIUS methods for accounting. The router reports user activity to the security server in the form of accounting records, which are stored on the security server.
The default method list is automatically applied to all interfaces or lines. If no default method list is defined, then no accounting takes place. You can specify up to four methods in the method list. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 15
This example shows how to cause a “start accounting” record to be sent to a TACACS+ server when a router initially boots. A “stop accounting” record is also sent when a router is shut down or reloaded. RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# aaa accounting system default start-stop group tacacs+ System Security Command Reference for Cisco NCS 5000 Series Routers...
System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 17
RP/0/RP0/CPU0:router(config)# aaa accounting update periodic 30 The following example shows how to send interim accounting records to the RADIUS server when there is new accounting information to report: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# aaa accounting update newinfo System Security Command Reference for Cisco NCS 5000 Series Routers...
Command Default Default behavior applies the local authentication on all ports. Command Modes XR Config mode or System Admin Config mode Command History Release Modification Release 6.0 This command was introduced. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 19
The following example shows how to specify the remote method list for authentication, and also enable authentication for console in System Admin Config mode: RP/0/RP0/CPU0:router# admin sysadmin-vm:0_RP0# configure sysadmin-vm:0_RP0(config)# aaa authentication users user lab admin RP/0/RP0/CPU0:router# sysadmin-vm:0_RP0# configure sysadmin-vm:0_RP0(config)# aaa authentication groups group aaa-r System Security Command Reference for Cisco NCS 5000 Series Routers...
Command Default Authorization is disabled for all actions (equivalent to the method none keyword). Command Modes XR Config mode System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 21
TACACS+), in sequence. Method lists enable you to designate one or more security protocols for authorization, thus ensuring a backup system in case the initial method fails. Cisco IOS XR software uses the first method listed to authorize users for specific network services; if that method fails to respond, Cisco IOS XR software selects the next method listed in the method list.
Page 22
The following example shows how to define the network authorization method list named listname1, which specifies that TACACS+ authorization is used: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# aaa authorization commands listname1 group tacacs+ System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Task ID Operations read, write Examples The following example shows how to specify taskgroup1 as the default task group for remote TACACS+ authentication: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# aaa default-taskgroup taskgroup1 System Security Command Reference for Cisco NCS 5000 Series Routers...
The server group cannot be named radius or tacacs. This command enters server group configuration mode. You can use the server command to associate a particular RADIUS server with the defined server group. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 25
If the auth-port port-number and acct-port port-number keywords and arguments are not specified, the Note default value of the port-number argument for the auth-port keyword is 1645 and the default value of the port-number argument for the acct-port keyword is 1646. System Security Command Reference for Cisco NCS 5000 Series Routers...
Group name methods refer to a set of previously defined TACACS+ servers. Use the tacacs-server host Note command to configure the host servers. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 27
The following example shows the configuration of an AAA group server named tacgroup1, which comprises three member servers: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# aaa group server tacacs+ tacgroup1 RP/0/RP0/CPU0:router(config-sg-tacacs)# server 192.168.200.226 RP/0/RP0/CPU0:router(config-sg-tacacs)# server 192.168.200.227 RP/0/RP0/CPU0:router(config-sg-tacacs)# server 192.168.200.228 System Security Command Reference for Cisco NCS 5000 Series Routers...
Specifies, in integer, the duration (in days, hours, minutes or seconds) for which the user is locked out when he exceeds the maximum limit of authentication failure attempts allowed. Command Default None System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 29
AAA password security policy works as such for Cisco IOS XR platforms. Whereas, this feature is supported only on XR VM, for Cisco IOS XR 64 bit platforms and Cisco NCS 5000 Series Routers. For more details on the usage of each option of this command, refer the section on AAA Password Security for FIPS Compliance in Configuiring FIPS Mode chapter in the System Security Configuration Guide for Cisco NCS 5000 Series Routers.
Page 30
RP/0/RP0/CPU0:router(config-aaa)#max-length 15 RP/0/RP0/CPU0:router(config-aaa)#lifetime months 3 RP/0/RP0/CPU0:router(config-aaa)#min-char-change 5 RP/0/RP0/CPU0:router(config-aaa)#authen-max-attempts 3 RP/0/RP0/CPU0:router(config-aaa)#lockout-time days 1 Related Commands Command Description show aaa password-policy, on page 67 Displays the details of AAA password policy. username System Security Command Reference for Cisco NCS 5000 Series Routers...
If a method list is not specified this way, no accounting is applied to the selected line or group of lines. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 32
The following example shows how to enable command accounting services using the accounting method list named listname2 on a line template named configure: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# line template configure RP/0/RP0/CPU0:router(config-line)# accounting commands listname2 System Security Command Reference for Cisco NCS 5000 Series Routers...
Use the authorization command to apply the specified method lists (or, if none is specified, the default method list) to the selected line or group of lines. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 34
The following example shows how to enable command authorization using the method list named listname4 on a line template named configure: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# line template configure RP/0/RP0/CPU0:router(config-line)# authorization commands listname4 System Security Command Reference for Cisco NCS 5000 Series Routers...
RP/0/RP0/CPU0:router(config-tg)# description this is a sample taskgroup The following example shows the creation of a user group description: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# usergroup alpha RP/0/RP0/CPU0:router(config-ug)# description this is a sample user group System Security Command Reference for Cisco NCS 5000 Series Routers...
Adds the user to the predefined Cisco support personnel group. Note Starting from IOS XR 6.0 release, the cisco-support group is combined with the root-system group. This means a user who is part of the root-system group can also access commands that are included in the cisco-support group.
Page 37
108 command in XR Config mode. If the group command is used in System Admin Config mode, only cisco-support keywords can be specified. The privileges associated with the cisco-support group are now included in the root-system group. The cisco-support group is no longer required to be used for configuration.
Any changes made to the taskgroup from which they are inherited are reflected immediately in the group from which they are inherited. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 39
Examples In the following example, the permissions of task group tg2 are inherited by task group tg1: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# taskgroup tg1 RP/0/RP0/CPU0:router(config-tg)# inherit taskgroup tg2 RP/0/RP0/CPU0:router(config-tg)# end System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Task ID Operations read, write Examples The following example shows how to enable the purchasing user group to inherit properties from the sales user group: RP/0/RP0/CPU0:router# configure System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 41
Authentication, Authorization, and Accounting Commands inherit usergroup RP/0/RP0/CPU0:router(config)# usergroup purchasing RP/0/RP0/CPU0:router(config-ug)# inherit usergroup sales System Security Command Reference for Cisco NCS 5000 Series Routers...
The key is used to encrypt the packets that are going from TACACS+, and it should match with the key configured on the external TACACS+ server so that the packets are decrypted properly. If a mismatch occurs, the result fails. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 43
Authentication, Authorization, and Accounting Commands key (TACACS+) Examples The following example shows how to set the encrypted key to anykey RP/0/RP0/CPU0:router(config)# tacacs-server host 209.165.200.226 RP/0/RP0/CPU0:router(config-tacacs-host)# key anykey System Security Command Reference for Cisco NCS 5000 Series Routers...
Entering the no form of the login authentication command has the same effect as entering the command with the default keyword. Before issuing this command, create a list of authentication processes by using the aaa authentication login command. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 45
RP/0/RP0/CPU0:router(config-line)# login authentication default The following example shows that the AAA authentication list called list1 is used for the line template template2: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# line template template2 RP/0/RP0/CPU0:router(config-line)# login authentication list1 System Security Command Reference for Cisco NCS 5000 Series Routers...
Passwords are two-way encrypted and should be used for applications such as PPP that need decryptable passwords that can be decrypted. Note The show running-config command always displays the clear-text login password in encrypted form when the 0 option is used. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 47
RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# username user1 RP/0/RP0/CPU0:router(config-un)# password 0 pwd1 RP/0/RP0/CPU0:router(config-un)# commit RP/0/RP0/CPU0:router(config-un)# show running-config Building configuration... username user1 password 7 141B1309 System Security Command Reference for Cisco NCS 5000 Series Routers...
If a packet has not been received since the router booted and there is a timeout, the time criterion is treated as though it were met. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 49
The following example shows how to establish the time for the dead-criteria conditions for a RADIUS server to be marked as dead for the radius-server dead-criteria time command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# radius-server dead-criteria time 5 System Security Command Reference for Cisco NCS 5000 Series Routers...
If you configure the radius-server dead-criteria tries command before the radius-server deadtime Note command, the radius-server dead-criteria tries command may not be enforced. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 51
The following example shows how to establish the number of tries for the dead-criteria conditions for a RADIUS server to be marked as dead for the radius-server dead-criteria tries command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# radius-server dead-criteria tries 4 System Security Command Reference for Cisco NCS 5000 Series Routers...
Examples This example specifies five minutes of deadtime for RADIUS servers that fail to respond to authentication requests for the radius-server deadtime command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# radius-server deadtime 5 System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Task ID Operations read, write Examples This example shows how to set the cleartext key to “samplekey”: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# radius-server key 0 samplekey System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 54
Authentication, Authorization, and Accounting Commands radius-server key (BNG) This example shows how to set the encrypted shared key to “anykey”: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# radius-server key 7 anykey System Security Command Reference for Cisco NCS 5000 Series Routers...
(BNG) To specify the number of times the Cisco IOS XR software retransmits a packet to a server before giving up, use the radius-server retransmit command in the XR Config mode. The no form of this command sets it to the default value of 3 .
Use the radius-server timeout command to set the number of seconds a router waits for a server host to reply before timing out. Task ID Task ID Operations read, write Examples This example shows how to change the interval timer to 10 seconds: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# radius-server timeout 10 System Security Command Reference for Cisco NCS 5000 Series Routers...
The radius source-interface command is especially useful in cases in which the router has many interfaces or subinterfaces and you want to ensure that all RADIUS packets from a particular router have the same IP address. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 58
(BNG) Examples This example shows how to make RADIUS use the IP address of subinterface s2 for all outgoing RADIUS packets: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# radius source-interface loopback 10 vrf vrf1 System Security Command Reference for Cisco NCS 5000 Series Routers...
This command was introduced. Usage Guidelines Cisco IOS XR software allows you to configure Message Digest 5 (MD5) encryption for username logins and passwords. MD5 encryption is a one-way hash function that makes reversal of an encrypted password impossible, providing strong encryption protection. Using MD5 encryption, you cannot retrieve clear-text passwords.
Page 60
The following example shows how to establish the clear-text secret “lab” for the user user2: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# username user2 RP/0/RP0/CPU0:router(config-un)# secret 0 lab RP/0/RP0/CPU0:router(config-un)# commit RP/0/RP0/CPU0:router(config-un)# show running-config Building configuration... username user2 secret 5 $1$DTmd$q7C6fhzje7Cc7Xzmu2Frx1 System Security Command Reference for Cisco NCS 5000 Series Routers...
IP address and UDP port number creates a unique identifier, allowing different ports to be individually defined as RADIUS host entries providing a specific AAA service. If two different host entries System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 62
The second host entry configured acts as switchover backup to the first one. RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# aaa group server radius group1 RP/0/RP0/CPU0:router(config-sg-radius)# server 1.1.1.1 auth-port 1645 acct-port 1646 RP/0/RP0/CPU0:router(config-sg-radius)# server 2.2.2.2 auth-port 2000 acct-port 2001 System Security Command Reference for Cisco NCS 5000 Series Routers...
The following example shows how to associate the TACACS+ server with the IP address 192.168.60.15 with the server group tac1: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# aaa group server tacacs+ tac1 RP/0/RP0/CPU0:router(config-sg-tacacs+)# server 192.168.60.15 System Security Command Reference for Cisco NCS 5000 Series Routers...
If no key string is specified, the global value is used. Command Default If no port attributes are defined, the defaults are as follows: • Authentication port: 1645 • Accounting port: 1646 System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 65
RP/0/RP0/CPU0:router(config-sg-radius)# server-private 10.2.2.2 key coke RP/0/RP0/CPU0:router(config-sg-radius)# server-private 10.2.2.2 auth-port 300 RP/0/RP0/CPU0:router(config-sg-radius-private)# RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# aaa group server radius group1 RP/0/RP0/CPU0:router(config-sg-radius)# server-private 10.1.1.1 auth-port 300 RP/0/RP0/CPU0:router(config-sg-radius-private)# exit (config-sg-radius)# server-private 10.2.2.2 auth-port 300 RP/0/RP0/CPU0:router(config-sg-radius-private)# System Security Command Reference for Cisco NCS 5000 Series Routers...
(for example, default tacacs+ server group) can still be referred by IP addresses and port System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 67
RP/0/RP0/CPU0:router(config-sg-tacacs+)# server-private 10.1.1.1 timeout 5 RP/0/RP0/CPU0:router(config-sg-tacacs+)# server-private 10.1.1.1 key a_secret RP/0/RP0/CPU0:router(config-sg-tacacs+)# server-private 10.1.1.1 port 51 RP/0/RP0/CPU0:router(config-sg-tacacs-private)# exit RP/0/RP0/CPU0:router(config-sg-tacacs+)# server-private 10.2.2.2 timeout 5 RP/0/RP0/CPU0:router(config-sg-tacacs+)# server-private 10.2.2.2 key coke RP/0/RP0/CPU0:router(config-sg-tacacs+)# server-private 10.2.2.2 port 300 RP/0/RP0/CPU0:router(config-sg-tacacs-private)# System Security Command Reference for Cisco NCS 5000 Series Routers...
Details for all user groups, or all local users, or all task groups are listed if no argument is entered. Command Modes XR EXEC mode Command History Release Modification Release 6.0 This command was introduced. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 71
The following sample output is from the show aaa command, using the task supported keywords. Task IDs are displayed in alphabetic order. RP/0/RP0/CPU0:router# show aaa task supported admin basic-services bcdl System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 72
User group root-systemlrlr root-system route-map route-policy snmp sonet-sdh static sysmgr system transport tty-access tunnel universal vlan vrrp System Security Command Reference for Cisco NCS 5000 Series Routers...
Special Character Len : 0 Uppercase Character Len : 0 Lowercase Character Len : 1 Numeric Character Len : 0 Policy Life Time : seconds : 0 minutes : 0 hours : 0 System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 76
: 0 years : 0 Character Change Len : 4 Maximum Failure Attempts : 0 Related Commands Command Description aaa password-policy, on page 20 Defines the FIPS-compliant AAA password security policy. System Security Command Reference for Cisco NCS 5000 Series Routers...
0 responses, 0 timeouts, 0 bad responses 0 bad authenticators, 0 unknown types, 0 dropped 0 ms latest rtt Server: 2.2.2.2/1645/1646 is UP Timeout: 10 sec, Retransmit limit: 3 Authentication: System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 78
Number of seconds the router waits for a server host to reply before timing out. Retransmit limit Number of times the Cisco IOS XR software searches the list of RADIUS server hosts before giving up. System Security Command Reference for Cisco NCS 5000 Series Routers...
0 responses, 0 timeouts, 0 bad responses 0 bad authenticators, 0 unknown types, 0 dropped 0 ms latest rtt Server: 12.38.28.18, port: 29199 0 requests, 0 pending, 0 retransmits 0 responses, 0 timeouts, 0 bad responses System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 80
This table describes the significant fields shown in the display. Table 3: show radius accounting Field Descriptions Field Description Server Server IP address/UDP destination port for authentication requests; UDP destination port for accounting requests. System Security Command Reference for Cisco NCS 5000 Series Routers...
0 timeouts, 0 bad responses, 0 bad authenticators 0 unknown types, 0 dropped, 0 ms latest rtt Server: 12.38.28.18, port: 21099 0 requests, 0 pending, 0 retransmits 0 accepts, 0 rejects, 0 challenges System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 82
This table describes the significant fields shown in the display. Table 4: show radius authentication Field Descriptions Field Description Server Server IP address/UDP destination port for authentication requests; UDP destination port for accounting requests. System Security Command Reference for Cisco NCS 5000 Series Routers...
RP/0/RP0/CPU0:router# show radius dead-criteria host 12.26.49.12 auth-port 11000 acct-port 11001 Server: 12.26.49.12/11000/11001 Dead criteria time: 10 sec (computed) tries: 10 (computed) This table describes the significant fields shown in the display. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 84
Number of seconds the router waits for a server host to reply before timing out. Retransmits Number of times Cisco IOS XR software searches the list of RADIUS server hosts before giving up. System Security Command Reference for Cisco NCS 5000 Series Routers...
The following sample output is for the show radius server-groups command: RP/0/RP0/CPU0:router# show radius server-groups Global list of servers Contains 2 server(s) Server 1.1.1.1/1645/1646 Server 2.2.2.2/1645/1646 Server group 'radgrp1' has 2 server(s) System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 86
This table describes the significant fields shown in the display. Table 6: show radius server-groups Field Descriptions Field Description Server Server IP address/UDP destination port for authentication requests/UDP destination port for accounting requests. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 87
Authentication, Authorization, and Accounting Commands show radius server-groups System Security Command Reference for Cisco NCS 5000 Series Routers...
For IPv6 IP addresses: Server: 1.2.3.5/49 family = AF_INET opens=0 closes=0 aborts=0 errors=0 packets in=0 packets out=0 status=up single-connect=false This table describes the significant fields shown in the display. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 89
Number of error replies from the external server. packets in Number of TCP packets that have been received from the external server. packets out Number of TCP packets that have been sent to the external server. System Security Command Reference for Cisco NCS 5000 Series Routers...
Server 12.26.25.61/23456 Server 12.26.49.12/12345 Server 12.26.49.12/9000 Server 12.26.25.61/23432 Server 5.5.5.5/23456 Server 1.1.1.1/49 Server group ‘tac100’ has 1 servers Server 12.26.49.12 This table describes the significant fields shown in the display. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 91
Authentication, Authorization, and Accounting Commands show tacacs server-groups Table 8: show tacacs server-groups Field Descriptions Field Description Server Server IP address. System Security Command Reference for Cisco NCS 5000 Series Routers...
Use the show user command to display all user groups and task IDs associated with the currently logged-in user. Task ID Task ID Operations none — Examples The following sample output displays the authentication method parameters from the show user command: RP/0/RP0/CPU0:router# show user authentication method local System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Task ID Operation read Examples This is the sample output of the show aaa user-group command: sysadmin-vm:0_RP0#show aaa user-group Mon Nov 13:39:33.380 UTC User group : root-system sysadmin-vm:0_RP0# System Security Command Reference for Cisco NCS 5000 Series Routers...
Compressing show tech output Show tech output available at /misc/disk1//showtech-aaa-admin-2014-Nov-04.082457.UTC.tgz Please collect show tech-support ctrace in addition to any sysadmin show-tech-support collection ++ Show tech end time: 2014-Nov-04.UTC ++ sysadmin-vm:0_RP0# System Security Command Reference for Cisco NCS 5000 Series Routers...
This works only if the TACACS+ server is also configured in single-connection mode. To configure the TACACS+ server in single connection mode, refer to the respective server manual. RP/0/RP0/CPU0:router(config)# tacacs-server host 209.165.200.226 RP/0/RP0/CPU0:router(config-tacacs-host)# single-connection System Security Command Reference for Cisco NCS 5000 Series Routers...
No TACACS+ host is specified. The port-name argument, if not specified, defaults to the standard port 49. The seconds argument, if not specified, defaults to 5 seconds. Command Modes XR Config mode System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 100
Modification Release 6.0 This command was introduced. Usage Guidelines You can use multiple tacacs-server host commands to specify additional hosts. Cisco IOS XR software searches for hosts in the order in which you specify them. Task ID Task ID Operations...
The TACACS server key is used only if no key is configured for an individual TACACS server. Keys configured for an individual TACACS server always override this global key configuration. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 102
Authentication, Authorization, and Accounting Commands tacacs-server key Examples The following example sets the authentication and encryption key to key1: RP/0/RP0/CPU0:router(config)# tacacs-server key key1 System Security Command Reference for Cisco NCS 5000 Series Routers...
Timeout intervals configured for an individual TACACS+ server always override this global timeout configuration. Task ID Task ID Operations read, write Examples The following example shows the interval timer being changed to 10 seconds: RP/0/RP0/CPU0:router(config)# tacacs-server timeout 10 System Security Command Reference for Cisco NCS 5000 Series Routers...
• cs6 Match packets with CS6(precedence 6) dscp (110000) • cs7 Match packets with CS7(precedence 7) dscp (111000) • default Match packets with default dscp (000000) • ef Match packets with EF dscp (101110) System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 105
No specific guidelines impact the use of this command. Task ID Task ID Operation read, write Examples The following example sets the DSCP value to Assured Forwarding (AF)11: RP/0/RP0/CPU0:router(config)# tacacs-server ipv4 dscp af11 System Security Command Reference for Cisco NCS 5000 Series Routers...
TACACS+ packets from a particular router have the same IP address. When the specified interface does not have an IP address or is in a down state, TACACS+ behaves as if no source interface configuration is used. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 107
Examples The following example shows how to set the IP address of the specified interface for all outgoing TACACS+ packets: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# tacacs source-interface TenGigabitEthernet 0/0/0/29 vrf abc System Security Command Reference for Cisco NCS 5000 Series Routers...
Examples The following example shows how to enable execute privileges for the config-services task ID and associate that task ID with the task group named taskgroup1: RP/0/RP0/CPU0:router# configure System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 109
Authentication, Authorization, and Accounting Commands task RP/0/RP0/CPU0:router(config)# taskgroup taskgroup1 RP/0/RP0/CPU0:router(config-tg)# task execute config-services System Security Command Reference for Cisco NCS 5000 Series Routers...
(Optional) Name of the task group from which permissions are to be inherited. Command Default Five predefined user groups are available by default. Command Modes XR Config mode Command History Release Modification Release 6.0 This command was introduced. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 111
Task ID Task ID Operations read, write Examples The following example assigns read bgp permission to the task group named alpha: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# taskgroup alpha RP/0/RP0/CPU0:router(config-tg)# task read bgp System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Task ID Operations read, write Examples The following example shows how to set the number of seconds for the timeout value: RP/0/RP0/CPU0:router(config)# tacacs-server host 209.165.200.226 RP/0/RP0/CPU0:router(config-tacacs-host)# timeout 500 System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Operations read, write Examples The following example shows how to change the interval timer to 20 seconds: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# line template alpha RP/0/RP0/CPU0:router(config-line)# timeout login response 20 System Security Command Reference for Cisco NCS 5000 Series Routers...
From global configuration mode, you can display all the configured user groups. However, you cannot display all the configured user groups in usergroup configuration mode. Task ID Task ID Operations read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 115
Authentication, Authorization, and Accounting Commands usergroup Examples The following example shows how to add permissions from the user group beta to the user group alpha: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# usergroup alpha RP/0/RP0/CPU0:router(config-ug)# inherit usergroup beta System Security Command Reference for Cisco NCS 5000 Series Routers...
Applies a particular password password-policy policy to the user. policy-name Specifies the name of the password policy. This policy name has to be configured prior to applying this policy to the user. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 117
FIPS compliance. Usage Guidelines A user is never allowed to have cisco-support privileges as the only group. Note Use the username command to identify the user and enter username configuration mode. Password and user group assignments can be made from either XR Config mode or username configuration submode. Permissions (task IDs) are assigned by associating the user with one or more defined user groups.
Page 118
For more details on defining a password policy, refer aaa password-policy command. The AAA password security policy feature works as such for Cisco IOS XR platforms. Whereas, it is supported only on XR VM, for Cisco IOS XR 64 bit platforms.
Page 119
RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# username user1 RP/0/RP0/CPU0:router(config-un)# password 0 password1 This example shows how to apply a AAA password policy for a user: RP/0/RP0/CPU0:router# config RP/0/RP0/CPU0:router(config)# username user1 password-policy test-policy password abc System Security Command Reference for Cisco NCS 5000 Series Routers...
Name of the user group. The usergroup-name argument can be only one word. Spaces and quotation marks are not allowed. cisco-support Specifies that users logging in through the line are given Cisco support personnel privileges. netadmin Specifies that users logging in through the line are given network administrator privileges.
Page 121
In the following example, if a vty-pool is created with line template vty, users logging in through vty are given operator privileges: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# aaa authen login vty-authen line RP/0/RP0/CPU0:router(config)# commit RP/0/RP0/CPU0:router(config)# line template vty RP/0/RP0/CPU0:router(config-line)# users group operator RP/0/RP0/CPU0:router(config-line)# login authentication System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 122
Authentication, Authorization, and Accounting Commands users group System Security Command Reference for Cisco NCS 5000 Series Routers...
This module describes the commands used to configure keychain management. For detailed information about keychain management concepts, configuration tasks, and examples, see the Implementing Keychain Management chapter in the System Security Configuration Guide for Cisco NCS 5000 Series Routers. Note Currently, only default VRF is supported.
Key configuration Command History Release Modification Release 6.0 This command was introduced. Usage Guidelines No specific guidelines impact the use of this command. Task ID Task ID Operations system read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 125
Keychain Management Commands accept-lifetime Examples The following example shows how to use the accept-lifetime command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# key chain isis-keys RP/0/RP0/CPU0:router(config-isis-keys)# key 8 RP/0/RP0/CPU0:router(config-isis-keys-0x8)# accept-lifetime 1:00:00 June 29 2006 infinite System Security Command Reference for Cisco NCS 5000 Series Routers...
(for example, either prior to the start of the lifetime, or after the end of the lifetime). Task ID Task ID Operations system read, write Examples The following example shows how to use the accept-tolerance command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# key chain isis-keys RP/0/RP0/CPU0:router(config-isis-keys)# accept-tolerance infinite System Security Command Reference for Cisco NCS 5000 Series Routers...
These protocols support the following cryptographic algorithms: • Border Gateway Protocol (BGP) supports only HMAC-MD5 and HMAC-SHA1-12. • Intermediate System-to-Intermediate System (IS-IS) supports only HMAC-MD5. • Open Shortest Path First (OSPF) supports only MD5. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 128
Task ID Task ID Operations system read, write Examples The following example shows how to use the cryptographic-algorithm command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# key chain isis-keys RP/0/RP0/CPU0:router(config-isis-keys)# key 8 RP/0/RP0/CPU0:router(config-isis-keys-0x8)# cryptographic-algorithm HMAC-MD5 System Security Command Reference for Cisco NCS 5000 Series Routers...
0 to 63. If the range is above the value of 63, the BGP keychain operation is rejected. Task ID Task ID Operations system read, write Examples The following example shows how to use the key command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# key chain isis-keys RP/0/RP0/CPU0:router(config-isis-keys)# key 8 RP/0/RP0/CPU0:router(config-isis-keys-0x8)# System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Operations system read, write Examples The following example shows that the name of the keychain isis-keys is for the key chain command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# key chain isis-keys RP/0/RP0/CPU0:router(config-isis-keys)# System Security Command Reference for Cisco NCS 5000 Series Routers...
• The first two characters in the password string must be decimal numbers and the rest must be hexadecimals. • The first two digits must not be a number greater than 53. Either of the following examples would be valid encrypted passwords: 1234abcd 50aefd System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 132
Task ID Operations system read, write Examples The following example shows how to use the keystring command: RP/0/RP0/CPU0:router:# configure RP/0/RP0/CPU0:router(config)# key chain isis-keys RP/0/RP0/CPU0:router(config-isis-keys)# key 8 RP/0/RP0/CPU0:router(config-isis-keys-0x8)# key-string password 850aefd System Security Command Reference for Cisco NCS 5000 Series Routers...
No specific guidelines impact the use of this command. Task ID Task ID Operations system read, write Examples The following example shows how to use the send-lifetime command: RP/0/RP0/CPU0:router# configure System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 134
Keychain Management Commands send-lifetime RP/0/RP0/CPU0:router(config)# key chain isis-keys RP/0/RP0/CPU0:router(config-isis-keys)# key 8 RP/0/RP0/CPU0:router(config-isis-keys-0x8)# send-lifetime 1:00:00 June 29 2006 infinite System Security Command Reference for Cisco NCS 5000 Series Routers...
This module describes the commands used to configure management plane protection (MPP). For detailed information about keychain management concepts, configuration tasks, and examples, see the Implementing Management Plane Protection chapter in the System Security Configuration Guide for Cisco NCS 5000 Series Routers.
Interface peer configuration Command History Release Modification Release 6.0.1 This command was introduced. Usage Guidelines No specific guidelines impact the use of this command. Task ID Task ID Operations system read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 139
The following example shows how to configure the peer IPv4 address 10.1.0.0, with a prefix of 16 for traffic management: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# control-plane RP/0/RP0/CPU0:router(config-ctrl)# management-plane RP/0/RP0/CPU0:router(config-mpp)# inband RP/0/RP0/CPU0:router(config-mpp-inband)# interface all RP/0/RP0/CPU0:router(config-mpp-inbandoutband-all)# allow all peer RP/0/RP0/CPU0:router(config-telnettftp-peer)# address ipv4 10.1.0.0/16 System Security Command Reference for Cisco NCS 5000 Series Routers...
The following example shows how to configure the peer IPv6 address 33::33 for management traffic: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# control-plane RP/0/RP0/CPU0:router(config-ctrl)# management-plane RP/0/RP0/CPU0:router(config-mpp)# inband RP/0/RP0/CPU0:router(config-mpp-outband)# interface GigabitEthernet 0/1/1/2 RP/0/RP0/CPU0:router(config-mpp-outband-GigabitEthernet0_1_1_2)# allow TFTP peer RP/0/RP0/CPU0:router(config-tftp-peer)# address ipv6 33::33 System Security Command Reference for Cisco NCS 5000 Series Routers...
The IOS XR XML API provides a programmatic interface to the router for use by external management applications. This interface provides a mechanism for router configuration and monitoring utilizing XML System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 142
The following example shows how to configure MPP support on an XML peer in-band interface: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# control-plane RP/0/RP0/CPU0:router(config-ctrl)# management-plane RP/0/RP0/CPU0:router(config-ctrl-mpp)# inband interface all allow xml peer address ipv4 172.10.10.1 System Security Command Reference for Cisco NCS 5000 Series Routers...
Use the control-plane command to enter control plane configuration mode. Task ID Task ID Operations system read, write Examples The following example shows how to enter control plane configuration mode using the control-plane command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# control-plane RP/0/RP0/CPU0:router(config-ctrl)# System Security Command Reference for Cisco NCS 5000 Series Routers...
Examples The following example shows how to enter management plane protection inband configuration mode using the inband command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# control-plane RP/0/RP0/CPU0:router(config-ctrl)# management-plane RP/0/RP0/CPU0:router(config-mpp)# inband RP/0/RP0/CPU0:router(config-mpp-inband)# System Security Command Reference for Cisco NCS 5000 Series Routers...
Use the interface command to enter management plane protection inband interface configuration mode. For the instance argument, you cannot configure Management Ethernet interfaces as inband interfaces. Task ID Task ID Operations system read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 146
Management Plane Protection Commands interface (MPP) Examples The following example shows how to configure all inband interfaces for MPP: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# control-plane RP/0/RP0/CPU0:router(config-ctrl)# management-plane RP/0/RP0/CPU0:router(config-mpp)# inband RP/0/RP0/CPU0:router(config-mpp-inband)# interface all RP/0/RP0/CPU0:router(config-mpp-inband-all)# System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Operations system read, write Examples The following example shows how to enter management plane protection configuration mode using the management-plane command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# control-plane RP/0/RP0/CPU0:router(config-ctrl)# management-plane RP/0/RP0/CPU0:router(config-mpp)# System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Task ID Operations system read Examples The following sample output displays all the interfaces that are configured as inband under MPP: RP/0/RP0/CPU0:router# show mgmt-plane Management Plane Protection inband interfaces System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 149
- All peers allowed telnet configured - peer v4 allowed - 10.1.0.0/16 all configured - All peers allowed interface - TenGigabitEthernet0_1_1_0 telnet configured - peer v4 allowed - 10.1.0.0/16 System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 150
Management Plane Protection Commands show mgmt-plane System Security Command Reference for Cisco NCS 5000 Series Routers...
For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure Shell chapter in the System Security Configuration Guide for Cisco NCS 5000 Series Routers. Currently, only default VRF is supported. VPNv4, VPNv6 and VPN routing and forwarding (VRF) address Note families will be supported in a future release.
Page 152
Secure Shell Commands • ssh timeout, page 177 System Security Command Reference for Cisco NCS 5000 Series Routers...
The clear ssh command is then used to terminate the incoming session with the ID number 0. show ssh RP/0/RP0/CPU0:router# SSH version: Cisco-2.0 session location state userid host -------------------------------------------------------------------- Incoming sessions vty0 0/33/1 SESSION_OPEN cisco 172.19.72.182 System Security Command Reference for Cisco NCS 5000 Series Routers...
The show netconf-yang clients command can be used to get the required session-id(s). Task ID Task ID Operation config-services read, write Examples This example shows how to use the clear netconf-yang agent session command: RP/0/RP0/CPU0:router (config) # clear netconf-yang agent session 32125 System Security Command Reference for Cisco NCS 5000 Series Routers...
SSH is currently the supported transport method for Netconf. Task ID Task ID Operation config-services read, write Examples This example shows how to use the netconf-yang agent ssh command: netconf-yang agent ssh RP/0/RP0/CPU0:router (config) # System Security Command Reference for Cisco NCS 5000 Series Routers...
If no username argument is provided, the login name on the router is used. If no hostname argument is provided, the file is considered local. Command Modes XR EXEC mode Command History Release Modification Release 6.0 This command was introduced. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 158
2102657024 bytes total (1537638400 bytes free) In the following example, user admin is uploading the file v6copy from disk0: to disk0a:/v6back on a local SFTP server using an IPv6 address: RP/0/RP0/CPU0:router#sftp disk0:/V6copy admin@[2:2:2::2]:disk0a:/v6back System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 159
Transferred 986 Bytes 986 bytes copied in 0 sec (564000)bytes/sec RP/0/RP0/CPU0:router#dir disk0:/sampfile_back Directory of disk0: 121765 -rwx Tue Oct 18 05:39:00 2011 sampfile_back 524501272 bytes total (512507614 bytes free) System Security Command Reference for Cisco NCS 5000 Series Routers...
'non-acknowledged' or outstanding requests to the server, the server might buffer or queue these requests for convenience. Therefore, there might be a logical sequence to the order of requests. The following unix based commands are supported in the interactive mode: System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 161
In the following example, user admin is downloading and uploading a file from/to an external SFTP server using an IPv6 address: RP/0/RP0/CPU0:router#sftp admin@[2:2:2::2] Connecting to 2:2:2::2... Password: sftp> pwd Remote working directory: / System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 162
/disk0:/frmRouterdownoad /auto/tftp-server1-users5/abc/frmRouter Transferred 1578 Bytes 1578 bytes copied in 0 sec (27684)bytes/sec sftp> put /disk0:/frmRouterdownoad againtoServer /disk0:/frmRouterdownoad Transferred 1578 Bytes 1578 bytes copied in 0 sec (14747)bytes/sec sftp> System Security Command Reference for Cisco NCS 5000 Series Routers...
15389| 1.1| 11:11:25| get-config| Table 9: Field descriptions Field name Description Client session ID Assigned session identifier NC version Version of the Netconf client as advertised in the hello message System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 164
Time elapsed since the client was connected Last OP time Last operation time Last OP type Last operation type Lock (yes or no) To check if the session holds a lock on the configuration datastore System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 166
Minimum processing time for a request of a given type Max time per request Maximum processing time for a request of a given type Avg time per request Average processing time for a request type System Security Command Reference for Cisco NCS 5000 Series Routers...
SESSION_OPEN 12.22.57. password 0/3/CPU0 SESSION_OPEN 12.22.57.75 keyboard-interactive The following output is applicable for the show ssh command starting IOS-XR 6.0 releases and later. RP/0/RP0/CPU0:router# show ssh SSH version : Cisco-2.0 System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 168
Specifies if the connection type is SSHv1 or SSHv2. authentication Specifies the type of authentication method chosen by the user. connection type Specifies which application is performed over this connection (Command-Line-Interface, Remote-Command, Scp, Sftp-Subsystem, or Netconf-Subsystem) System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 169
Secure Shell Commands show ssh System Security Command Reference for Cisco NCS 5000 Series Routers...
------------------------------------------------------------------------------- Incoming Session diffie-hellman ssh-dss 3des-cbc 3des-cbc hmac-md5 hmac-md5 Outgoing connection diffie-hellman ssh-dss 3des-cbc 3des-cbc hmac-md5 hmac-md5 This table describes the significant fields shown in the display. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 171
Encryption cipher chosen for the Rx traffic. outcipher Encryption cipher chosen for the Tx traffic. inmac Authentication (message digest) algorithm chosen for the Rx traffic. outmac Authentication (message digest) algorithm chosen for the Tx traffic. System Security Command Reference for Cisco NCS 5000 Series Routers...
(Optional) Specifies a remote command. Adding this keyword prompts the SSHv2 server to parse and execute thesshcommand in non-interactive mode instead of initiating the interactive session. System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 173
Operations crypto execute basic-services execute Examples The following sample output is from the ssh command to enable an outbound SSH client connection: RP/0/RP0/CPU0:router# ssh vrf green username userabc Password: Remote-host> System Security Command Reference for Cisco NCS 5000 Series Routers...
Shell (SSH) implementations in the UNIX environment. Task ID Task ID Operations crypto read, write Examples The following sample output is from the ssh client knownhost command: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# ssh client knownhost disk0:/ssh.knownhost RP/0/RP0/CPU0:router(config)# commit System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 175
RP/0/RP0/CPU0:router# ssh host1 username user1234 Host key not found from the list of known hosts. Are you sure you want to continue connecting (yes/no)? yes Password: RP/0/RP0/CPU0:host1# exit RP/0/RP0/CPU0:router# ssh host1 username user1234 System Security Command Reference for Cisco NCS 5000 Series Routers...
The system database (Sysdb) verifies that the interface specified in the command has a corresponding IP address (in the same family) configured. Task ID Task ID Operations crypto read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 177
Examples The following example shows how to set the IP address of the Management Ethernet interface for all outgoing SSH connections: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# ssh client source-interface MgmtEth 0/RP0/CPU0/0 System Security Command Reference for Cisco NCS 5000 Series Routers...
175 command. To verify that the SSH server is up and running, use the show process sshd command. Task ID Task ID Operations crypto read, write System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 179
Secure Shell Commands ssh server Examples In the following example, the SSH server is brought up to receive connections for VRF “green”: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# ssh serverserver vrf green System Security Command Reference for Cisco NCS 5000 Series Routers...
The second message confirms a successful login. Task ID Task ID Operations crypto read, write Examples The following example shows the initiation of an SSH server logging: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# ssh server logging System Security Command Reference for Cisco NCS 5000 Series Routers...
Operations crypto read, write Examples The following example shows how to set the limit of incoming SSH connection requests to 20 per minute: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# ssh server rate-limit 20 System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Task ID Operations crypto read, write Examples The following example shows how to set the limit of incoming SSH connections to 50: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# ssh server session-limit 50 System Security Command Reference for Cisco NCS 5000 Series Routers...
Only SSHv2 client connections are allowed. Task ID Task ID Operations crypto read, write Examples The following example shows how to initiate the SSH server version to be only SSHv2: RP/0/RP0/CPU0:router#configure RP/0/RP0/CPU0:router(config)# ssh server v2 System Security Command Reference for Cisco NCS 5000 Series Routers...
No specific guidelines impact the use of this command. Task ID Task ID Operation crypto read, write Examples This example shows how to use the ssh server netconf port command: RP/0/RP0/CPU0:router (config) # ssh server netconf port 830 System Security Command Reference for Cisco NCS 5000 Series Routers...
Task ID Task ID Operations crypto read, write Examples In the following example, the timeout value for AAA user authentication is set to 60 seconds: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# ssh timeout 60 System Security Command Reference for Cisco NCS 5000 Series Routers...
Page 186
Secure Shell Commands ssh timeout System Security Command Reference for Cisco NCS 5000 Series Routers...