Enabling enhanced secure mode
Use the following procedure to enable enhanced secure mode. Enhanced secure mode is disabled by default.
About this task
Note
When you migrate your switch from enhanced secure mode enabled to disabled, or from disabled to enabled, you must build a new configuration. Do not use a configuration created in either enhanced secure mode disabled or enabled, and expect it to transfer over to the new mode.
The configuration file cannot be guaranteed if you transfer between enhanced secure mode enabled to disabled, or from enhanced secure mode disabled to enabled.
After you enable the enhanced secure mode, the system provides role-based access levels, stronger password requirements, and stronger rules on password length, password complexity, password change intervals, password reuse, and password maximum age use. The enhanced secure mode boot flag supports two sub-modes namely JITC and non-JITC.
After you disable enhanced secure mode, the authentication, access-level, and password requirements work similarly to any of the existing commercial releases.
Procedure
Example
Enable the enhanced secure non-JITC sub-mode:
Switch:1>enable Switch:1#configure terminal Switch:1(config)#boot config flags enhancedsecure-mode non-jitc Switch:1(config)#save config Switch:1(config)#exit Switch:1(config)#boot config /intflash/config.cfg -y
Enable the enhanced secure JITC sub-mode:
Switch:1>enable Switch:1#configure terminal Switch:1(config)#boot config flags enhancedsecure-mode jitc Switch:1(config)#save config Switch:1(config)#exit Switch:1(config)#boot config /intflash/config.cfg -y
Variable definitions
Use the data in the following table to use the boot config flags enhancedsecure-mode command.
Variable |
Value |
---|---|
jitc |
Enables the JITC enhanced secure mode. The JITC mode is more restrictive and prevents the use of some CLI commands that are commonly used for troubleshooting. |
non-jitc |
Enables the non-JITC enhanced secure mode. |