Cisco Cisco SG500-52PP 52-port Gigabit Max PoE+ Stackable Managed Switch 维护手册
Security: Secure Sensitive Data Management
Configuring SSD
579
Cisco 500 Series Stackable Managed Switch Administration Guide
26
-
Insecure XML SNMP—Indicates that this rule applies only to XML over
HTTP or and SNMPv1/v2and SNMPv3 without privacy.
HTTP or and SNMPv1/v2and SNMPv3 without privacy.
•
Read Permission—The read permissions associated with the rule. These
can be the following:
can be the following:
-
Exclude—Lowest read permission. Users are not permitted to get
sensitive data in any form.
sensitive data in any form.
-
Plaintext Only—Higher read permission than above ones. Users are
permitted to get sensitive data in plaintext only.
permitted to get sensitive data in plaintext only.
-
Encrypted Only—Middle read permission. Users are permitted to get
sensitive data as encrypted only.
sensitive data as encrypted only.
-
Both (Plaintext and Encrypted)—Highest read permission. Users have
both encrypted and plaintext permissions and are permitted to get
sensitive data as encrypted and in plaintext
both encrypted and plaintext permissions and are permitted to get
sensitive data as encrypted and in plaintext
•
Default Read Mode—All default read modes are subjected to the read
permission of the rule. The following options exist, but some might be
rejected, depending on the rule’s read permission.
permission of the rule. The following options exist, but some might be
rejected, depending on the rule’s read permission.
-
Exclude—Do not allow reading the sensitive data.
-
Encrypted—Sensitive data is presented encrypted.
-
Plaintext—Sensitive data is presented as plaintext.
STEP 3
Click Apply. The settings are saved to the Running Configuration file.
STEP 4
The following actions can be performed on selected rules:
•
Add, Edit or Delete rules
•
Restore to Default—Restore a user-modified default rule to the default rule.