Admin Guide

Table Of Contents
flags trace-logging false
flags urpf-mode false
flags verify-config true
In this example, the enhanced secure mode displays as false, which means the enhanced secure
mode is disabled:
Switch:1>enable
Switch:1#show boot config flags
flags block-snmp false
flags debug-config false
flags debugmode false
flags enhancedsecure-mode false
flags factorydefaults false
flags ftpd true
flags hsecure false
flags ipv6-mode false
flags logging true
flags nni-mstp false
flags reboot true
flags rlogind false
flags spanning-tree-mode mstp
flags spbm-config-mode true
flags sshd true
flags telnetd true
flags tftpd true
flags trace-logging false
flags urpf-mode false
flags verify-config true
Enabling enhanced secure mode
Use the following procedure to enable enhanced secure mode. Enhanced secure mode is disabled
by default.
About this task
Note:
When you migrate your switch from enhanced secure mode enabled to disabled, or from
disabled to enabled, you must build a new configuration. Do not use a configuration created in
either enhanced secure mode disabled or enabled, and expect it to transfer over to the new
mode.
The configuration file cannot be guaranteed if you transfer between enhanced secure mode
enabled to disabled, or from enhanced secure mode disabled to enabled.
After you enable the enhanced secure mode, the system provides role-based access levels,
stronger password requirements, and stronger rules on password length, password complexity,
password change intervals, password reuse, and password maximum age use. The enhanced
secure mode boot flag supports two sub-modes namely JITC and non-JITC.
After you disable enhanced secure mode, the authentication, access-level, and password
requirements work similarly to any of the existing commercial releases.
Procedure
1. Enter Global Configuration mode:
enable
System access configuration using ACLI
January 2017 Administering Avaya VSP 7200 Series and 8000 Series 197
Comments on this document? infodev@avaya.com