Targeting the Cisco IOS networking equipment system
For each Cisco IOS networking equipment system, add a target system in Bravura Security Fabric (Manage the System > Resources > Target systems).
Type is Cisco IOS networking equipment (SSH) .
Address uses options described in the table below.
The full list of target parameters is explained in Target System Options .
Option | Description |
---|---|
Options marked with a | |
Script file | Must be set to agtcisco-ios.psl (key: script) |
Server | The IP address/domain name of the Cisco IOS networking equipment. (key: server) |
Target system’s internal hostname | This is the internally-defined host name that, along with the logged in user’s name, comprises the Cisco IOS prompt. The script generates the expected prompt using this value, then uses the generated prompt to know when commands have completed. (key: name) |
Save target system configuration | Select this to commit changes made to this target to permanent storage on the router, otherwise it will be stored in memory. This is selected by default. (key: docommit) |
Enter administrative mode with ’login’ (otherwise ’enable’) | Select this to enter the administrative configuration mode with the login password, otherwise the system (enable) password will be used. (key: adminuser) |
User and password prompt expected (otherwise password) | Select this if the Cisco IOS target expects a user and password prompt when connecting, otherwise only the password will be entered. This is selected by default. (key: connlogin) |
Hashed MD5 passwords (’secret’) supported | Select this if the Cisco IOS target supports hashed MD5 targets. This is selected by default. (key: advencrypt) |
Advanced | |
Port | TCP Port number. Default is 22. (key: port) |
Compression | Select to enable data compression for SSH connections. Default is false. (key: compression) |
Action for host keys | Select AllowAppend (default) or DenyUnmatch. For new targets, AllowAppend is recommended. AllowAppend connects to SSH hosts whose public host keys have been previously recorded and have not been changed, and to SSH hosts whose keys have not been previously recorded. It will reject SSH hosts whose keys were previously recorded but have changed. DenyUnmatch only connects to SSH hosts whose public host keys have been previously recorded and have not been changed. It will reject SSH hosts whose keys have not been previously recorded or were previously recorded but have changed. (key: hostkeys) |
Host keys file | Specify the name of the public host key file. It must be located in the \<instance>\script\ directory. The file consists of a KVGroup with an entry that contains the host information as the key and the hostkey as the value. This information can be extracted from the PuTTY registry entries (HKEY_CURRENT_USER \Software\SimonTatham\PuTTY\SshHostKeys) where "Name" corresponds to the key and "Data" corresponds to the value. (key: file) |
Authentication key file | This is a generic SSH target field that is ignored for Cisco IOS target systems. The administrative credentials must consist of a connect user and password, as well as an system password on the Cisco IOS networking equipment. |
Timeout for connection | Amount of time the connector will wait for a response. (key: timeout) |