Documents Product Categories Array Networks vxAG (PAYG) - 5 Concurrent Users + 5 vSites

Array Networks vxAG (PAYG) - 5 Concurrent Users + 5 vSites

Jun 28, 2024
”, “<”, “&”, “/”, “\”, “,”, “"” and “''”.  The test certificate generated by the “ssl csr” command is only used for testing purposes, not for production systems. ssl ecc csr [curve_name] [signature_algorithm_index] This command is used to generate a CSR (Certificate Signing Request) and an SSL key pair based on the Elliptic Curve Cryptography (ECC) for the current virtual site. After this command is executed, the administrator will be led through a series of prompts so that the system can gather the required information to generate the ECC CSR. The administrator can choose to set the private key as exportable and set the passphrase for the private key to protect it. In addition, this command also generates a “test” certificate for the virtual site. If the administrator has not uploaded the intermediate CA certificates and root CA certificate of this “test” certificate using the commands “ssl import interca” and “ssl import rootca”, a warning message indicating an incomplete certificate chain will be displayed. 2000-2018 Array Networks, Inc. All Rights Reserved. 34Chapter 3 Virtual Site curve_name Optional. This parameter specifies the elliptic curve name. Its value must be “prime256v1”, “secp384r1”, or “secp521r1”. The default value is “prime256v1”. signature_algorithm_index Optional. This parameter specifies the index of the CSR signature algorithm. Its value must be sha256, sha384, sha512, and sha1. The default value is “sha256”. Note: If the elliptic curve field in the ClientHello message does not match the elliptic curve in the ECC certificate activated for the virtual site, the SSL handshake will fail. no ssl csr [csr_type] This command is used to delete the CSR of the specified type for the current virtual site. csr_type Optional. This parameter specifies the type of the CSR. Its value must be:  rsa: indicates the RSA CSR will be deleted.  sm2: indicates the SM2 CSR will be deleted.  ecc: indicates that the ECC CSR will be deleted.  all: indicates all types of CSRs will be deleted. The default value is “all”. show ssl csr [csr_type] This command is used to display the CSR of the specified type for the current virtual site. csr_type Optional. This parameter specifies the type of the CSR. Its value must be:  rsa: indicates the RSA CSR will be deleted.  sm2: indicates the SM2 CSR will be deleted.  ecc: indicates that the ECC CSR will be displayed.  all: indicates all types of CSRs will be deleted. The default value is “all”. ssl import key [key_index] [tftp_ip] [file_name] 2000-2018 Array Networks, Inc. All Rights Reserved. 35Chapter 3 Virtual Site This command is used to import a private key for the current virtual site. The administrator can import three private keys at most. The administrator can execute this command and copy-n-paste the private key directly into the CLI. The system also supports importing private keys from a remote TFTP server. key_index Optional. This parameter specifies the index to be associated with the imported key. Its value must be 1, 2 or 3, and defaults to 1. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server, which is required only when the private key is imported via TFTP. It value must be an IPv4 address. file_name Optional. This parameter specifies the file name of the key on the remote TFTP server, which is required only when the private key is imported via TFTP. Its value must be a string of 1 to 256 characters, and defaults to “ .key”. ssl export key [key_index] [key_type] This command is used to export a private key. After this command is executed, the specified key will be displayed. key_index Optional. This parameter specifies the index of the imported key to be exported. Its value must be 1, 2 or 3. If this parameter is not specified, the active key will be displayed. key_type Optional. This parameter specifies the type of the private key to be displayed. Its value must be:  rsa: indicates that the RSA private key will be displayed.  ecc: indicates that the ECC private key will be displayed.  all: indicates that both RSA and ECC private keys will be displayed. The default value is “all”. ssl import certificate [cert_index] [tftp_ip] [file_name] This command is used to import a certificate for the current virtual site. The administrator can import three certificates at most. The imported certificate can be activated by the command “ssl activate certificate [cert_index]”. The administrator can execute this command and copy-n-paste the PEM format certificate directly into the CLI. The system also supports importing PEM, DER and PFX formats as well as the certificates used by IIS 4, IIS 5 and Netscape iPlanet servers from a remote TFTP server. 2000-2018 Array Networks, Inc. All Rights Reserved. 36Chapter 3 Virtual Site cert_index Optional. This parameter specifies the index to be associated with the imported certificate. Its value must be 1, 2 or 3, and defaults to 1. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server, which is required only when the certificate is imported via TFTP. It value must be an IPv4 address. file_name Optional. This parameter specifies the file name of the certificate on the remote TFTP server, which is required only when the certifcate is imported via TFTP. Its value must be a string of 1 to 256 characters, and defaults to “ .crt”. no ssl certificate [cert_index] [cert_type] This command is used to delete an imported certificate of the specified type for the current virtual site. cert_index Optional. This parameter specifies the index of the certificate. Its value must be 1, 2 or 3. The default value is 1. cert_type Optional. This parameter specifies the type of the certificate. Its value must be:  rsa: indicates that the RSA certificate will be deleted.  ecc: indicates that the ECC certificate will be deleted.  all: indicates that both RSA and ECC certificates will be deleted. The default value is “all”. ssl activate certificate [cert_index] [cert_type] This command is used to activate an imported certificate as the default certificate. cert_index Optional. This parameter specifies the index of the certificate to be activated. Its value must be 1, 2 or 3. The default value is 1. cert_type Optional. This parameter specifies the type of certificate to be activated. Its value must be:  rsa: indicates the RSA certificate will be activated.  sm2: indicates the SM2 certificates will be activated. 2000-2018 Array Networks, Inc. All Rights Reserved. 37Chapter 3 Virtual Site  ecc: indicates that the ECC certificate will be activated.  all: indicates all types of certificates will be activated. The default value is “all”. Note:  For each type of certificate, only one certificate/key (with the same index) pair can stay active in the system. The certificate/key pair generated by the command “ssl csr” is active by default. The certificate/key pair generated by the command “ssl ecc csr” is active by default. The certificate/key pair generated by the “ssl sm2 csr” command is inactive by default.  If the elliptic curve field in the ClientHello message does not match the elliptic curve in the ECC certificate activated for the virtual site, the SSL handshake will fail. show ssl certificate [display_mode] [cert_index] [cert_type] This command is used to display an imported certificate. display_mode Optional. This parameter specifies the display mode of certificate. Its value must be:  complete: indicates that all the information of the certificate will be displayed.  simple: indicates that only Issuer, Validity and Subject of the certificate will be displayed. The default value is “complete”. cert_index Optional. This parameter specifies the index of the imported certificate to be displayed. Its value must be 1, 2 or 3. If this parameter is not specified, the active certificate will be displayed. cert_type Optional. This parameter specifies the type of certificate to be displayed. Its value must be:  rsa: indicates the RSA certificate will be displayed.  sm2: indicates the SM2 certificates will be displayed.  ecc: indicates that the ECC certificate will be displayed.  all: indicates all types of certificates will be displayed. The default value is “all”. 2000-2018 Array Networks, Inc. All Rights Reserved. 38Chapter 3 Virtual Site show ssl certinfo This global command is used to display the information about the SSL certificate(s) of a specified virtual site. virtual_site This parameter specifies the name of an existing virtual site. For example: AN#show ssl certinfo vs RSA certificates status: Cert Index Imported Status 1 YES Active 2 NO - 3 NO - ECC certificates status: Cert Index Imported Status 1 YES Active 2 NO - 3 NO - SM2 certificates status: Cert Index Imported Status Sign/Enc 1 YES/NO - 2 NO /NO - 3 NO /NO - ssl import rootca [tftp_ip] [file_name] Under the global scope, this command is used to import a trusted CA certificate for all the virtual sites. Under the virtual site scope, this command is used to import a trusted CA certificate for the current virtual site. The administrator can execute this command and copy-n-paste the trusted CA certificate of PEM format directly into the CLI. The system also supports importing trusted CA certificate of PEM and DER formats from a remote TFTP server. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server, which is required only when the trusted CA certificate is imported via TFTP. Its value must be an IPv4 address. file_name Optional. This parameter specifies the file name of the trusted CA certificate on the remote TFTP server, which is required only when the trusted CA certificate is imported via TFTP. Its value must be a 2000-2018 Array Networks, Inc. All Rights Reserved. 39Chapter 3 Virtual Site string of 1 to 256 characters, and defaults to “ .crt”. no ssl rootca [certificate_number] Under the global scope, this command is used to delete an imported trusted CA certificate from all the virtual sites. Under the virtual site scope, this command is used to delete an imported trusted CA certificate from the current virtual site. certificate_number Optional. This parameter specifies the serial number of the trusted CA certificate to be deleted. Administrators can find the serial number of the certificate via the “show ssl rootca” command. If this parameter is not specified, all the trusted CA certificates will be deleted. show ssl rootca [display_mode] Under the global scope, this command is used to display the trusted CA certificate imported for all the virtual sites. Under the virtual site scope, this command is used to display the trusted CA certificate imported for the current virtual site. display_mode Optional. This parameter specifies the display mode of certificate. Its value must be:  complete: indicates that all the information of the certificate will be displayed.  simple: indicates that only Issuer, Validity and Subject of the certificate will be displayed. The default value is “complete”. ssl import interca [tftp_ip] [file_name] This command is used to import an intermediate CA certificate for the current virtual site. The administrator can execute this command and copy-n-paste the intermediate CA certificate of PEM format directly into the CLI. The system also supports importing intermediate CA certificate of PEM and DER formats from a remote TFTP server. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server, which is required only when the intermediate CA certificate is imported via TFTP. Its value must be an IPv4 address. 2000-2018 Array Networks, Inc. All Rights Reserved. 40Chapter 3 Virtual Site file_name Optional. This parameter specifies the file name of the intermediate CA certificate on the remote TFTP server, which is required only when the intermediate CA certificate is imported via TFTP. Its value must be a string of 1 to 256 characters, and defaults to “ .crt”. no ssl interca [certificate_number] This command is used to delete an imported intermediate CA certificate from the current virtual site. certificate_number Optional. This parameter specifies the serial number of the intermediate CA certificate to be deleted. Administrators can find the serial number of the certificate via the “show ssl interca” command. If this parameter is not specified, all the intermediate CA certificates will be deleted. show ssl interca [display_mode] This command is used to display the intermediate CA certificate imported for the current virtual site. display_mode Optional. This parameter specifies the display mode of certificate. Its value must be:  complete: indicates that all the information of the certificate will be displayed.  simple: indicates that only Issuer, Validity and Subject of the certificate will be displayed. The default value is “complete”. ssl backup certificate This command is used to back up the certificate and the private key of the current virtual site into a PFX file. This PFX file will be zipped with the trusted CA certificate (refer to “ssl import rootca” command) and intermediate CA certificate (refer to “ssl import interca” command) into a .tgz file. This .tgz file can be stored in the local system or on a specified TFTP server. If anyone wants to access the .tgz file, the correct password is required. file_name This parameter specifies the file name. Its value must be a string of 1 to 256 characters, which is recommended to be enclosed by double quotes. Only numbers, letters and underscore “_” are supported.  To store the backup file locally, use a valid local file name 2000-2018 Array Networks, Inc. All Rights Reserved. 41Chapter 3 Virtual Site (excluding the path and extension).  To store the backup file on a remote server, use a properly formatted TFTP string (e.g., "tftp://server/filename"). password This parameter specifies the password that allows access to the backup file. Its value must be a string of 1 to 128 characters, which is recommended to be enclosed by double quotes. Only numbers, letters and underscore “_” are supported. no ssl backup certificate This command is used to delete the specified backup certificate/key file stored in the local system. The parameter “file_name” must be a valid local file name. show ssl backup certificate This command is used to display the backup certificate/key file that stored in the local system. ssl restore certificate The command is used to restore the certificate and the private key from a PFX file, which can be stored in the local system or on the remote TFTP server. The password string must be identical to the string entered when this backup file was produced using the “ssl backup certificate” command. file_name This parameter specifies the file name. password This parameter specifies the password that allows access to the specified backup file. ssl settings protocol This command is used to set the supported SSL protocol version for the current virtual site. The AG appliance supports three types of protocols: SSLv3, TLSv1 and TLSv1.2. version This parameter specifies the SSL protocol version. Its value must be:  SSLv3: indicates that SSLv3 protocol is supported.  TLSv1: indicates that TLSv1 protocol is supported.  TLSv12: indicates that TLSv1.2 protocol is supported.  SM2v11: indicates that SM2v1.1 protocol is supported.  ALL: indicates that the above four SSL protocols are all supported.  To use more than one protocol, use colon “:” to separate each 2000-2018 Array Networks, Inc. All Rights Reserved. 42Chapter 3 Virtual Site other. For cipher suites supported by each protocol, please refer to ArrayOS AG 9.4 User Guide. For example: AN(config)#ssl settings protocol SSLv3 AN(config)#ssl settings protocol ALL ssl settings ciphersuite This command is used to set the supported cipher suite for the current virtual site. cipher_string This parameter specifies the cipher suite. To use more than one cipher suite, use colon “:” to separate each other. Below is a list of supported cipher suites:  DES-CBC3-SHA  RC4-SHA  RC4-MD5  EXP-RC4-MD5  AES128-SHA  AES256-SHA  AES128-SHA256  AES256-SHA256  ECDHE-RSA-AES128-SHA  ECDHE-RSA-AES256-SHA  ECDHE-RSA-AES128-SHA256  ECDHE-RSA-AES256-SHA384  ECDHE-RSA-AES128-GCM-SHA256  ECDHE-RSA-AES256-GCM-SHA384  ECDHE-ECDSA-AES128-SHA  ECDHE-ECDSA-AES256-SHA  ECDHE-ECDSA-AES128-SHA256  ECDHE-ECDSA-AES256-SHA384  ECDHE-ECDSA-AES128-GCM-SHA256 2000-2018 Array Networks, Inc. All Rights Reserved. 43Chapter 3 Virtual Site  ECDHE-ECDSA-AES256-GCM-SHA384  ECC-SM4-SM3  ECDHE-SM4-SM3 Note: Only experienced administrators should use this command. If you have any questions regarding these settings, please call customer support BEFORE using this command. ssl settings signalgo This command is used to set the signature algorithm that will be used in the ServerKeyExchange message generated during SSL handshake for the current virtual site. This command takes effect for only the negotiation of ECDHE cipher suites. If the signature algorithm field in the ClientHello message matches multiple configured signature algorithms, the first one configured in this command will be used. If the signature algorithm field in the ClientHello message does not match any configured signature algorithm, the SSL handshake will fail. Please note that this configuration takes effect only when the TLSv1.2 protocol is used. If this command is not configured, the default signature algorithms are “sha256ECDSA:sha256RSA:sha384ECDSA:sha384RSA:sha512ECDSA:sha512RSA:sha224EC DSA:sha224RSA:sha1ECDSA:sha1RSA”. signature_algorithm This parameter specifies the signature algorithm that will be used in the ServerKeyExchange message generated during SSL handshake. Its value must be “sha256ECDSA”, “sha256RSA”, “sha384ECDSA”, “sha384RSA”, “sha512ECDSA”, “sha512RSA”, “sha224ECDSA”, “sha224RSA”, “sha1ECDSA”, and “sha1RSA”. Multiple signature algorithms can be configured. To use more than one signature algorithm, use colon “:” to separate each other. ssl settings curves This command is used to set the elliptic curve that will be used in the ServerKeyExchange message generated during SSL handshake for the current virtual site. This command takes effect for only the negotiation of ECDHE cipher suites. If the elliptic curve field in the ClientHello message matches multiple configured elliptic curves, the first one configured in this command will be used. If the elliptic curve field in the ClientHello message does not match any configured elliptic curve, the SSL handshake will fail. If this command is not configured, the default elliptic curves are “secp256r1:secp384r1:secp521r1”. curve_name This parameter specifies the name of the elliptic curve that will be used in the ServerKeyExchange message generated during SSL 2000-2018 Array Networks, Inc. All Rights Reserved. 44Chapter 3 Virtual Site handshake. Its value must be “secp256r1”, “secp384r1” and “secp521r1”. Multiple elliptic curves can be configured. To use more than one elliptic curve, use colon “:” to separate each other. ssl settings clientcert signalgo This command is used to set the signature algorithm that will be used in the CertificateRequest message generated during SSL handshake for the current virtual site. For TLSv1.2, the signature algorithm field in the CertificateRequest message contains all configured signature algorithms. For other SSL versions lower than TLSv 1.2, the configured signature algorithm must contain sha1RSA or sha1ECDSA; otherwise, the SSL handshake will fail. If this command is not configured, the default signature algorithms are “sha256ECDSA:sha256RSA:sha384ECDSA:sha384RSA:sha512ECDSA:sha512RSA:sha224EC DSA:sha224RSA:sha1ECDSA:sha1RSA”. signature_algorithm This parameter specifies the signature algorithm that will be used in the CertificateRequest message generated during SSL handshake. Its value must be “sha256ECDSA”, “sha256RSA”, “sha384ECDSA:”, “sha384RSA:”, “sha512ECDSA”, “sha512RSA:”, “sha224ECDSA:”, “sha224RSA”, “sha1ECDSA” and “sha1RSA”. Multiple signature algorithms can be configured. To use more than one signature algorithm, use colon “:” to separate each other. ssl settings clientauth [subject_filter] This command is used to enable the client authentication feature. If the host is an SSL virtual site, all SSL clients connecting to this virtual site must present a client certificate in order to proceed with communication. If the host is an SSL real host, it will present a certificate to the server when requested for further communication. In addition to basic client certificate validation, the SSL virtual site can also perform pattern matching of the certificate “Subject” field against a set of configured filter rules. If no match is found, client access will be denied. subject_filter Optional. This parameter specifies one or more certificate filter rules. Its value must be enclosed in double quotes with each rule separated by “/” (e.g., “/C=US/ST=CA”). If more than one rule is specified, rules will be enforced with an “AND” relationship (all rules must be matched). If this parameter is not specified, the system will not perform filtering on the “Subject” fields. 2000-2018 Array Networks, Inc. All Rights Reserved. 45Chapter 3 Virtual Site The filter rules can be configured with any of the RDNs (Relative Distinguished Name) supported by the AG appliances, including: RDN Standard Name OID C Country Name 2.5.4.6 ST State or Province Name 2.5.4.8 L Locality Name 2.5.4.7 O Organization Name 2.5.4.10 OU Organizational Unit Name 2.5.4.11 CN Common Name 2.5.4.3 SN Serial Number 2.5.4.5 dnQualifier DN Qualifier 2.5.4.46 Pseudonym Pseudonym 2.5.4.65 Title Title 2.5.4.12 GQ Generation Qualifier 2.5.4.44 Initials Initials 2.5.4.43 Name Name 2.5.4.41 givenName Given Name 2.5.4.42 Surname Surname 2.5.4.4 DC Domain Component 0.9.2342.19200300.100.1.25 emailAddress Email Address 1.2.840.113549.1.9.1 {OID expression} OID information, for example: 1.2.3.4 For example: AN(config)#ssl settings clientauth "/C=US/O=Array/OU=QA/emailAddress=admin@arraynetworks.com" In this example, all client certificates with the country name of “US”, organization name of “Array”, organizational unit name of “QA” and email address of “admin@arraynetworks.com” in the certificate “Subject" field will pass the subject filter. AN(config)#ssl settings clientauth "/2.5.4.6=JP" In this example, the OID “2.5.4.6” represents “Country Name”. All client certificates with the OID “2.5.4.6” of “JP” in the certificate “Subject” field will pass the subject filter. no ssl settings clientauth This command is used to disable the client authentication feature. ssl settings ocsp This command is used to configure the OCSP server and enable the OCSP server online check. After this command is executed, the AG appliance will first attempt to validate client certificates online through the OCSP server specified in the client certificate. If this validation fails, the AG appliance will then attempt to validate the client certificate online through the OCSP server configured by this command. 2000-2018 Array Networks, Inc. All Rights Reserved. 46Chapter 3 Virtual Site ocsp_server This parameter specifies the IP address of the OCSP server. Its value must be an IPv4 address. Note: If both the OCSP server and CRL check are configured, only the OCSP server will be used to validate the certificate. no ssl settings ocsp This command is used to disable the OCSP server online check. ssl import crlca [tftp_ip] [file_name] This command is used to import a CRL CA certificate for the current virtual site. When the AG appliance attempts to validate client certifiates using the CRL (Certificate Revocation List) issued by CA, CRL CA certificate is needed to verify the validity of the CRL files. The administrator can execute this command and copy-n-paste the CRL CA certificate of PEM format directly into the CLI. The system also supports importing CRL CA certificate of PEM and DER formats from a remote TFTP server. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server, which is required only when the CRL CA certificate is imported via TFTP. Its value must be an IPv4 address. file_name Optional. This parameter specifies the file name of the CRL CA certificate on the remote TFTP server, which is required only when the CRL CA certificate is imported via TFTP. Its value must be a string of 1 to 256 characters, and defaults to “ .crt”. no ssl crlca [certificate_number] This command is used to delete an imported CRL CA certificate from the current virtual site. certificate_number Optional. This parameter specifies the serial number of the CRL CA certificate to be deleted. Administrators can find the serial number of the certificate via the “show ssl crlca” command. If this parameter is not specified, all the CRL CA certificates will be deleted. show ssl crlca [display_mode] This command is used to display the CRL CA certificate imported for the current virtual site. display_mode Optional. This parameter specifies the display mode of certificate. Its value must be: 2000-2018 Array Networks, Inc. All Rights Reserved. 47Chapter 3 Virtual Site  complete: indicates that all the information of the certificate will be displayed.  simple: indicates that only Issuer, Validity and Subject of the certificate will be displayed. The default value is “complete”. ssl settings crl online This command is used to enable the CRL online check. After this command is executed, the AG appliance will attempt to validate the certificate using the CRL downloaded from the CDP (CRL Distribution Point) specified in the client certificate. This command will take effect only when the client authentication feature is enabled. Note: This command cannot be used together with the “ssl settings crl offline” command. no ssl settings crl online This command is used to disable the CRL online check. ssl settings crl offline [time_interval] [delay_time] This command is used to enable the CRL offline check. After this command is executed, the AG appliance will attempt to validate the certificate using the CRL downloaded from the configured CDP at the desired time interval. HTTP, FTP and LDAP are supported protocols to fetch the CRL files. For each virtual site, the administrator can configure ten CDPs. This command will only take effect when the client authentication feature is enabled. cdp_name This parameter specifies the name of the CDP. Its value must be a string of 1 to 32 characters. Only 0-9, a-z, A-Z and underscore “_” are supported. crl_distribution_point This parameter specifies the URL address of the CDP. Its value must be a string of 1 to 512 characters. time_interval Optional. This parameter specifies the time interval between CRL file downloads in minutes. Its value must be an integer ranging from 1 to 65,535, and defaults to 1440. delay_time Optional. This parameter specifies the delay time of the CRL file expiration in minutes. Its value must be an integer ranging from 1 to 2000-2018 Array Networks, Inc. All Rights Reserved. 48Chapter 3 Virtual Site 65,535, and defaults to 0.  When it is larger than 0, the AG appliance will check for expiration after downloading the CRL file. For example, if the current time is greater than the sum of the next update time (expiration time of this file) and delay time, the CRL file is expired and the AG appliance will refuse all SSL connections that need to authenticate the client certificate via the CRL. If the current time is less than or equal to the sum of the next update time and delay time, the CRL file is valid.  When it is equal to 0, the AG appliance will not check for expiration after downloading the CRL file. Note: Before executing this command, you must first import the CRL CA certificate via the “ssl import crlca” command. no ssl settings crl offline [cdp_name] This command is used to disable the CRL offline check. cdp_name Optional. This parameter specifies the name of the CDP. Its value must be:  the CDP name: indicates that CRL files will not be downloaded from the specified CDP.  ALL: indicates that the CRL files will not be downloaded from any CDP. The default value is “ALL”. show ssl crlstatus [cdp_name] This command is used to display the information of CRL files downloaded from the specified CDP. cdp_name Optional. This parameter specifies the name of the CDP. Its value must be:  the CDP name: indicates that the system will display the CRL files downloaded from the specified CDP.  ALL: indicates that the system will display the CRL files downloaded from all the CDP. The default value is “ALL”. ssl settings authmandatory 2000-2018 Array Networks, Inc. All Rights Reserved. 49Chapter 3 Virtual Site This command is used to enable the client mandatory authentication mode. By default, the client mandatory authentication mode is enabled. no ssl settings authmandatory This command is used to disable the client mandatory authentication mode. ssl settings acceptchain This command is used to enable the accept certificate chain function. Once enabled, the SSL virtual site will utilize the certificate chain sent by the peer during an SSL handshake to verify that peer’s certificate. The SSL virtual site will try to use the certificate chain from peer to form the certificate chain until it finds one CA certificate in its own trust CA list. This command will only take effect when client authentication is enabled. no ssl settings acceptchain This command is used to disable the accept certificate chain function. ssl settings minimum This command is used to specify the minimum encryption strength of the client. If any client connecting to this virtual site does not support the encryption strength specified by the “cipher_strength” parameter, it will be redirected to the URL specified by the “redirect_url” parameter. This command should only be used with SSL virtual sites doing HTTPS. cipher_strength This parameter specifies the minimum encryption strength in bits. Its value must be 40, 56, 128,168, 256 or 512. redirect_url This parameter specifies the HTTP or HTTPS URL address to redirect to. Its value must be a string of 1 to 512 characters. no ssl settings minimum This command is used to disable the minimum encryption strength requirement. ssl settings renegotiation This command is used to enable the SSL renegotiation function for the current virtual site. By default, the SSL renegotiation function is disabled for the virtual site. Note: The SM2v1.1 protocol does not support the SSL renegotiation function. no ssl settings renegotiation This command is used to disable the SSL renegotiation function for the current virtual site. ssl settings reuse 2000-2018 Array Networks, Inc. All Rights Reserved. 50Chapter 3 Virtual Site This command is used to enable the SSL session reuse function. By default, the SSL session reuse function is enabled. no ssl settings reuse This command is used to disable the SSL session reuse function. show ssl settings This command is used to display the SSL settings for the current virtual site. ssl globals sendclosenotify {on|off} This global command is used to enable or disable the function of sending SSL close notification. By default, this function is enabled. ssl globals ignoreclosenotify {on|off} This global command is used to enable or disable the function of the AG appliance ignoring the SSL close notification sent from the client. It applies to all configured SSL virtual sites. By default, this function is enabled.  If this function is enabled, the AG appliance will ignore SSL close notify errors when a client does not terminate an SSL connection correctly (or terminates an SSL connection without sending the Close Notify Alert). Consequently, the AG appliance will continue to reuse the associated SSL sessions.  If this function is disabled, the AG appliance will require the connection to be closed with the Close Notify Alert. In this case, if a client does not send the Close Notify Alert before closing a connection then the associated SSL session will be marked as invalid and flushed.  ssl globals verifycert {on|off} This global command is used to enable or disable the server certificate verification function. This function is needed when the AG appliance needs to verify the certificates sent by the backend servers. After this function is enabled, trusted root CA certificates should be imported under the global scope. By default, this function is disabled. ssl globals renegotiation {on|off} This global command is used to enable or disable the SSL renegotiation function globally. By default, this function is disabled globally. Note: When any virtual site uses certificate authentication, the SSL renegotiation function needs to be enabled globally. ssl globals fastcrl {on|off} This global command is used to enable or disable CRL memory. When enabled, the CRL files on disk will be loaded into memory immediately. By default, this function is disabled. ssl globals sessiontimeout 2000-2018 Array Networks, Inc. All Rights Reserved. 51Chapter 3 Virtual Site This global command is used to set the SSL session cache timeout value. timeout This parameter specifies the timeout value in seconds. Its value must be an integer ranging from 60 to 86,400 characters. show ssl globals This global command is used to display SSL global settings. ssl start This command is used to enable SSL service for a specific host. All services associated with this specified SSL virtual site will be affected. The AG appliance will check the certificate chain for the SSL virtual site when starting the virtual site. A warning message, stating that the certificate chain is incomplete will be displayed if the certificate chain cannot be formed using the intermediate CA file and global trusted CA file. Note: SSL virtual site settings cannot be changed while SSL is enabled. To make changes, SSL must first be disabled (see the “ssl stop” command below). ssl stop This command is used to disable the SSL service for a specific host. It will not remove the associated information such as key and certificate data. clear ssl This command is used to clear the SSL configurations, including the key and certificate pair. If this command is executed, there is no way to retrieve the key even if there is a copy of the CSR. To reconfigure SSL for this virtual site, a new key and a replacement certificate will need to be created. Note: To execute this command, all services associated with this specified SSL virtual site will be affected. show statistics ssl This command is used to display all the SSL statistics for the current virtual site. clear statistics ssl This command is used to clear all relative SSL statistics for the current virtual site. SM2 ssl globals sm2 {on|off} This global command is used to enable or disable the SM2 function. By default, this function is disabled. 2000-2018 Array Networks, Inc. All Rights Reserved. 52Chapter 3 Virtual Site ssl sm2 csr [curve_name] [csr_format] This command is used to generate an SM2 CSR and an SM2 signature key pair for the current virtual site. Please enable the SM2 function first before executing this command. After this command is executed, the administrator will be led through a series of prompts so that the system can gather the required information to generate the CSR. The administrator can choose to set the private key as exportable and set the passphrase for the private key to protect it. In addition, this command also generates a “test” signature certificate for the virtual site. Please refer to the “ssl csr” command for the requested data and other details displayed after this command is executed. curve_name Optional. This parameter specifies the curve name used by the SM2 algorithm. Its value must only be “sm2”. The default value is “sm2”. csr_format Optional. This parameter specifies the CSR format. Its value must be “SCCA” or “CFCA”. The default value is “SCCA”. ssl sm2 import enckey [key_index] [tftp_ip] [file_name] This command is used to import an SM2 encryption key for the current virtual site. The administrator can import three private keys at most. The administrator can execute this command and copy-n-paste the private key directly into the CLI. The system also supports importing private keys from a remote TFTP server. key_index Optional. This parameter specifies the index to be associated with the imported SM2 encryption key. Its value must be 1, 2 or 3. The default value is 1. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server. This parameter needs to be specified when you want to import the SM2 encryption key from a remote TFTP server. It value must be an IPv4 address. file_name Optional. This parameter specifies the file name of the SM2 encryption key on the remote TFTP server. This parameter needs to be specified when you want to import the SM2 encryption key from a remote TFTP server. Its value must be a string of 1 to 256 characters. The default value is “ .key”. ssl sm2 export enckey [key_index] This command is used to export an SM2 encryption key. After this command is executed, the specified key will be displayed. 2000-2018 Array Networks, Inc. All Rights Reserved. 53Chapter 3 Virtual Site key_index Optional. This parameter specifies the index of the imported SM2 encryption key to be exported. Its value must be 1, 2 or 3. If this parameter is not specified, the active key will be displayed. ssl sm2 import encevp [key_index] [digital_envelope_format] [tftp_ip] [file_name] This command is used to import an SM2 digital envelope returned by CA for the current virtual site. Before importing the SM2 digital envelope of the SCCA format, please import the corresponding SM2 signature key first using the “ssl sm2 import signkey” command. The administrator can execute this command and copy-n-paste the SM2 digital envelope directly into the CLI. The system also supports importing private keys from a remote TFTP server. key_index Optional. This parameter specifies the index to be associated with the imported SM2 encryption key. Its value must be 1, 2 or 3. The default value is 1. digital_envelope_format Optional. This parameter specifies the format of the SM2 digital envelope obtained from the trusted CA. Its value must be “SCCA” or “CFCA”. The default value is “SCCA”. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server. This parameter needs to be specified when you want to import the SM2 digital envelope from a remote TFTP server. It value must be an IPv4 address. file_name Optional. This parameter specifies the file name of the SM2 digital envelope on the remote TFTP server. This parameter needs to be specified when you want to import the SM2 digital envelope from a remote TFTP server. Its value must be a string of 1 to 256 characters. The default value is “ .evp”. ssl sm2 import enccertificate [cert_index] [tftp_ip] [file_name] This command is used to import an SM2 encryption certificate for the current virtual site. The administrator can import three certificates at most. The imported certificate can be activated by the command “ssl activate certificate [cert_index]”. The administrator can execute this command and copy-n-paste the PEM format certificate directly into the CLI. The system also supports importing PEM, DER and PFX formats as well as the certificates used by IIS 4, IIS 5 and Netscape iPlanet servers from a remote TFTP server. cert_index Optional. This parameter specifies the index to be associated with the imported SM2 encryption certificate. Its value must be 1, 2 or 3. 2000-2018 Array Networks, Inc. All Rights Reserved. 54Chapter 3 Virtual Site The default value is 1. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server. This parameter needs to be specified when you want to import the SM2 encryption certificate from a remote TFTP server. It value must be an IPv4 address. file_name Optional. This parameter specifies the file name of the SM2 encryption certificate on the remote TFTP server. This parameter needs to be specified when you want to import the SM2 encryption certificate from a remote TFTP server. Its value must be a string of 1 to 256 characters. The default value is “ .crt”. no ssl sm2 enccertificate [cert_index] This command is used to delete an imported SM2 encryption certificate. The corresponding SM2 encryption key pair will also be deleted. ssl sm2 import signkey [key_index] [tftp_ip] [file_name] This command is used to import an SM2 signature key for the current virtual site. The administrator can import three private keys at most. The administrator can execute this command and copy-n-paste the private key directly into the CLI. The system also supports importing private keys from a remote TFTP server. key_index Optional. This parameter specifies the index to be associated with the imported SM2 signature key. Its value must be 1, 2 or 3. The default value is 1. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server. This parameter needs to be specified when you want to import the SM2 signature key from a remote TFTP server. It value must be an IPv4 address. file_name Optional. This parameter specifies the file name of the SM2 signature key on the remote TFTP server. This parameter needs to be specified when you want to import the SM2 signature key from a remote TFTP server. Its value must be a string of 1 to 256 characters. The default value is “ .key”. ssl sm2 export signkey [key_index] This command is used to export an SM2 signature key. After this command is executed, the specified key will be displayed. 2000-2018 Array Networks, Inc. All Rights Reserved. 55Chapter 3 Virtual Site key_index Optional. This parameter specifies the index of the imported SM2 signature key to be exported. Its value must be 1, 2 or 3. If this parameter is not specified, the active key will be displayed. ssl sm2 import signcertificate [cert_index] [tftp_ip] [file_name] This command is used to import an SM2 signature certificate for the current virtual site. The administrator can import three certificates at most. The imported certificate can be activated by the command “ssl activate certificate [cert_index]”. The administrator can execute this command and copy-n-paste the PEM format certificate directly into the CLI. The system also supports importing PEM, DER and PFX formats as well as the certificates used by IIS 4, IIS 5 and Netscape iPlanet servers from a remote TFTP server. cert_index Optional. This parameter specifies the index to be associated with the imported SM2 signature certificate. Its value must be 1, 2 or 3. The default value is 1. tftp_ip Optional. This parameter specifies the IP address of the remote TFTP server. This parameter needs to be specified when you want to import the SM2 signature certificate from a remote TFTP server. It value must be an IPv4 address. file_name Optional. This parameter specifies the file name of the SM2 signature certificate on the remote TFTP server. This parameter needs to be specified when you want to import the SM2 signature certificate from a remote TFTP server. Its value must be a string of 1 to 256 characters. The default value is “ .crt”. no ssl sm2 signcertificate [cert_index] This command is used to delete an imported SM2 signature certificate. The corresponding SM2 signature key pair will also be deleted. 2000-2018 Array Networks, Inc. All Rights Reserved. 56Chapter 4 AAA Chapter 4 AAA The AAA module provides user authentication, authorization and accounting functions. The commands in this chapter illustrate how to deploy this module. General Settings aaa {on|off} This command is used to enable or disable the AAA function for the virtual site. When this function is enabled, users will have to log in before gaining access to internal resources; when this function is disabled, users will automatically pass authentication and obtain authorized resources according to their assigned roles. Note that any roles depending on “Group Name” conditions will no longer work. Roles depending on other conditions still work as before such as “Username” (all users will be assigned the same “guest” username), AAA method, Source IP, and Login Time. By default, this function is enabled. show aaa configure This command is used to display the AAA configurations of the virtual site. clear aaa configure This command is used to clear the AAA configurations of the virtual site.  AAA Lockout Note:  If AAA lockout and LocalDB lockout are both configured, only the configurations of AAA lockout will take effect.  The AAA lockout function cannot take effect for the certificate authentication.  The configurations of AAA lockout cannot be synchronized to the peer HA units.  For the two-step SMS authentication, the AAA lockout function takes effect only for the static authentication, such as LocalDB and LDAP, and cannot take effect for the SMS verification code authentication.  ForAAA servers with multiple AAA methods configured, the AAA lockout function takes effect for all AAA methods in the rank list.  With the system reboot, the recorded number of login failures of all AAA accounts will be cleared. aaa lockout auto loginfailure [failure_times] [duration] 2000-2018 Array Networks, Inc. All Rights Reserved. 57Chapter 4 AAA This command is used to enable automatic login-failure lockout for all AAA accounts. A AAA account will be locked out after the number of login failures using this account reaches the specified value of the parameter “failure_times”. By default, this function is disabled. failure_times Optional. This parameter specifies the number of login failures for locking out AAA accounts. Its value must be an integer ranging from 1 to 65,535. The default value is 10. duration Optional. This parameter specifies the duration of the lockout in seconds. Its value must be an integer ranging from 0 to 4,294,967,295. The default value is 0, indicating that the AAA account will remain locked out until being manually unlocked by using the command “aaa lockout unlock”. no aaa lockout auto loginfailure This command is used to disable automatic login-failure lockout for all AAA accounts. show aaa lockout auto loginfailure This command is used to display the configuration of automatic login-failure lockout for all AAA accounts. aaa lockout manual [duration] This command is used to manually lock out a specified AAA account for a specific duration. account_name This parameter specifies the name of the AAA account to be locked out. duration Optional. This parameter specifies the duration of the lockout in seconds. Its value must be an integer ranging from 0 to 4,294,967,295. The default value is 0, indicating that the account will be locked out until being manually unlocked by using the command “aaa lockout unlock [account_name]”. aaa lockout list [lockout_type] [account_name] [start] [count] This command is used to display the currently locked AAA accounts. lockout_type Optional. This parameter specifies the type of the locked AAA accounts. Its value must be “auto”, “manual” or “all”. The default value is “all”, indicating that all types of locked AAA accounts will be displayed. account_name Optional. This parameter specifies the name of the locked AAA account. Its value must be a case-sensitive string of 1 to 64 2000-2018 Array Networks, Inc. All Rights Reserved. 58Chapter 4 AAA characters.  If the parameter is specified, the specified locked AAA account will be displayed.  If the parameter is not specified, all locked AAA accounts will be displayed. The default value is empty. start Optional. This parameter specifies the start of locked AAA accounts from which to be displayed. Its value must be an integer ranging from 1 to 4,294,967,295 and the default value is 1. count Optional. This parameter specifies the number of locked AAA accounts to be displayed. Its value must be an integer ranging from 1 to 4,294,967,295. The default value is 0, indicating all locked AAA accounts will be displayed. aaa lockout unlock [account_name] This command is used to unlock a previously locked AAA account. account_name Optional. This parameter specifies the name of the AAA account to be unlocked. The default value is empty, indicating all locked AAA accounts will be unlocked. show aaa lockout count This command is used to display the statistics of locked AAA accounts. Server aaa server name [description] This command is used to define a AAA server of a particular type. type This parameter specifies the type of the AAA server. Its value must only be:  localdb  ldap  radius  certificate 2000-2018 Array Networks, Inc. All Rights Reserved. 59Chapter 4 AAA  sms  smx  http server_name This parameter specifies the name of the AAA server, which must be unique among all servers in the same virtual site. Its value must be a string of 1 to 32 characters. For LocalDB, the server name must be the same as the virtual site name. In addition, only one LocalDB server can be defined per virtual site. For SMX, the characters for the server name must only contain 0-9, a-z, A-Z, and characters “_” and “-”. description Optional. This parameter specifies the server description. Its value must be a string of 1 to 127 characters. If it is not specified, the default description will be the value of “server_name”. Note: Please ensure that the SSL renegotiation feature has been enabled both globally and for the virtual site under the following conditions:  Multiple AAA methods are configured and one of them uses the Certificate authentication (no matter the AAA method includes the Certificate authentication only or is multi-factor authentication including Certificate authentication)  The AAA rank function is disabled. no aaa server name This command is used to delete a specified AAA server. show aaa server name This command is used to display all the configured AAA servers. LocalDB  LocalDB Server aaa server localdb usernamecaseinsensitive This command is used to set the username as case-insensitive during the LocalDB authentication. Note: Please delete LocalDB accounts with usernames different only in case sensitivity before this command is configured. 2000-2018 Array Networks, Inc. All Rights Reserved. 60Chapter 4 AAA no aaa server localdb usernamecaseinsensitive This command is used to set the username as case-sensitive during the LocalDB authentication. aaa server localdb defaultgroup This command is used to define the default group assigned to authenticated users who do not belong to any other LocalDB group. default_group This parameter specifies the name of the default LocalDB group. Its value must be a string of 1 to 80 characters. no aaa server localdb defaultgroup This command is used to delete the default LocalDB group configured for authenticated users who do not belong to any other LocalDB group. show aaa server localdb defaultgroup This command is used to display the default LocalDB group configured for authenticated users who do not belong to any other LocalDB group. aaa server localdb authmode [mode] This command is used to set the mode of the LocalDB authentication. If this command is not configured, the LocalDB server uses only the static password for authentication. mode Optional. This parameter specifies the mode of the LocalDB authentication. Its value must be:  0: indicates that users only need to input the static password to log into the virtual site.  1: indicates that users only need to input the dynamic password (generated by the MotionProOTP application installed on the mobile phone) to log into the virtual site. For example, if the dynamic code is “768950”, users should input “768950” to log into the virtual site.  2: indicates that users need to input both the static password and dynamic password to log into the virtual site. For example, if the static password is “a” and the dynamic code is “768950”, users should input “a768950” to log into the virtual site. The default value is 0. show aaa server localdb authmode This command is used to display the mode of the LocalDB authentication. aaa server localdb dynamiccode rebind {enable|disable} 2000-2018 Array Networks, Inc. All Rights Reserved. 61Chapter 4 AAA This command is used to enable or disable the dynamic code rebinding for LocalDB accounts. With this function enabled, after logging into the MotionProOTP application in one mobile client, the user can also log into the MotionProOTP application in another mobile client with the same LocalDB account. The old registered credential of the user will be replaced by the new registered credential. By default, this function is disabled.  LocalDB Account localdb account [phone] [mail] [nfs_group] [nfs_account] [custom_info1] [custom_info2] [custom_info3] [custom_info4] [custom_info5] This command is used to create a new LocalDB account or update the existing LocalDB account. If the administrator wants to use LocalDB authentication or the Site2Site VPN function, this command must be configured. For the Site2Site VPN function, a LocalDB account should be configured for each spoke to log into the virtual site. account_name This parameter specifies the name of the LocalDB account to be created or updated. Its value must be a case-sensitive string of 1 to 64 characters. password This parameter specifies the password of the LocalDB account. Its value must be a case-sensitive string of 1 to 32 characters enclosed by double quotes. Only 0-9, a-z, A-Z, the space character and some special printable ASCII characters such as ! @ # $ % ^ & * ( ) _ - ~ = { } [ ] | \ / ? : ; ’ ` < > , . are allowed. phone Optional. This parameter specifies the telephone number of the LocalDB account. Its value must be a string of 1 to 32 characters enclosed by double quotes. Only numbers, spaces, “+” and “-” are allowed. The default value is empty. mail Optional. This parameter specifies the mail address of the LocalDB account in the format of “abc@xyz.com”. Its value must be a string of 1 to 128 characters enclosed by double quotes. The default value is empty. nfs_group Optional. This parameter specifies the NFS (Network File System) group ID of the LocalDB account. Its value must be an integer ranging from 0 to 65,535. The default value is 0. nfs_account Optional. This parameter specifies the NFS (Network File System) account of the LocalDB account. Its value must be an integer ranging from 0 to 65,535. The default value is 0. 2000-2018 Array Networks, Inc. All Rights Reserved. 62Chapter 4 AAA custom_info1 Optional. This parameter specifies the customized user information of the LocalDB account. Its value must be a string of 1 to 256 characters. The default value is empty. custom_info2 Optional. This parameter specifies the customized user information of the LocalDB account. Its value must be a string of 1 to 256 characters. The default value is empty. custom_info3 Optional. This parameter specifies the customized user information of the LocalDB account. Its value must be a string of 1 to 256 characters. The default value is empty. custom_info4 Optional. This parameter specifies the customized user information of the LocalDB account. Its value must be a string of 1 to 256 characters. The default value is empty. custom_info5 Optional. This parameter specifies the customized user information of the LocalDB account. Its value must be a string of 1 to 256 characters. The default value is empty. no localdb account This command is used to delete an existing LocalDB account. show localdb account [account_name] [group_name] [start] [count] [column] [index] This command is used to display the specified LocalDB account. account_name Optional. This parameter specifies a string to match the existing LocalDB accounts. Its value must be a case-sensitive string of 1 to 64 characters.  If the parameter is specified, LocalDB accounts whose names including this string will be displayed.  If the parameter is not specified, all LocalDB accounts will be displayed. The default value is empty. group_name Optional. This parameter specifies the name of the LocalDB group to which the LocalDB accounts to be displayed belongs to.  If this parameter is specified, only LocalDB accounts belong to the LocalDB group will be displayed. 2000-2018 Array Networks, Inc. All Rights Reserved. 63Chapter 4 AAA  If this parameter is not specified, the displayed LocalDB accounts will not be filtered by the LocalDB group. The default value is empty. start Optional. This parameter specifies the start of LocalDB accounts from which to be displayed. Its value must be an integer ranging from 1 to 4,294,967,295 and the default value is 1. count Optional. This parameter specifies the number of LocalDB accounts to be displayed. Its value must be an integer ranging from 1 to 4,294,967,295. The default value is 0, indicating all LocalDB accounts will be displayed. column Optional. This parameter specifies the columns of a LocalDB account entry to be displayed. This parameter supports the following columns that must be represented by the letters in the brackets in the parameter value: user_name(U), telephone(T), e-mail(E), nfs_info(N), coutom_info1-5(C), assigned_group(G), force_passwd_change(F), lockout_manual(M), lockout_manual_expires_time(L), passwd_expire_time(P), ip(I), netmask(K), and user_passwd(W). The parameter value is case-sensitive and can support multiple columns. The default value is “UTENC”. index Optional. This parameter specifies how to sort the displayed LocalDB accounts in the output. This parameter supports sorting LocalDB accounts by: user_name (alphabetical or U), create_time(time), telephone(T), e-mail(E), coutom_info1-5(coutom_info1-5), lockout_manual_expires_time(L), passwd_expire_time(P), ip(I), or netmask(K). This parameter value is case-insensitive and the default value is “alphabetical”. clear localdb account This command is used to delete all existing LocalDB accounts. show statistics localdb account [account_name] [group_name] This command is used to display the LocalDB account statistics. account_name Optional. This parameter specifies a string to match the existing LocalDB accounts. Its value must be a case-sensitive string of 1 to 64 characters. 2000-2018 Array Networks, Inc. All Rights Reserved. 64Chapter 4 AAA  If this parameter is specified, LocalDB accounts statistics whose account names including this string will be displayed.  If the parameter is not specified, the statistics of all LocalDB accounts will be displayed. The default value is empty. group_name Optional. This parameter specifies the name of the LocalDB group to which the LocalDB accounts to be displayed belongs to.  If this parameter is specified, only LocalDB account statistics belongs to the LocalDB group will be displayed.  If this parameter is not specified, the displayed LocalDB account statistics will not be filtered by the LocalDB group. The default value is empty. localdb update accountname This command is used to change the name of the specified LocalDB account. account_name This parameter specifies the original LocalDB account name. new_account_name This parameter specifies the new account name for the LocalDB account. Its value must be a string of 1 to 64 characters. localdb update password This command is used to change the password of the specified LocalDB account. If the command “localdb passwdqc oldpasswd” is configured, the new password must not be the same as the old password. account_name This parameter specifies the name of the LocalDB account. new_password This parameter specifies the new password of the LocalDB account. Its value must be a case-sensitive string of 1 to 32 characters enclosed by double quotes. Only 0-9, a-z, A-Z, the space character and some special printable ASCII characters such as ! @ # $ % ^ & * ( ) _ - + = { } [ ] | \ / ? : ; ’ < > , . are allowed. The string cannot contain any of the characters “ ~ `”.  LocalDB Group localdb group [nfs_group] This command is used to add a LocalDB group. 2000-2018 Array Networks, Inc. All Rights Reserved. 65Chapter 4 AAA group_name This parameter specifies the name of the LocalDB group. Its value must be a case-sensitive string of 1 to 64 characters. nfs_group Optional. This parameter specifies the name of the NFS file share group. Its value must be an integer ranging from 0 to 65,535. The default value is 0. no localdb group This command is used to delete a specified LocalDB group. show localdb group [group_name] [account_name] [start] [count] [column] [index] This command is used to display the specified LocalDB group. group_name Optional. This parameter specifies a string to match the existing LocalDB groups. Its value must be a case-sensitive string of 1 to 64 characters.  If this parameter is specified, the LocalDB groups whose names including the string will be displayed.  If this parameter is not specified, all LocalDB groups will be displayed. The default value is empty. account_name Optional. This parameter specifies the name of the LocalDB account.  If this parameter is specified, only LocalDB groups including the specified LocalDB accounts will be displayed.  If this parameter is not specified, the displayed LocalDB groups will not be filtered by the LocalDB account. The default value is empty. start Optional. This parameter specifies the start of LocalDB groups from which to be displayed. Its value must be an integer ranging from 1 to 4,294,967,295. The default value is 1. count Optional. This parameter specifies the number of LocalDB groups to be displayed. Its value must be an integer ranging from 1 to 4,294,967,295. The default value is 0, indicating all LocalDB accounts will be displayed. 2000-2018 Array Networks, Inc. All Rights Reserved. 66Chapter 4 AAA column Optional. This parameter specifies the columns of a LocalDB group entry to be displayed. This parameter supports the following columns that must be represented by the letters in the brackets in the parameter value: user_name(U), telephone(T), e-mail(E), nfs_info(N), coutom_info1-5(C), assigned_group(G), force_passwd_change(F), lockout_manual(M), lockout_manual_expires_time(L), passwd_expire_time(P), ip(I), netmask(K), and user_passwd(W). The parameter value is case-sensitive and can support multiple columns. The default value is “UTENC”. index Optional. This parameter specifies how to sort the displayed LocalDB groups in the output. This parameter supports sorting LocalDB groups by: user_name (alphabetical or U), create_time(time), telephone(T), e-mail(E), coutom_info1-5(coutom_info1-5), lockout_manual_expires_time(L), passwd_expire_time(P), ip(I) or netmask(K). This parameter value is case-insensitive and the default value is “alphabetical”. clear localdb group This command is used to delete all existing LocalDB groups. localdb update groupname This command is used to change the name of an existing LocalDB group. group_name This parameter specifies the original name of the LocalDB group. Its value must be a string of 1 to 64 characters. new_groupname This parameter specifies the new name of the LocalDB group. Its value must be a string of 1 to 64 characters. localdb member This command is used to associate an existing LocalDB account with an existing LocalDB group. One LocalDB account can be associated with 20 LocalDB groups. group_name This parameter specifies the name of the LocalDB group. Its value must be a string of 1 to 64 characters. account_name This parameter specifies the name of the LocalDB account. Its value must be a string of 1 to 64 characters. no localdb member 2000-2018 Array Networks, Inc. All Rights Reserved. 67Chapter 4 AAA This command is used to disassociate an existing LocalDB account from an existing LocalDB group. show localdb member account [account_name] This command is used to display the associations of LocalDB groups with the specified LocalDB account. If the “account_name” parameter is not specified, all associations between LocalDB groups and accounts in the LocalDB will be displayed. show localdb member group [group_name] This command is used to display the associations of LocalDB accounts with the specified LocalDB group. If the “group_name” parameter is not specified, all associations between LocalDB groups and accounts in the LocalDB will be displayed. clear localdb member [group_name] This command is used to disassociate all LocalDB accounts from the specified LocalDB group. If the “group_name” parameter is not specified, all LocalDB accounts are disassociated with all LocalDB groups. show statistics localdb group [group_name] [account_name] This command is used to display the LocalDB group statistics. group_name Optional. This parameter specifies a string to match the existing LocalDB groups. Its value must be a case-sensitive string of 1 to 64 characters.  If this parameter is specified, LocalDB group statistics whose group names including the string will be displayed.  If this parameter is not specified, the statistics of all LocalDB groups will be displayed. The default value is empty. account_name Optional. This parameter specifies the name of the LocalDB account.  If this parameter is specified, only LocalDB group statistics including the specified LocalDB accounts will be displayed.  If this parameter is not specified, the displayed LocalDB group statistics will not be filtered by the LocalDB account. The default value is empty.  LocalDB Account Password Settings localdb passwdqc length [length] 2000-2018 Array Networks, Inc. All Rights Reserved. 68Chapter 4 AAA This command is used to enable the password checking policy requiring a minimum password length. By default, this policy is disabled. After this command is configured, to update the password of the existing LocalDB account or create a new account, the length of the new password must be greater than or equal to the value specified by the parameter “length”. length Optional. This parameter specifies the minimum length of the LocalDB account password. Its value must be an integer ranging from1 to 32. The default value is 8. no localdb passwdqc length This command is used to disable the password checking policy requiring a minimum password length. localdb passwdqc upperchar This command is used to enable the password checking policy requiring at least one upper-case character in the LocalDB account password. By default, this policy is disabled. After this command is configured, to update the password of the existing LocalDB account or create a new account, the new password must include at least one upper-case letter. no localdb passwdqc upperchar This command is used to disable the password checking policy requiring at least one upper-case letter in the LocalDB account password. localdb passwdqc lowerchar This command is used to enable the password checking policy requiring at least one lower-case character in the LocalDB account password. By default, this policy is disabled. After this command is configured, to update the password of the existing LocalDB account or create a new account, the new password must include at least one lower-case character. no localdb passwdqc lowerchar This command is used to disable the password checking policy requiring at least one lower-case letter in the LocalDB account password. localdb passwdqc numchar This command is used to enable the password checking policy requiring at least one numeric character in the LocalDB account password. By default, this policy is disabled. After this command is configured, to update the password of the existing LocalDB account or create a new account, the new password must include at least one numeric character. no localdb passwdqc numchar This command is used to disable the password checking policy requiring at least one numeric character in the LocalDB account password. localdb passwdqc nonalphanum 2000-2018 Array Networks, Inc. All Rights Reserved. 69Chapter 4 AAA This command is used to enable the password checking policy requiring at least one non-alphanumeric character in the LocalDB account password. By default, this policy is disabled. After this command is configured, to update the password of the existing LocalDB account or create a new account, the new password must include at least one non-alphanumeric character. no localdb passwdqc nonalphanum This command is used to disable the password checking policy requiring at least one non-alphanumeric character in the LocalDB account password. localdb passwdqc username This command is used to enable the password checking policy requiring that the username cannot be a subset of the password. By default, this policy is disabled. After this command is configured, to update the password of the existing LocalDB account or create a new account, the new password cannot include the account name. no localdb passwdqc username This command is used to disable the password checking policy requiring that the password cannot be a subset of the username. localdb passwdqc oldpasswd This command is used to enable the password checking policy requiring that the new password cannot be the same as the old password. By default, this policy is disabled. After this command is configured, to update the password of the existing LocalDB account or create a new account, the new password cannot be the same as the old password. no localdb passwdqc oldpasswd This command is used to disable the password checking policy requiring that the new LocalDB account password cannot be the same as the old password. localdb passwdqc minunique [unique_char] This command is used to enable the password checking policy requiring that a minimum number of unique characters included in the LocalDB account password. By default, this policy is disabled. After this command is configured, to update the password of the existing LocalDB account or create a new account, the new password must include a specified number (by the parameter “unique_char”) of unique characters. unique_char Optional. This parameter specifies the minimum number of unique characters. Its value must be a number between 1 and 32. The default value is 5. no localdb passwdqc minunique This command is used to disable the password checking policy requiring that a minimum number of unique characters included in the LocalDB account password. 2000-2018 Array Networks, Inc. All Rights Reserved. 70Chapter 4 AAA localdb passwdqc all This command is used to enable all the above password checking policies. no localdb passwdqc all This command is used to disable all the above password checking policies. show localdb passwdqc This command is used to display all the configured password checking policies. clear localdb passwdqc This command is used to clear all password checking policies. localdb passwdexpire age [account_name] [duration] [mode] This command is used to set the password expiration age for a specified LocalDB account. account_name Optional. This parameter specifies the name of an existing LocalDB account. The default value is empty, indicating the password expiration age is set for all LocalDB accounts. duration Optional. This parameter specifies the expiration age (counted from the last password change) of the LocalDB account password in seconds. Its value must be an integer ranging from 1 to 2,147,483,647. The default value is 99,999,999. mode Optional. This parameter specifies the time to execute this command. The parameter value must be empty or “repeat”. If this parameter is empty, the LocalDB user will be asked to change the password once and only when the password expiration age has elapsed since the user changes the password last time. When this parameter is set to “repeat”, the LocalDB user will be asked to change the password every time the password expiration age has elapsed after changing the password. The default value is empty. no localdb passwdexpire age This command is used to delete the password expiration age configuration for a specified LocalDB account. show localdb passwdexpire age [account_name] [mode] This command is used to display the password expiration age configuration for a specified LocalDB account. If the “account_name” parameter is not specified, the password expiration age configuration for all LocalDB accounts will be displayed. clear localdb passwdexpire age 2000-2018 Array Networks, Inc. All Rights Reserved. 71Chapter 4 AAA This command is used to delete the password expiration age configuration for all LocalDB accounts. localdb passwdexpire nextlogin [account_name] This command is used to enable forcible password expiration upon next login for the specified LocalDB account. The LocalDB user will be asked to change the password on next login. By default, this function is disabled. account_name Optional. This parameter specifies the name of an existing LocalDB account. The default value is empty, indicating the forcible password expiration upon next login for all LocalDB accounts will be enabled. no localdb passwdexpire nextlogin This command is used to disable forcible password expiration upon next login for the specified LocalDB account. show localdb passwdexpire nextlogin [account_name] This command is used to display the configuration of forcible password expiration upon next login for the specified LocalDB account. If the “account_name” parameter is not specified, the password configuration of expiration upon next login for all LocalDB accounts will be displayed. clear localdb passwdexpire nextlogin This command is used to delete the configuration of password expiration upon next login for all LocalDB accounts.  LocalDB Lockout localdb lockout auto idletime [idle_time] [duration] This command is used to enable auto idle lockout for all LocalDB accounts. LocalDB accounts will be locked out when the idle time is up. By default, this function is disabled. idle_time Optional. This parameter specifies the idle time after which the LocalDB account will be locked out, in seconds. Its value must be integer ranging from 1 to 4,294,967,295. The default value is 99,999,999. duration Optional. This parameter specifies the duration of the lockout, in seconds. Its value must be an integer ranging from 0 to 4,294,967,295. If its value is set to “0”, then the LocalDB account will remain locked out until being manually unlocked by using the command “localdb lockout unlock [account_name]”. The default value is 0. 2000-2018 Array Networks, Inc. All Rights Reserved. 72Chapter 4 AAA no localdb lockout auto idletime This command is used to disable the auto idle lockout for all LocalDB accounts. show localdb lockout auto idletime This command is used to display the configuration of the auto idle lockout for all LocalDB accounts. localdb lockout auto loginfailure [failure_times] [duration] This command is used to enable auto login failure lockout for all LocalDB accounts. LocalDB accounts will be locked out after reaching the number of login failures specified by the parameter “failure_times”. By default, this function is disabled. failure_times Optional. This parameter specifies the number of login failures after which the LocalDB account is locked out. Its value must be an integer ranging from 1 to 65,535. The default value is 10. duration Optional. This parameter specifies the duration of the lockout in seconds. Its value must be an integer ranging from 0 to 4,294,967,295. The default value is 0, indicating that the LocalDB account will remain locked out until being manually unlocked by using the command “localdb lockout unlock [account_name]”. no localdb lockout auto loginfailure This command is used to disable auto login failure lockout for all LocalDB accounts. show localdb lockout auto loginfailure This command is used to display the configuration of auto login failure lockout for all LocalDB accounts. localdb lockout manual [account_name] [duration] This command is used to manually lock out a specified LocalDB account for a specific duration. After this command is configured, the specified LocalDB account will be locked out for a specific duration. account_name Optional. This parameter specifies the name of the account to be locked out. The default value is empty, indicating all LocalDB accounts will be locked out by default. duration Optional. This parameter specifies the duration in seconds for which the account will be locked out. Its value must be an integer ranging from 0 to 4,294,967,295. If its value is set to “0”, the LocalDB account will be locked out until being manually unlocked by using the command “localdb lockout unlock [account_name]”. 2000-2018 Array Networks, Inc. All Rights Reserved. 73Chapter 4 AAA The default value is 0. show localdb lockout manual [account_name] This command is used to display the lockout duration of a specified LocalDB account. If the “account_name” parameter is not specified, the lockout duration of all LocalDB accounts will be displayed. localdb lockout list [type] [username] [start] [count] This command is used to display the currently locked LocalDB accounts. type Optional. This parameter specifies the lockout type of the locked LocalDB accounts to be displayed. Its value must only be:  “loginfailure”: indicates that the LocalDB accounts locked out due to login failures will be displayed.  “idletime”: indicates that the LocalDB accounts locked out due to idle timeout will be displayed.  “manual”: indicates that the LocalDB accounts locked out manually by the administrator will be displayed.  “all”: indicates that the LocalDB accounts of all the preceding three types will be displayed. The default value is all. username Optional. This parameter specifies a string to match the LocalDB account. Its value must be a string of 1 to 64 characters. All locked LocalDB accounts whose names including the string will be displayed. If this parameter is not specified, locked accounts will not be filtered by username. start Optional. This parameter specifies the start of locked LocalDB accounts to be displayed. Its value must be between 1 and 4,294,967,295. The default value is 1. count Optional. This parameter specifies the number of locked LocalDB accounts to be displayed. Its value must be an integer ranging from 0 to 4,294,967,295. The default value is 0, indicating all locked LocalDB accounts matching the other parameter settings will be displayed. localdb lockout unlock [account_name] This command is used to unlock a previously locked LocalDB account. 2000-2018 Array Networks, Inc. All Rights Reserved. 74Chapter 4 AAA account_name Optional. This parameter specifies the name of the LocalDB account to be unlocked. The default value is empty, indicating all locked LocalDB accounts will be unlocked. show statistics localdb lockout [account_name] This command is used to display the lockout statistics of a specified LocalDB account. account_name Optional. This parameter specifies a string to match the account. All LocalDB accounts including the string will be matched. If the parameter “account_name” is not specified, the lockout statistics for all LocalDB accounts will be displayed.  LocalDB Backup and Restoration localdb backup This command is used to back up the virtual site’s LocalDB. A maximum of 20 LocalDB backup files can be configured in the system. If 20 LocalDB backup files already exist, to create new LocalDB backup files, the old ones must be deleted. backup_name This parameter specifies the name of the LocalDB backup. Its value must be a string of 1 to 32 characters. Note: For the MotionPro-type virtual site, this command will back up all the data in the LocalDB including the MDM data but excluding the MDM CLI configurations. no localdb backup This command is used to delete the specified LocalDB backup file. show localdb backup This command is used to display the LocalDB backup files. clear localdb backup This command is used to delete all LocalDB backup files. localdb autobackup [time] [dayofweek] This command is used to configure the LocalDB auto-backup settings. If this command is not configured, the default setting “localdb autobackup 3 0:00 0” will be used, which means to automatically back up the LocalDB daily at 0:00 and at most three auto-backup files can be kept. If three auto-backup files already exist, new auto-backup files will overwrite the old ones. count This parameter specifies the number of auto-backup files to be kept in the system. Its value must be an integer ranging from 0 to 5. If the parameter is set to “0”, auto-backup will be turned off. When 2000-2018 Array Networks, Inc. All Rights Reserved. 75Chapter 4 AAA the count is exceeded, the oldest backup file would be overwritten. time Optional. This parameter specifies the time for the auto-backup in “HH:MM” (24-hour) format, for example, 6:23, 05:05, 23:59. The default value is 0:00. dayofweek Optional. This parameter specifies the day of the week for the auto-backup. Its value must be an integer ranging from 0 to 7. The default value is 0, indicating the LocalDB database will be backed up on a daily basis. If the parameter is set to “1” to “7”, the LocalDB database will be backed up once a week, respectively from Monday to Sunday. show localdb autobackup This command is used to display the settings of the existing LocalDB auto-backup. localdb restore This command is used to restore LocalDB from the specified LocalDB backup. backup_name This parameter specifies the name of the LocalDB backup database. Its value must be a string of 1 to 32 characters.  LocalDB Export and Import localdb export {account|group|member} This command is used to export accounts, groups or member relations from the LocalDB database into a configuration file on the system. file_name This parameter specifies the name of the file on the system. Its value must be a string of 1 to 32 characters. account|group|member This parameter specifies the type of information to be exported. Its value must only be “account”, “group” or “member”.  account: indicates that the account information, such as the username, password, creation time and so on, will be exported.  group: indicates that the group information, such as the group name, expiration time, creation time and so on, will be exported.  member: indicates that only the account and group name will be exported. 2000-2018 Array Networks, Inc. All Rights Reserved. 76Chapter 4 AAA Note: The files exported from LocalDB directly are in the UTF-8 encoding format. To read or edit the exported file, make sure that your file viewer or editor supports UTF-8 encoding. no localdb export {account|group|member} This command is used to delete the configuration file exported from the LocalDB database. show localdb export {account|group|member} This command is used to display the configuration of accounts, groups or member relations exported from the LocalDB database. clear localdb export {account|group|member} This command is used to delete all configurations of accounts, groups or member relations exported from the LocalDB database. localdb netexport scp {account|group|member} This command is used to export a file containing accounts, groups or member relations to an SCP server. account|group|member This parameter specifies the type of information to be exported. Its value must only be “account”, “group” or “member”.  account: indicates that the account information, such as the username, password, creation time and so on, will be exported.  group: indicates that the group information, such as the group name, the expiration time, creation time and so on, will be exported.  member: indicates that only the account and group name will be exported. server_name This parameter specifies the name of the server to which data will be exported. Its value must be a string of 1 to 128 characters. user_name This parameter specifies the name of the remote user on the SCP server. Its value must be a string of 1 to 64 characters. file_path This parameter specifies the path, which must include the file name, to export the file on the SCP server. Its value must be a string of 1 to 256 characters. 2000-2018 Array Networks, Inc. All Rights Reserved. 77Chapter 4 AAA Note: The files exported via SCP are in the UTF-8 encoding format. To read or edit the exported file, make sure that your file viewer or editor supports UTF-8 encoding. localdb netexport tftp {account|group|member} This command is used to export a file containing accounts, groups or member relations to a TFTP server. account|group|member This parameter specifies the type of information to be exported. Its value must only be “account”, “group” or “member”.  account: indicates that the account information, such as the username, password, creation time and so on, will be exported.  group: indicates that the group information, such as the group name, the expiration time, creation time and so on, will be exported.  member: indicates that only the account and group name will be exported. ip This parameter specifies the IP address of the TFTP server. file_name This parameter specifies the name of the file to export data on the TFTP server. Its value must be a string of 1 to 256 characters. Note: The files exported via TFTP are in the UTF-8 encoding format. To read or edit the exported file, make sure that your file viewer or editor supports UTF-8 encoding. localdb import {account|group|member} [overwrite|ignore] This command is used to import a file containing accounts, groups or member relations into LocalDB from the system. file_name This parameter specifies the name of the file to be imported into LocalDB. Its value must be a string of 1 to 127 characters. account|group|member This parameter specifies the type of information to be imported. Its value must only be “account”, “group” or “member”.  account: indicates that the account information, such as the username, password, creation time and so on, will be imported.  group: indicates that the group information, such as the group name, expiration time, creation time and so on, will be imported.  member: indicates that only the account and group name will 2000-2018 Array Networks, Inc. All Rights Reserved. 78Chapter 4 AAA be imported. overwrite|ignore Optional. This parameter specifies how to handle the conflicted duplicate data. Its value must only be:  overwrite: The duplicate data will be merged with the existing data.  ignore: The duplicate data will not be imported. If this parameter is not specified, the administrator must execute this command based on the CLI prompt. Note: The files imported to LocalDB directly must be in the UTF-8 encoding format. Otherwise, the importing might fail. localdb netimport http {account|group|member} {overwrite|ignore} This command is used to import a file containing accounts, groups or member relations from an HTTP resource. account|group|member This parameter specifies the type of information to be imported. Its value must only be “account”, “group” or “member”.  account: indicates that the account information, such as the username, password, creation time and so on, will be exported.  group: indicates that the group information, such as the group name, expiration time, creation time and so on, will be exported.  member: indicates that only the account and group name will be exported. url This parameter specifies the URL of the HTTP resource. Its value must be a string of 1 to 64 characters. overwrite|ignore This parameter specifies how to handle the conflicted duplicate data. Its value must be “overwrite” and “ignore”.  overwrite: The duplicate data will be merged with the existing data.  ignore: The duplicate data will not be imported. Note: The files imported via SCP must be in the UTF-8 encoding format. Otherwise, the importing might fail. 2000-2018 Array Networks, Inc. All Rights Reserved. 79Chapter 4 AAA localdb netimport scp {account|group|member} {overwrite|ignore} This command is used to import a file containing accounts, groups or member relations from an SCP server. account|group|member This parameter specifies the type of information to be imported. Its value must only be “account”, “group” or “member”.  account: indicates that the account information, such as the username, password, creation time and so on, will be imported.  group: indicates that the group information, such as the group name, expiration time, creation time and so on, will be imported.  member: indicates that only the account and group name will be imported. server_name This parameter specifies the name of the server from which data will be imported. Its value must be a string of 1 to 127 characters. user_name This parameter specifies the name of the remote user on the SCP server. Its value must be a string of 1 to 64 characters. file_path This parameter specifies the path, which must include the file name, to import the file from the SCP server. Its value must be a string of 1 to 256 characters. overwrite|ignore This parameter specifies how to handle the conflicted duplicate data. Its value must be “overwrite” and “ignore”.  overwrite: The duplicate data will be merged with the existing data.  ignore: The duplicate data will not be imported. Note: The files imported via SCP must be in the UTF-8 encoding format. Otherwise, the importing might fail. localdb netimport tftp {account|group|member} {overwrite|ignore} This command is used to import a file containing accounts, groups or member relations from a TFTP server. account|group|member This parameter specifies the type of information to be imported. Its 2000-2018 Array Networks, Inc. All Rights Reserved. 80Chapter 4 AAA value must only be “account”, “group” or “member”.  account: indicates that the account information, such as the username, password, creation time and so on, will be imported.  group: indicates that the group information, such as the group name, expiration time, creation time and so on, will be imported.  member: indicates that only the account and group name will be imported. ip This parameter specifies the IP address of the TFTP server. file_name This parameter specifies the name of the file to import data from on the TFTP server. Its value must be a string of 1 to 256 characters. overwrite|ignore This parameter specifies how to handle conflict, e.g., duplicate data. Its value must be “overwrite” and “ignore”.  overwrite: The duplicate data will be merged with the existing data.  ignore: The duplicate data will not be imported. Note: The files imported via TFTP must be in the UTF-8 encoding format. Otherwise, the importing might fail.  LocalDB IP localdb ip account This command is used to set a fixed IP address for the specified LocalDB account. After the fixed IP address is set for the specified LocalDB account:  For users accessing the backend resources through the L3VPN tunnel, the system will assign the fixed IP address to the LocalDB account while ignoring the IP address assignment by the Netpool authorized to the LocaDB account.  For users accessing the backend resources through the Site2Site VPN tunnel, the system will assign the fixed IP address (tunnel IP) to the LocalDB account. account_name This parameter specifies the name of the LocalDB account. ip_address This parameter specifies the IP address assigned to the LocalDB account. Its value must be given in dotted decimal notation. netmask This parameter specifies the netmask of subnet to which the IP 2000-2018 Array Networks, Inc. All Rights Reserved. 81Chapter 4 AAA address belongs. Its value must be given in dotted decimal notation. no localdb ip account This command is used to delete the fixed IP address set for the specified LocalDB account. show localdb ip account This command is used to display the fixed IP address set for the specified LocalDB account.  LocalDB SSO localdb sso account [sso_domain] This command is used to configure an application login credential for the specified LocalDB account in the LocalDB server. account_name This parameter specifies the LocalDB account name. Its value must be a string of 1 to 64 characters. sso_account This parameter specifies the account name of the application login credential used for Application SSO. Its value must be a string of 1 to 64 characters. sso_passwd This parameter specifies the password of the application login credential used for Application SSO. Its value must be a string of 1 to 64 characters. Only 0-9, a-z, A-Z and printable ASCII characters are allowed. sso_domain Optional. This parameter specifies the domain or workgroup used for Application SSO. Its value must be a string of 1 to 256 characters. By default, this parameter is not specified. Note:  The portal login username must be the same as the LocalDB account username associated with the application login credential.  If the Application SSO function is enabled for DesktopDirect applications, the administrator needs to associate the DesktopDirect resources with the application login name used for Application SSO instead of the binding LocalDB account using the command “art desktop assign user” or “art application associate user”. no localdb sso account This command is used to delete the application login credential configured for the specified LocalDB account. 2000-2018 Array Networks, Inc. All Rights Reserved. 82Chapter 4 AAA show localdb sso account This command is used to display the application login credential configured for the specified LocalDB account.  LocalDB Status show localdb config This global command is used to display all LocalDB configurations for a particular virtual site. show localdb config This command is used to display all LocalDB configurations of the virtual site.  LocalDB Statistics show statistics aaa This command is used to display the AAA statistics of the virtual site. show statistics aaa [virtual_site] This global command is used to display the AAA statistics of the specified virtual site. If the parameter “virtual_site” is not specified, the AAA statistics of all virtual sites will be displayed. clear statistics aaa This command is used to delete the AAA statistics of the virtual site. clear statistics aaa [virtual_site] This global command is used to delete the AAA statistics of the specified virtual site. If the parameter “virtual_site” is not specified, the AAA statistics of all virtual sites will be deleted. LDAP aaa server ldap host [index] [tls_flag] This command is used to configure an LDAP host for the specified LDAP server. A maximum of three LDAP hosts can be configured for one LDAP server. ldap_server_name This parameter specifies the name of an existing LDAP server. Its value must be a string of 1 to 32 characters. ip This parameter specifies the IP address of the LDAP host. Its value must be an IPv4 address. port This parameter specifies the port of the LDAP host. Its value must be an integer ranging from 1 to 65,535. 2000-2018 Array Networks, Inc. All Rights Reserved. 83Chapter 4 AAA username This parameter specifies the username of the LDAP server administrator. Its value must be a string of 1 to 127 characters. password This parameter specifies the password of the LDAP server administrator. base_dn This parameter specifies the Distinguished Name (DN) of the LDAP entry at which to start the search for users. Its value must be a string of 1 to 900 characters. timeout This parameter specifies the timeout value of the search in seconds. Its value must be an integer ranging from 1 to 65,535. index Optional. This parameter specifies the host index. Its value must be 1, 2 or 3. The default value is 1. tls_flag Optional. This parameter specifies whether to access the LDAP server over the TLS protocol. Its value must be:  “tls”: indicates that the LDAP server is accessed over the TLS protocol.  empty: indicates the LDAP server is not accessed over the TLS protocol. The default value is empty. no aaa server ldap host This command is used to delete an LDAP host of the specified LDAP server. show aaa server ldap host This command is used to display the LDAP server host(s) configured for the specified LDAP server. aaa server ldap idletime [idle_time] This command is used to set the idle timeout value for the specified LDAP server. The connection to the LDAP server will be terminated when the connection is idle for the specified timeout value. ldap_server_name This parameter specifies the name of an existing LDAP server. idle_time Optional. This parameter specifies the idle timeout value in seconds. Its value must be an integer ranging from 60 to 3000. The default value is 600. 2000-2018 Array Networks, Inc. All Rights Reserved. 84Chapter 4 AAA no aaa server ldap idletime This command is used to delete the idle timeout setting of the specified LDAP server. show aaa server ldap idletime This command is used to display the idle timeout value configured for the specified LDAP server. aaa server ldap searchfilter This command is used to configure a search filter for the specified LDAP server. The search filter plays an important role in authenticating and authorizing users through LDAP. For the functions of the search filter in static and dynamic binding, please refer to the commands “aaa server ldap bind dynamic” and “aaa server ldap bind static”. ldap_server_name This parameter specifies the name of an existing LDAP server. filter_string This parameter specifies a filter string used to search for the LDAP entries. Its value must be a string of 1 to 80 characters enclosed by double quotes. The filter string consists of:  attribute: Common Name (cn), Distinguished Name (dn), User Id (uid), Organization Unit (ou) and so on.  comparison operator: “>”, “<” or “=”.  logical operator: “& (and),” “| (or)”, “! (not)”, “= (equal to)”, or “* (any)”. Please refer to the RFC for details of the LDAP filter string. The filter string can contain at most three tokens represented by “ ”, which is case-insensitive. For example, if the “filter_string” parameter is set to “cn= ”, the system will generate a search filter by replacing “ ” with an end user’s real username upon receiving authentication or authorization requests. Note: If this command is not configured for the specified LDAP server, AAA uses “uid= ” as the default search filter string. For example: Search an entry with cn being the real username: vs(config)aaa server ldap searchfilter ldap1 "cn= " Search an entry without cn being the real username: 2000-2018 Array Networks, Inc. All Rights Reserved. 85Chapter 4 AAA vs(config)aaa server ldap searchfilter ldap1 "(!(cn= ))" Search an entry with objectClass being Person and with sn being the real username or cn being a value containing the real username: vs(config)aaa server ldap searchfilter ldap1 "(&(objectClass=Person)(|(sn= )(cn= *)))" no aaa server ldap searchfilter This command is used to delete the search filter configured for the specified LDAP server. show aaa server ldap searchfilter This command is used to display the search filter configured for the specified LDAP server. aaa server ldap attribute group This command is used to specify the attribute used to obtain the external LDAP group of the user from the LDAP entry for the specified LDAP server. ldap_server_name This parameter specifies the name of an existing LDAP server. attribute This parameter specifies the name of the attribute used to obtain the external LDAP group of the user from the LDAP entry. Its value must be a string of 1 to 80 characters. no aaa server ldap attribute group This command is used to delete the configuration of the attribute used to obtain the external LDAP group from the LDAP entry for the specified LDAP server. show aaa server ldap attribute group This command is used to display the configuration of the attribute used to obtain the external LDAP group from the LDAP entry for the specified LDAP server. aaa server ldap attribute phonenumber This command is used to specify the attribute used to obtain the mobile phone number of the user from the LDAP entry for the specified LDAP server. ldap_server_name This parameter specifies the name of an existing LDAP server. attribute This parameter specifies the name of the attribute used to obtain the mobile phone number of the user from the LDAP entry. Its value must be a string of 1 to 80 characters. no aaa server ldap attribute phonenumber 2000-2018 Array Networks, Inc. All Rights Reserved. 86Chapter 4 AAA This command is used to delete the configuration of the attribute used to obtain the mobile phone number of the user from the LDAP entry for the specified LDAP server. show aaa server ldap attribute phonenumber This command is used to display the configuration of the attribute used to obtain the mobile phone number of the user from the LDAP entry for the specified LDAP server. aaa server ldap attribute defaultgroup This command is used to configure the default group assigned to authenticated users for whom no LDAP group is obtained for the specified LDAP server. ldap_server_name This parameter specifies an existing name of the LDAP server. group This parameter specifies the default group name for the user for whom no LDAP group is obtained. Its value must be a string of 1 to 80 characters. no aaa server ldap attribute defaultgroup This command is used to delete the configuration of the default group assigned to authenticated users for whom no LDAP group is obtained for the specified LDAP server. show aaa server ldap attribute defaultgroup This command is used to display the configuration of the default LDAP group assigned to authenticated users for whom no LDAP group is obtained for the specified LDAP server. aaa server ldap bind dynamic This command is used to enable the “dynamic” LDAP bind mode for the specified LDAP server. In this case, AAA will fetch the DN from the LDAP server first. After the “dynamic” LDAP bind mode is enabled, AAA sends a bind request containing the end user’s username and password to the LDAP server and then a search request containing the search filter string configured by the command “aaa server ldap searchfilter” to obtain the LDAP entry of the end user. Then AAA sends the DN obtained from the LDAP entry together with the password of the end user in another bind request to the LDAP server. After the end user passes the authentication, AAA reuses the obtained LDAP entry to authorize the end user. ldap_server_name This parameter specifies the name of an existing LDAP server. no aaa server ldap bind dynamic This command is used to disable the “dynamic” LDAP bind mode for the specified LDAP server. aaa server ldap bind static This command is used to enable the “static” LDAP bind mode for the specified LDAP server. In this case, the system will construct the user’s DN by concatenating the strings 2000-2018 Array Networks, Inc. All Rights Reserved. 87Chapter 4 AAA “ ”. is the username used to log into the virtual site. “ ” and “ ”must be the same for all users using the same virtual site. After the “static” LDAP bind mode is enabled, AAA sends the DN ( ) together with the password of the end user in a bind request to the LDAP server. After the end user passes the authentication, AAA sends a search request containing the search filter string configured by the command “aaa server ldap searchfilter” to obtain the LDAP entry of this end user. Then, it authorizes the end user based on the obtained LDAP entry. ldap_server_name This parameter specifies the name of an existing LDAP server. dn_prefix This parameter specifies the DN prefix extracted from the LDAP server. Its value must be a string of 1 to 80 characters. dn_suffix This parameter specifies the DN suffix extracted from the LDAP server. Its value must be a string of 1 to 80 characters. For example: vs(config)aaa server ldap bind static "AD" "cn=" ",ou=array,dc=spxad,dc=cn" no aaa server ldap bind static This command is used to disable the “static” LDAP bind mode for the specified LDAP server. show aaa server ldap bind This command is used to display the configuration of the LDAP bind mode for the specified LDAP server. Note: The “static” and “dynamic” LDAP bind function cannot be enabled at the same time. aaa server ldap pwdexpirewarning This command is used to configure password expiry warning, that is, configure whether and when to display a password expiry warning message on the welcome page for the specified LDAP server. After this command is configured, if the remaining valid time of the LDAP user’s password is equal to or less than the value of the “password_expiry_warning” parameter at user login, a password expiry warning message will be displayed on the welcome page. If this command is not configured, no password expiry warning message will be displayed on the welcome page. ldap_server_name This parameter specifies the name of the existing LDAP server. 2000-2018 Array Networks, Inc. All Rights Reserved. 88Chapter 4 AAA password_expiry_warning This parameter specifies the time in seconds that a warning message will be displayed on the welcome page preceding to the user’s LDAP password expiry. Its value must be an integer ranging from 1 to 1,209,600. Note: Before using the LDAP password change function, please make sure that:  On related LDAP servers, the lifetime of LDAP passwords has been configured.  For the OpenLDAP server, the external default policy has been configured.  For the Windows Active Directory (AD) server, its system time must be the same as the system time of the AG appliance.  On the AG appliance, the related Windows AD servers have been configured to use port 636 and to be accessed using the TLS protocol. no aaa server ldap pwdexpirewarning This command is used to delete the configuration of the password expiry warning for the specified LDAP server. show aaa server ldap pwdexpirewarning This command is used to display the configuration of the password expiry warning for the specified LDAP server. aaa server ldap pwdpolicy This command is used to set the policy DN for the specified LDAP server when the LDAP server is an OpenLDAP server. Before configuring password expiry warning for the OpenLDAP server, you must execute this command to set the policy DN first. Otherwise, the password expiry warning configuration will not be accepted by the OpenLDAP server. ldap_server_name This parameter specifies the name of an existing LDAP server. Its value must be a string of 1 to 32 characters. password_policy_DN This parameter specifies the policy DN. Its value must be a string of 1 to 32 characters and must be the same as the default policy DN set on the OpenLDAP server. For example: vs(config)$ aaa server ldap pwdpolicy AD "cn=pwspolicy" no aaa server ldap pwdpolicy 2000-2018 Array Networks, Inc. All Rights Reserved. 89Chapter 4 AAA This command is used to delete the configuration of the policy DN for the specified LDAP server. show aaa server ldap pwdpolicy This command is used to display the configuration of the policy DN for the specified LDAP server. aaa group in dn This command is used to enable the function of extracting the DN as the user’s group. The administrator can use the command to “aaa group regex” to define which part of the DN will be extracted as the user’s group. By default, this function is disabled. no aaa group in dn This command is used to disable the function of extracting the DN as the user’s group. aaa group regex This command is used to define which part of the DN to be extracted as the user’s group. expression This parameter specifies a regular expression that indicates the part of the DN to be extracted as the user’s group. Its value must be a string of 1 to 64 characters. The “()” meta-character is supported. At most five “()” meta-characters can be configured. For example, vs(config)$ aaa group regex "OU=([^,]*), OU=([^,]*)" If the DN is “OU=Information Department, OU=Users, OU=1025, DC=staff, DC=org”, the “Information Department” and “Users” will be extracted respectively as two groups of the user.  LDAP Autosearch aaa server ldap autosearch profile This command is used to define an LDAP auto-search profile. A maximum of five LDAP auto-search profiles can be configured for a virtual site. profile_name This parameter specifies the name of the LDAP auto-search profile. Its value must be a string of 1 to 32 characters. no aaa server ldap autosearch profile This command is used to delete the specified LDAP auto-search profile. show aaa server ldap autosearch profile This command is used to display all LDAP auto-search profiles. aaa server ldap autosearch host 2000-2018 Array Networks, Inc. All Rights Reserved. 90Chapter 4 AAA This command is used to configure an LDAP host for the specified LDAP auto-search profile. The LDAP host must be configured before the profile is enabled using the command “aaa server ldap autosearch on ”. profile_name This parameter specifies the name of an existing LDAP auto-search profile. ip This parameter specifies the IP address of the LDAP host. Its value must be an IPv4 address. port This parameter specifies the port of the LDAP host. Its value must be an integer ranging from 1 to 65,535. username This parameter specifies the username of the LDAP server administrator. password This parameter specifies the password of the LDAP server administrator. base_dn This parameter specifies the DN of the LDAP entry at which to start the search for users. Its value must be a string of 1 to 900 characters. timeout This parameter specifies the maximum timeout in seconds. Its value must be an integer ranging from 1 to 65,535. tls_flag Optional. This parameter specifies whether to access the LDAP server over the TLS protocol. Its value must be:  “tls”: indicates that the LDAP server is accessed over the TLS protocol.  empty: indicates the LDAP server is not accessed over the TLS protocol. The default value is empty. no aaa server ldap autosearch host This command is used to delete the LDAP host configured for the specified LDAP auto-search profile. show aaa server ldap autosearch host This command is used to display the LDAP host configured for the specified LDAP auto-search profile. 2000-2018 Array Networks, Inc. All Rights Reserved. 91Chapter 4 AAA aaa server ldap autosearch filter This command is used to configure the search filter for the specified LDAP auto-search profile. The search filter must be configured before the profile is enabled using the command “aaa server ldap autosearch on ”. This command is also used to modify the existing configuration of the search filter for the specified LDAP auto-search profile. profile_name This parameter specifies the name of the LDAP auto-search profile. filter_string This parameter specifies a filter string used to filter the LDAP entries. Its value must be a string of 1 to 128 characters, which must be enclosed by double quotes. Please refer to the command “aaa server ldap searchfilter” for details of the parameter explanation. no aaa server ldap autosearch filter This command is used to delete the search filter configured for the specified LDAP auto-search profile. show aaa server ldap autosearch filter This command is used to display the search filter configured for the specified LDAP auto-search profile. aaa server ldap autosearch attribute This command is used to configure the LDAP attribute to be searched for the specified LDAP auto-search profile. The LDAP attribute must be configured before the profile is enabled using the command “aaa server ldap autosearch on ”. This command is also used to modify the existing configuration of the LDAP attribute to be searched for the specified LDAP auto-search profile. profile_name This parameter specifies the name of an existing LDAP auto-search profile. search_attribute This parameter specifies the name of the LDAP attribute to be searched. Its value must be a string of 1 to 32 characters. no aaa server ldap autosearch attribute This command is used to delete the configuration of the LDAP attribute to be searched for the specified LDAP auto-search profile. show aaa server ldap autosearch attribute 2000-2018 Array Networks, Inc. All Rights Reserved. 92Chapter 4 AAA This command is used to display the configuration of the LDAP attribute to be searched for the specified LDAP auto-search profile. aaa server ldap autosearch time daily This command is used to configure a daily auto-search frequency for the specified LDAP auto-search profile. By default, auto-search is performed on 0:00 daily for the LDAP auto-search profile. This command is also used to modify the existing configuration of the daily auto-search frequency for the specified LDAP auto-search profile. profile_name This parameter specifies the name of an existing LDAP auto-search profile. hour This parameter specifies the hour when the daily auto-search is carried out. Its value must be an integer ranging from 0 to 23, indicating the hour ranging from 0:00 to 23:00. aaa server ldap autosearch time weekly This command is used to configure a weekly auto-search frequency for the specified LDAP auto-search profile. This command is also used to modify the existing configuration of the weekly auto-search frequency for the specified LDAP auto-search profile. profile_name This parameter specifies the name of an existing LDAP auto-search profile. hour This parameter specifies the hour when the weekly auto-search is carried out. Its value must be an integer ranging from 0 to 23, indicating the hour ranging from 0:00 to 23:00. day This parameter specifies the day when the weekly auto-search is carried out. Its value must be “Monday”, “Tuesday”, “Wednesday”, “Thursday”, “Friday”, “Sataurday” and “Sunday”, which is case-insensitive. aaa server ldap autosearch time monthly This command is used to configure a monthly auto-search frequency for the specified LDAP auto-search profile. This command is also used to modify the existing configuration of the monthly auto-search frequency for the specified LDAP auto-search profile. 2000-2018 Array Networks, Inc. All Rights Reserved. 93Chapter 4 AAA profile_name This parameter specifies the name of an existing LDAP auto-search profile. hour This parameter specifies the hour when the monthly auto-search is carried out. Its value must be an integer ranging from 0 to 23, indicating the hour ranging from 0:00 to 23:00. date This parameter specifies the date when the monthly auto-search is carried out. Its value must be an integer ranging from 1 to 31. If a month does not have the specified date, such as 31 in June, the search will not be carried out in this month. no aaa server ldap autosearch time This command is used to delete the setting of the auto-search frequency for the specified LDAP auto-search profile. show aaa server ldap autosearch time This command is used to display the setting of auto-search frequency for the specified LDAP auto-search profile. aaa server ldap autosearch email This command is used to configure the email address for the specified LDAP auto-search profile. When the search result is different from the last search result, an email will be sent to the configured email addresses to notify the administrators of the LDAP entry changes. A maximum of five “aaa server ldap autosearch email” configurations are supported for every profile. This command configuration is optional for every profile. profile_name This parameter specifies the name of the LDAP auto-search profile. email_address This parameter specifies the email address. Its value must be a string of 1 to 128 characters enclosed by double quotes. no aaa server ldap autosearch email This command is used to delete the configuration of an email address for the specified LDAP auto-search profile. show aaa server ldap autosearch email This command is used to display all the email addresses configured for the specified LDAP auto-search profile. aaa server ldap autosearch subject 2000-2018 Array Networks, Inc. All Rights Reserved. 94Chapter 4 AAA This command is used to configure the email subject for the specified LDAP auto-search profile. The subject will be used for sending emails to all the email addresses of this profile. This command configuration is optional for every profile. profile_name This parameter specifies the name of the LDAP auto-search profile. email_subject This parameter specifies the email subject. Its value must be a string of 1 to 256 characters enclosed by double quotes. no aaa server ldap autosearch subject This command is used to delete the configuration of the email subject for the specified LDAP auto-search profile. show aaa server ldap autosearch subject This command is used to display the email subject configured for the specified LDAP auto-search profile. aaa server ldap autosearch {on|off} This command is used to enable or disable the specified LDAP auto-search profile. Before enabling the LDAP auto-search profile, make sure that related LDAP auto-search configurations have been made. profile_name This parameter specifies the name of an existing LDAP auto-search profile. show aaa server ldap autosearch status This command is used to display the status of the specified LDAP auto-search profile. aaa server ldap autosearch update This command is used to carry out a search immediately based on the specified LDAP auto-search profile. profile_name This parameter specifies the name of an exisiting LDAP auto-search profile. aaa server ldap autosearch result This command is used to display the search results and result changes of the specified LDAP auto-search profile. profile_name This parameter specifies the name of an existing LDAP auto-search profile. aaa server ldap autosearch acknowledge 2000-2018 Array Networks, Inc. All Rights Reserved. 95Chapter 4 AAA This command is used to acknowledge the search result changes of the specified LDAP auto-search profile. profile_name This parameter specifies the name of an existing LDAP auto-search profile. RADIUS aaa server radius host [index] [accounting_port] This command is used to configure a RADIUS host for a specified RADIUS server. A maximum of three RADIUS hosts can be configured for one RADIUS server. radius_server_name This parameter specifies the name of an existing RADIUS server. Its value must be a string of 1 to 32 characters. ip This parameter specifies the IP address of the RADIUS host. Its value must be an IPv4 address. authentication_port This parameter specifies the port number used for RADIUS authentication. Its value must be an integer ranging from 1 to 65,535. secret This parameter specifies the shared secret text string used by the AG appliance and the RADIUS server to encrypt passwords and exchange responses. retries This parameter specifies the retry times to connect the RADIUS server. Its value must be an integer ranging from 1 to 65,535. timeout This parameter specifies the timeout value of the search in seconds. Its value must be an integer ranging from 1 to 65,535. index Optional. This parameter specifies the host index. Its value must be 1, 2 or 3. The default value is 1. accounting_port Optional. This parameter specifies the port number used for RADIUS accounting. Its value must be an integer ranging from 1 to 65535. The default value is 1813. no aaa server radius host This command is used to delete a RADIUS host configured for the specified RADIUS server. 2000-2018 Array Networks, Inc. All Rights Reserved. 96Chapter 4 AAA show aaa server radius host This command is used to display the RADIUS host(s) configured for the specified RADIUS server. aaa server radius attribute group This command is used to specify an attribute used to obtain the external RADIUS group of the user from the RADIUS entry for the specified RADIUS server. Please note that individual attributes may vary depending on the individual network requirements. radius_server_name This parameter specifies the name of an existing RADIUS server. attribute This parameter specifies the ID of the attribute used to obtain the external RADIUS group of the user from the RADIUS entry. Its value must be an integer ranging from 1 to 63. For details of each attribute, please refer to the following list. Please note that the attributes may vary depending on the individual network requirements. 1 User-Name 2 User-Password 3 CHAP-Password 4 NAS-IP-Address 5 NAS-Port 6 Service-Type 7 Framed-Protocol 8 Framed-IP-Address 9 Framed-IP-Netmask 10 Framed-Routing 11 Filter-Id 12 Framed-MTU 13 Framed-Compression 14 Login-IP-Host 15 Login-Service 16 Login-TCP-Port 17 (unassigned) 2000-2018 Array Networks, Inc. All Rights Reserved. 97Chapter 4 AAA 18 Reply-Message 19 Callback-Number 20 Callback-Id 21 (unassigned) 22 Framed-Route 23 Framed-IPX-Network 24 State 25 Class 26 Vendor Specific 27 Session Timeout 28 Idle-Timeout 29 Termination-Action 30 Called-Station-Id 31 Calling-Station-Id 32 NAS-Identifier 33 Proxy-State 34 Login-LAT-Service 35 Login-LAT-Node 36 Login-LAT-Group 37 Framed-AppleTalk-Link 38 Framed-AppleTalk-Network 39 Framed-AppleTalk-Zone 40-59 (rev. for accounting) 60 CHAP-Challenge 61 NAS-Port-Type 62 Port-Limit 63 Login-LAT-Port Note: To modify the existing attribute, please delete the existing configuration using the command “no aaa server radius attribute group” first. 2000-2018 Array Networks, Inc. All Rights Reserved. 98Chapter 4 AAA no aaa server radius attribute group This command is used to delete the configuration of the attribute used to obtain the external RADIUS group of the user from the RADIUS entry for the specified RADIUS server. show aaa server radius attribute group This command is used to display the configuration of the attribute used to obtain the external RADIUS group of the user from the RADIUS entry for the specified RADIUS server. aaa server radius attribute clientip This command is used to specify the attribute used to obtain the VPN client IP and netmask of the user from the RADIUS entry for the specified RADIUS server. radius_server_name This parameter specifies the name of an existing RADIUS server. attribute_ip This parameter specifies the ID of the attribute used to obtain the VPN client IP of the user from the RADIUS entry for the specified RADIUS server. attribute_netmask This parameter specifies the ID of the attribute used to obtain the VPN netmask of the user from the RADIUS entry for the specified RADIUS server. no aaa server radius attribute clientip This command is used to delete the configuration of the attributes used to obtain the VPN client IP and netmask of the user from the RADIUS entry for the specified RADIUS server. show aaa server radius attribute clientip This command is used to display the configuration of the attributes used to obtain the VPN client IP and netmask of the user from the RADIUS entry for the specified RADIUS server. aaa server radius attribute phonenumber This command is used to specify the attribute used to obtain the mobile phone numbers of the user from the RADIUS entry for the specified RADIUS server. radius_server_name This parameter specifies the name of an existing RADIUS server. attribute This parameter specifies the mobile phone numbers of users extracted from the RADIUS server. Its value must be a string of 1 to 80 characters. no aaa server radius attribute phonenumber 2000-2018 Array Networks, Inc. All Rights Reserved. 99Chapter 4 AAA This command is used to delete the attribute used to obtain the mobile phone number of the user from the RADIUS entry for the specified RADIUS server. show aaa server radius attribute phonenumber This command is used to display the attribute used to obtain the mobile phone number of the user from the RADIUS entry for the specified RADIUS server. aaa server radius defaultgroup This command is used to configure the default group assigned to authenticated users for whom no RADIUS group is obtained for the specified RADIUS server. radius_server_name This parameter specifies the name of an existing RADIUS server. group This parameter specifies the default RADIUS group name. Its value must be a string of 1 to 80 characters. no aaa server radius defaultgroup This command is used to delete the default group assigned to authenticated users for whom no RADIUS group is obtained for the specified RADIUS server. show aaa server radius defaultgroup This command is used to display the default group assigned to authenticated users for whom no RADIUS group is obtained for the specified RADIUS server. aaa server radius nasip This command is used to set the “NAS-IP-Address” (IP address of NAS, Network Access Server) attribute in the RADIUS requests for the specified RADIUS server. If this command is not configured, the system will select an available port IP address as the NAS IP address in the sequence of “port1, port2, port3…”. radius_server_name This parameter specifies the name of an existing RADIUS server. nasip This parameter specifies the NAS IP address for the RADIUS server. Its value must be an IPv4 address. Note: The “NAS-IP-Address” attribute must be specified if only the bond or VLAN interface is configured with the IP address but no system interface is configured with the IP address on the AG appliance. no aaa server radius nasip This command is used to delete the setting of the “NAS-IP-Address” attribute for the specified RADIUS server. show aaa server radius nasip 2000-2018 Array Networks, Inc. All Rights Reserved. 100Chapter 4 AAA This command is used to display the setting of the “NAS-IP-Address” attribute for the specified RADIUS server. Certificate aaa server certificate authenticate type This command is used to set the Certificate server used for authentication and the authentication type of the Certificate server. cert_server_name This parameter specifies the name of an existing Certificate server used for authentication. authentication_type This parameter specifies the authentication type of the Certificate server. Its value must be:  anonymous: indicates the system will only authenticate the user’s SSL client certificate.  challenge: indicates the system will authenticate the user’s SSL client certificate and validate that the username and password of the user’s account exists on the LDAP or LocalDB server assisting the Certificate server in authentication.  nochallenge: indicates the system will authenticate the user’s SSL client certificate and validate that the username of the user’s account exists on the LDAP or LocalDB server assisting the Certificate server in authentication. Note: For the authentication types “challenge” and “nochallenge”, the administrator needs to set the type of the AAA server assisting this Certificate server in authentication using the “aaa server certificate authenticate server” command and configure other related settings. For the authentication types “challenge”, after passing the certificate authentication, the user will be directed to the challenge page, requiring the user to enter the (username and) password. For details, please refer to the command “aaa server certificate authenticate userid”. no aaa server certificate authenticate type This command is used to delete the configuration of the Certificate server used for authentication. show aaa server certificate authenticate type This command is used to display the configuration of the Certificate server used for authentication. 2000-2018 Array Networks, Inc. All Rights Reserved. 101Chapter 4 AAA aaa server certificate anonymous This command is used to set the certificate field used to obtain the username of the user account from the certificate for the specified Certificate server used for authentication of the “anonymous” type. If this command is not configured, the default username of the user account is “cert user”. The value of the specified certificate field will be used as the account name of the user and will be displayed on the portal welcome page when the user passes the certificate authentication. cert_server_name This parameter specifies the name of an existing Certificate server. cert_field This parameter specifies the certificate field used to obtain the username of the user account from the certificate. Its value must be a string of 1 to 256 characters and must be:  Standard certificate field names  All standard OIDs in the standard certificate fields (in the format of x.x.x.x and must be enclosed by double quotes)  Standard extension OIDs in the extension field (in the format of x.x.x.x and must be enclosed by double quotes)  Combination of the DN name and OID (in the format of DN.OID)  Standard extension field names in the extension field (only ext.subjectAltName and ext.issuerAltName). For detailed description for the values of the “cert_field” parameter, please refer to the command “aaa server certificate externalgroup”. The following table describes the values of the “cert_field” parameter in detail. Value Description The “cert_field” parameter supports the following standard certificate field names:  subject and subject.cn/c/o/ou/st/l/emailaddress/pseudonym/title/sn/name/s urname/givenname/initials/dnqualifier/gq/dn/dc (certificate’s Standard certificate field subject field) names  issuer and issuer.cn/c/o/ou/st/l/emailaddress/pseudonym/title/sn/name/su rname/givenname/initials/dnqualifier/gq/dc (certificate’s issuer field)  serial (certificate’s serial number field) 2000-2018 Array Networks, Inc. All Rights Reserved. 102Chapter 4 AAA Value Description  notbefore (certificate’s not before field)  notafter (certificate’s not after field)  commonname (certificate’s common name field, same as the subject.cn)  validity (certificate’s validity field)  publickey (certificate’s public key field) All standard OIDs in the OIDs for the standard certificate field names standard certificate fields The “cert_field” parameter supports the following standard extension OIDs enclosed by double quotes:  2.5.29.35  2.5.29.14  2.5.29.15  2.5.29.32  2.5.29.33  2.5.29.17 Standard extension OIDs in  2.5.29.18 the extension field  2.5.29.9  2.5.29.19  2.5.29.30  2.5.29.36  2.5.29.37  2.5.29.31  2.5.29.54  2.5.29.46 The “cert_field” parameter supports the following combinations of the DN name and OID:  subject.oid: for example, subject.1.2.840.113549.1.9.1 Combination of the DN indicates the OID 1.2.840.113549.1.9.1 (email address) in the name and OID certificate’s subject field.  issuer.oid: for example, issuer.1.2.840.113549.1.9.1 indicates the OID 1.2.840.113549.1.9.1 (email address) in the 2000-2018 Array Networks, Inc. All Rights Reserved. 103Chapter 4 AAA Value Description certificate’s issuer field.  ext.oid: for example, ext.2.5.29.35 indicates the OID 2.5.29.35 in the certificate’s extension field.  oid.oid: for example, oid.2.5.29.17 indicates the OID 2.5.29.17 in the entire certificate’s To Be Signed (TBS) part. The “cert_field” parameter supports only the following two standard extension field names: Standard extension field names in the extension field  ext.subjectAltName  ext.issuerAltName no aaa server certificate anonymous This command is used to delete the configuration of the certificate field used to obtain the username of the user account from the certificate for the specified Certificate server used for authentication of the “anonymous” type. show aaa server certificate anonymous This command is used to display the configuration of the certificate field used to obtain the username of the user account from the certificate for the specified Certificate server used for authentication of the “anonymous” type. aaa server certificate authenticate userid This command is used to set the user ID action for the specified Certificate server whose authentication type is “challenge”. When this command is not configured, the username text box will not be displayed for the user to enter the username on the Certificate challenge page. The value of the certificate field specified by the command “aaa server certificate ldap search” or “aaa server certificate localdb search” will be used as the username. This command is also used to modify the existing configuration of the user ID action of the specified Certificate server used for authentication. cert_server_name This parameter specifies the name of an existing Certificate server whose authentication type is “challenge”. id_action This parameter specifies the user ID action for the Certificate server. Its value must be:  showid: indicates that the username text box will be displayed on the Certificate challenge page and the value of the certificate field specified by the command “aaa server certificate ldap search” or “aaa server certificate localdb search” is displayed as the username. 2000-2018 Array Networks, Inc. All Rights Reserved. 104Chapter 4 AAA  getid: indicates that the username text box will be displayed on the Certificate challenge page and the user needs to enter the username manually. no aaa server certificate authenticate userid This command is used to delete the configuration of the user ID action for the specified Certificate server whose authentication type is “challenge”. show aaa server certificate authenticate userid This command is used to display the configuration of the user ID action for the specified Certificate server whose authentication type is “challenge”. aaa server certificate authenticate server This command is used to set the type of the AAA server assisting the specified Certificate server in authentication. This command needs to be configured only when the authentication type of the Certificate server is “challenge” or “nochallenge”. cert_server_name This parameter specifies the name of an existing Certificate server used for authentication. server_type This parameter specifies the type of the AAA server assisting the Certificate server for authentication. Its value must be:  localdb: indicates that the virtual site’s LocalDB server will assist the Certificate server in authentication.  ldap: indicates that the LDAP server specified by the “aaa server certificate ldap serverid” command will assist the Certificate server in authentication. no aaa server certificate authenticate server This command is used to delete the configuration of the type of the AAA server assisting the specified Certificate server in authentication. show aaa server certificate authenticate server This command is used to display the configuration of the type of the AAA server assisting the specified Certificate server in authentication. aaa server certificate ldap serverid This command is used to set the LDAP server used to assist the specified Certificate server in authentication or authorization. 2000-2018 Array Networks, Inc. All Rights Reserved. 105Chapter 4 AAA cert_server_name This parameter specifies the name of an existing Certificate server. ldap_server_name This parameter specifies the name of an existing LDAP server. no aaa server certificate ldap serverid This command is used to delete the configuration of the LDAP server used to assist the specified Certificate server in authentication or authorization. show aaa server certificate ldap serverid This command is used to display the configuration of the LDAP server used to assist the specified Certificate server in authentication or authorization. aaa server certificate ldap search [user_id] This command is used to configure the search filter for the specified Certificate server using an LDAP server to assist in authentication or authorization. When the authentication type of the Certificate server is “nochallenge” or “challenge”, the LDAP attribute specified by the “ldap_attribute” parameter and the value of the certificate field specified by the “cert_field” parameter in the client certificate will constitute the search filter. For the authentication type “nochallenge”, if any LDAP entry on the LDAP server matches this search filter, the user passes the authentication and the value of the certificate field specified by the “cert_field” parameter in the client certificate will be displayed as the username in the portal welcome page. For the authentication type “challenge”, if any LDAP entry on the LDAP server matches this search filter and the username and password on the Certificate challenge page, the user passes the authentication and the value of the LDAP attribute specified by the “user_id” parameter in the retrieved LDAP entry will be displayed as the username in the portal welcome page. cert_server_name This parameter specifies the name of an existing Certificate server. cert_field This parameter specifies the certificate field used to obtain the username of the user account from the certificate. Its value must be a string of 1 to 256 characters. Its value must be:  Standard certificate field names  All standard OIDs in the standard certificate fields (in the format of x.x.x.x and must be enclosed by double quotes)  Standard extension OIDs in the extension field (in the format of x.x.x.x and must be enclosed by double quotes)  Combination of the DN name and OID (in the format of DN.OID) 2000-2018 Array Networks, Inc. All Rights Reserved. 106Chapter 4 AAA  Standard extension field names in the extension field (only ext.subjectAltName and ext.issuerAltName). For detailed description for the values of the “cert_field” parameter, please refer to the command “aaa server certificate externalgroup”. ldap_attribute This parameter specifies the LDAP attribute used to constitute the search filter. Its value must be a string of 1 to 80 characters. user_id Optional. This parameter specifies the LDAP attribute used to identify the user. If this parameter is not specified, the default value is the same as the value of the “ldap_attribute” parameter. no aaa server certificate ldap search This command is used to delete the search rule configured for the specified Certificate server using an LDAP server to assist in authentication or authorization. show aaa server certificate ldap search This command is used to display the search filter configured for the specified Certificate server using an LDAP server to assist in authentication or authorization. aaa server certificate localdb search This command is used to configure the search filter for the specified Certificate server using the LocalDB server to assist in authentication or authorization. For the authentication type “nochallenge”, if the username of any LocalDB account on the LocalDB server matches the value of the certificate field specified by the “cert_field” parameter in the client certificate, the user passes the authentication and the certificate field specified by the “cert_field” parameter in the client certificate will be displayed as the username in the portal welcome page. For the authentication type “challenge”, if the username and password of any LocalDB account on the LocalDB server match the username and password on the certificate challenge page, the user passes the authentication and the username used by the certificate Challenge page will be displayed as the username in the portal welcome page. cert_server_name This parameter specifies the name of an existing Certificate server used for authentication. cert_field This parameter specifies the certificate field used to obtain the username of the user account from the certificate. Its value must be a string of 1 to 32 characters and must be:  Standard certificate field names  All standard OIDs in the standard certificate fields (in the 2000-2018 Array Networks, Inc. All Rights Reserved. 107Chapter 4 AAA format of x.x.x.x and must be enclosed by double quotes)  Standard extension OIDs in the extension field (in the format of x.x.x.x and must be enclosed by double quotes)  Combination of the DN name and OID (in the format of DN.OID)  Standard extension field names in the extension field (only ext.subjectAltName and ext.issuerAltName). For detailed description for the values of the “cert_field” parameter, please refer to the command “aaa server certificate externalgroup”. no aaa server certificate localdb search This command is used to delete the search filter configured for the specified Certificate server using the LocalDB server to assist in authentication or authorization. show aaa server certificate localdb search This command is used to display the search filter configured for the specified Certificate server using the LocalDB server to assist in authentication or authorization. The following commands are used to configure authorization using the Certificate server. During the authorization using the Certificate server, the external group name of the user can be obtained from three ways:  Specified certificate field in the client certificate  LDAP server  LocalDB The three ways are mutually exclusive for one Certificate server used for authorization. aaa server certificate externalgroup This command is used to set the certificate field used to obtain the external group name for the specified Certificate server. The value of the certificate field in the client certificate will be used as the external group name of the user. cert_server_name This parameter specifies the name of an existing Certificate server. cert_field This parameter specifies the certificate field used to obtain the external group name in the client certificate. Its value must be a string of 1 to 64 characters. Its value must be:  Standard certificate field names  All standard OIDs in the standard certificate fields (in the 2000-2018 Array Networks, Inc. All Rights Reserved. 108Chapter 4 AAA format of x.x.x.x and must be enclosed by double quotes)  Standard extension OIDs in the extension field (in the format of x.x.x.x and must be enclosed by double quotes)  Combination of the DN name and OID (in the format of DN.OID)  Standard extension field names in the extension field (only ext.subjectAltName and ext.issuerAltName). no aaa server certificate externalgroup This command is used to delete the configuration of the certificate field used to obtain the external group name for the specified Certificate server. aaa server certificate externaldefault This command is used to configure the default group assigned to a user for the specified Certificate server when the system fails to obtain the external group name from the specified certificate field in the client certificate. cert_server_name This parameter specifies the name of an existing Certificate server. default_group This parameter specifies the default group name. Its value must be a string of 1 to 64 characters. no aaa server certificate externaldefault This command is used to delete the configuration of the default group assigned to a user for the specified Certificate server when the system fails to obtain the external group name from the specified certificate field in the client certificate. aaa server certificate authorize server This command is used to sets the type of the AAA server assisting the specified Certificate server in authorization. cert_server_name This parameter specifies the name of an existing Certificate server used for authorization. Its value must be a string of 1 to 32 characters. server_type This parameter specifies the type of the AAA server assisting the specified Certificate server in authorization. Its value must be:  localdb: indicates that the virtual site’s LocalDB server will assist the Certificate server in authorization.  ldap: indicates that the LDAP server specified by the “aaa server certificate ldap serverid” command will assist the 2000-2018 Array Networks, Inc. All Rights Reserved. 109Chapter 4 AAA Certificate server in authorization. Note: If the “server_type” parameter is set to “ldap” and the system fails to obtain the external group name for the user from the LDAP server, the system will use the default group setting configured for the LDAP server itself using the command “aaa server ldap attribute defaultgroup”. no aaa server certificate authorize server This command is used to delete the configuration of the type of the AAA server assisting the specified Certificate server in authorization. show aaa server certificate authorize server This command is used to display the configuration of the type of the AAA server assisting the specified Certificate server in authorization. aaa server certificate localdb defaultgroup This command is used to configure the default group assigned to users for the specified the Certificate server when the system fails to obtain the group name for the user from the LocalDB server. If this command is not configured and the system fails to obtain the group name for the user from the LocalDB server, the group name of the user will be empty rather than the default group setting for the LocalDB server itself. cert_server_name This parameter specifies the name of an existing Certificate server. default_group This parameter specifies the name of the default group in LocalDB. no aaa server certificate localdb defaultgroup This command is used to delete the configuration of the default group assigned to users for the specified the Certificate server when the system fails to obtain the group name for the user from the LocalDB server. show aaa server certificate localdb defaultgroup This command is used to display the configuration of the default group assigned to users for the specified Certificate server when the system fails to obtain the group name for the user from the LocalDB server. aaa server certificate sms type {certificate|ldap|localdb} This command is used to set how to obtain mobile phone numbers of users from the specified Certificate server. cert_server_name This parameter specifies the name of an existing Certificate server. 2000-2018 Array Networks, Inc. All Rights Reserved. 110Chapter 4 AAA certificate|ldap|localdb This parameter specifies how to obtain mobile phone numbers of users. Its value must be:  certificate: indicates that the system obtains mobile phone numbers of users from certificates stored on the Certificate server.  ldap: indicates that the system obtains mobile phones numbers of users from the LDAP server that is used by the Certificate server for authentication or authorization.  localdb: indicates that the system obtains mobile phones numbers of users from LocalDB that is used by the Certificate server for authentication or authorization. Note: If the “certificate|ldap|localdb” parameter is set to “ldap” or “localdb”, the associated LDAP server or LocalDB configured in the command “aaa server certificate authenticate server {localdb|ldap}” or “aaa server certificate authorize server {localdb|ldap}” must be actually used for certification and authorization. Otherwise, mobile phone numbers of users cannot be obtained. no aaa server certificate sms type This command is used to delete the configuration of how to obtain mobile phone numbers of users from the specified Certificate server. show aaa server certificate sms type This command is used to display the configuration of how to obtain mobile phone numbers of users from the specified Certificate server. aaa server certificate sms certificate This command is used to set the certificate field used to obtain mobile phone numbers of users on the specified Certificate server. This command needs to be configured when the “certificate|ldap|localdb” parameter is set to “certificate” in the command “aaa server certificate sms type”. cert_server_name This parameter specifies the name of an existing Certificate server. cert_field This parameter specifies the certificate field used to obtain mobile phone numbers of users. Its value must be a string of 1 to 80 characters and must be:  Standard certificate field names  All standard OIDs in the standard certificate fields (in the format of x.x.x.x and must be enclosed by double quotes) 2000-2018 Array Networks, Inc. All Rights Reserved. 111Chapter 4 AAA  Standard extension OIDs in the extension field (in the format of x.x.x.x and must be enclosed by double quotes)  Combination of the DN name and OID (in the format of DN.OID)  Standard extension field names in the extension field (only ext.subjectAltName and ext.issuerAltName). For detailed description for the values of the “cert_field” parameter, please refer to the command “aaa server certificate externalgroup”. no aaa server certificate sms certificate This command is used to delete the configuration of the certificate field used to obtain mobile phone numbers of users on the specified Certificate server. show aaa server certificate sms certificate This command is used to delete the configuration of the certificate field used to obtain mobile phone numbers of users on the specified Certificate server. aaa server certificate sms ldap This command is used to set the LDAP entry’s attribute used to obtain mobile phone numbers of users from the LDAP server used by the Certificate server for authentication or authorization. This command needs to be configured when the “certificate|ldap|localdb” parameter is set to “ldap” in the command “aaa server certificate sms type”. cert_server_name This parameter specifies the name of an existing Certificate server. attribute This parameter specifies the LDAP entry’s attribute from which the AAA obtains mobile phone numbers of users. Its value must be a string of 1 to 80 characters. no aaa server certificate sms ldap This command is used to delete the configuration of the LDAP entry’s attribute used to obtain mobile phone numbers of users from the LDAP server used by the Certificate server for authentication or authorization. show aaa server certificate sms ldap This command is used to display the configuration of the LDAP entry’s attribute used to obtain mobile phone numbers of users from the LDAP server used by the Certificate server for authentication or authorization. 2000-2018 Array Networks, Inc. All Rights Reserved. 112Chapter 4 AAA SMS aaa server sms host [user_name] [password] [service_id] [source_number] [conn_reuse|conn_close] [tls_flag] This command is used to configure a host for the specified Short Message Service (SMS) server. Only one host can be configured for each SMS server. sms_server_name This parameter specifies the name of an existing SMS server. host_ip This parameter specifies the IP address of the SMS host. Its value must be an IPv4 address. host_port This parameter specifies the port used by the host to communicate with the AAA. Its value must be an integer ranging from 0 to 65535. protocol This parameter specifies the protocol type used by the SMS server. Its value is case-insensitive and must be:  CMPP2: indicates the CMPPv2.0 protocol.  CMPP3: indicates the CMPPv3.0 protocol.  EM: indicates the EM proprietary protocol.  CUSTOM: indicates the custom protocol. If the administrator needs to use the CUSTOM protocol, the SMS authentication request template must be imported via the “aaa server sms custom import request” command and SMS authentication response filter rule must be configured via the “aaa server sms custom result” command. user_name Optional. This parameter specifies the username used to log into the host of the SMS server. Its value must be enclosed by double quotes when beginning with a non-alphabetical character. The default value is empty, indicating that authentication is not required by the SMS host. password Optional. This parameter specifies the password used to log into the host of the SMS server. Its value must be enclosed by double quotes when beginning with a non-alphabetical character. The default value is empty, indicating that authentication is not 2000-2018 Array Networks, Inc. All Rights Reserved. 113Chapter 4 AAA required by the SMS host. service_id Optional. This parameter specifies the ID of the SMS service. Its value must be a string of 1 to 10 characters. This parameter is used only when the “protocol” parameter is set to “CMPP2” or “CMPP3”. The SMS service ID can be obtained when you subscribe to SMS services from China Mobile. The default value is empty. source_number Optional. This parameter specifies the source number of SMS messages. Its value must be a string of 1 to 21 characters. This parameter is used only when the “protocol” parameter is set to “CMPP2” or “CMPP3”. The source number can be obtained when you subscribe to SMS services from China Mobile. The default value is empty. conn_reuse|conn_close Optional. This parameter specifies how to handle the connection between the AG appliance and the SMS server after the AG appliance receives SMS authentication response. Its vaule must be:  conn_reuse: indicates the connection will be reused after the AG appliance receives SMS authentication response.  conn_close: indicates the connection will be forcefully disconnected after the AG appliance receives SMS authentication response. The default value is “conn_reuse”. tls_flag Optional. This parameter specifies whether to access the SMS host over the TLS protocol. Its value must be:  “tls”: indicates that the TLS protocol is used to access the SMS host.  empty: indicates that the TLS protocol is not used to access the SMS host. The default value is empty. This parameter is used only when the “protocol” parameter is set to “CUSTOM”. no aaa server sms host This command is used to delete the host configured for the specified SMS server. 2000-2018 Array Networks, Inc. All Rights Reserved. 114Chapter 4 AAA show aaa server sms host This command is used to display the host configured for the specified SMS server. aaa server sms companyinfo
This command is used to configure the information about the company that subscribes to SMS services from Emay for the specified SMS server. The company information is required to register the SMS service account on the SMS server. sms_server_name This parameter specifies the name of an existing SMS server. company_name This parameter specifies the company name. Its value must be a string of 1 to 60 characters enclosed by double quotes when beginning with a non-alphabetical character. contactor This parameter specifies the name of the contact person of the company. Its value must be a string of 1 to 20 characters enclosed by double quotes when beginning with a non-alphabetical character. phone_number This parameter specifies the telephone number of the company. Its value must be a string of 1 to 20 characters enclosed by double quotes when beginning with a non-alphabetical character. mobile_number This parameter specifies the mobile phone number of the company. Its value must be a string of 1 to 15 characters enclosed by double quotes when beginning with a non-alphabetical character. email This parameter specifies the email of the company. Its value must be a string of 1 to 60 characters enclosed by double quotes when beginning with a non-alphabetical character. fax This parameter specifies the fax of the company. Its value must be a string of 1 to 20 characters enclosed by double quotes when beginning with a non-alphabetical character. address This parameter specifies the address of the company. Its value must be a string of 1 to 60 characters enclosed by double quotes when beginning with a non-alphabetical character. postcode This parameter specifies the postcode of the company. Its value must be a string of 1 to 6 characters enclosed by double quotes when beginning with a non-alphabetical character. 2000-2018 Array Networks, Inc. All Rights Reserved. 115Chapter 4 AAA no aaa server sms companyinfo This command is used to delete the company information setting of the specified SMS server. show aaa server sms companyinfo This command is used to display the company information on the specified SMS server. aaa server sms message [escape_flag] This command is used to modify the content of the short message sent to the mobile phone for the specified SMS server. The verification code is contained in the short message for SMS authentication. If this command is not configured, the default content of the short message sent to the mobile phone is “Verification code: ”. sms_server_name This parameter specifies the name of an existing SMS server. string This parameter specifies the content of the short message sent to the mobile phone. Its value must be a string of 1 to 60 characters enclosed by double quotes. This parameter supports regular expressions “ ” and “ ”. “ ” is mandatory in the string and stands for the verification code sent to a mobile phone; “ ” stands for the user name of a mobile phone. escape_flag Optional. This parameter specifies whether to escape the short message. This parameter needs to be specified when the short message is sent in the URL of the HTTP request. Its value must be:  0: indicates the short message will not be escaped.  1: indicates the short message will be escaped. The default value is 0. For example: vs(config)$aaa server sms message sms_server "Hi , the verification code is " 0 vs(config)$aaa server sms message sms_server "Verification code is " 0 no aaa server sms message This command is used to reset the content of the short message sent to the mobile phone to the default value “Verification code: ” for the specified SMS server. show aaa server sms message 2000-2018 Array Networks, Inc. All Rights Reserved. 116Chapter 4 AAA This command is used to display the content of the short message sent to the mobile phone for the specified SMS server. aaa server sms verificationcode This command is used to modify the length and character type of verification codes for the specified SMS server. If this command is not configured, the default length of verification codes is 8 bytes, and verification codes comprise both letters and numbers by default. sms_server_name This parameter specifies the name of an existing SMS server. length This parameter specifies the length of verification codes in bytes. Its value must be an integer ranging from 6 to 16. character_type This parameter specifies the character type of verification codes. Its value must be:  letter: indicates that verification codes comprise only letters.  num: indicates that verification codes comprise only numbers.  both: indicates that verification codes comprise both letters and numerals. no aaa server sms verificationcode This command is used to reset the length and character type of verification codes to the default configuration for the specified SMS server. show aaa server sms verificationcode This command is used to display the length and character type of verification codes for the specified SMS server. aaa server sms expiretime