”, “<”, “&”, “/”, “\”, “,”,
“"” and “''”.
The test certificate generated by the “ssl csr” command is only used for testing
purposes, not for production systems.
ssl ecc csr [curve_name] [signature_algorithm_index]
This command is used to generate a CSR (Certificate Signing Request) and an SSL key pair based
on the Elliptic Curve Cryptography (ECC) for the current virtual site. After this command is
executed, the administrator will be led through a series of prompts so that the system can gather
the required information to generate the ECC CSR. The administrator can choose to set the private
key as exportable and set the passphrase for the private key to protect it.
In addition, this command also generates a “test” certificate for the virtual site. If the administrator
has not uploaded the intermediate CA certificates and root CA certificate of this “test” certificate
using the commands “ssl import interca” and “ssl import rootca”, a warning message indicating
an incomplete certificate chain will be displayed.
2000-2018 Array Networks, Inc.
All Rights Reserved. 34Chapter 3 Virtual Site
curve_name Optional. This parameter specifies the elliptic curve name. Its value
must be “prime256v1”, “secp384r1”, or “secp521r1”.
The default value is “prime256v1”.
signature_algorithm_index Optional. This parameter specifies the index of the CSR signature
algorithm. Its value must be sha256, sha384, sha512, and sha1.
The default value is “sha256”.
Note: If the elliptic curve field in the ClientHello message does not match the elliptic
curve in the ECC certificate activated for the virtual site, the SSL handshake will fail.
no ssl csr [csr_type]
This command is used to delete the CSR of the specified type for the current virtual site.
csr_type Optional. This parameter specifies the type of the CSR. Its value
must be:
rsa: indicates the RSA CSR will be deleted.
sm2: indicates the SM2 CSR will be deleted.
ecc: indicates that the ECC CSR will be deleted.
all: indicates all types of CSRs will be deleted.
The default value is “all”.
show ssl csr [csr_type]
This command is used to display the CSR of the specified type for the current virtual site.
csr_type Optional. This parameter specifies the type of the CSR. Its value
must be:
rsa: indicates the RSA CSR will be deleted.
sm2: indicates the SM2 CSR will be deleted.
ecc: indicates that the ECC CSR will be displayed.
all: indicates all types of CSRs will be deleted.
The default value is “all”.
ssl import key [key_index] [tftp_ip] [file_name]
2000-2018 Array Networks, Inc.
All Rights Reserved. 35Chapter 3 Virtual Site
This command is used to import a private key for the current virtual site. The administrator can
import three private keys at most.
The administrator can execute this command and copy-n-paste the private key directly into the
CLI. The system also supports importing private keys from a remote TFTP server.
key_index Optional. This parameter specifies the index to be associated with
the imported key. Its value must be 1, 2 or 3, and defaults to 1.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server, which is required only when the private key is
imported via TFTP. It value must be an IPv4 address.
file_name Optional. This parameter specifies the file name of the key on the
remote TFTP server, which is required only when the private key is
imported via TFTP. Its value must be a string of 1 to 256 characters,
and defaults to “
.key”.
ssl export key [key_index] [key_type]
This command is used to export a private key. After this command is executed, the specified key
will be displayed.
key_index Optional. This parameter specifies the index of the imported key to
be exported. Its value must be 1, 2 or 3. If this parameter is not
specified, the active key will be displayed.
key_type Optional. This parameter specifies the type of the private key to be
displayed. Its value must be:
rsa: indicates that the RSA private key will be displayed.
ecc: indicates that the ECC private key will be displayed.
all: indicates that both RSA and ECC private keys will be
displayed.
The default value is “all”.
ssl import certificate [cert_index] [tftp_ip] [file_name]
This command is used to import a certificate for the current virtual site. The administrator can
import three certificates at most. The imported certificate can be activated by the command “ssl
activate certificate [cert_index]”.
The administrator can execute this command and copy-n-paste the PEM format certificate directly
into the CLI. The system also supports importing PEM, DER and PFX formats as well as the
certificates used by IIS 4, IIS 5 and Netscape iPlanet servers from a remote TFTP server.
2000-2018 Array Networks, Inc.
All Rights Reserved. 36Chapter 3 Virtual Site
cert_index Optional. This parameter specifies the index to be associated with
the imported certificate. Its value must be 1, 2 or 3, and defaults to
1.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server, which is required only when the certificate is
imported via TFTP. It value must be an IPv4 address.
file_name Optional. This parameter specifies the file name of the certificate on
the remote TFTP server, which is required only when the certifcate
is imported via TFTP. Its value must be a string of 1 to 256
characters, and defaults to “.crt”.
no ssl certificate [cert_index] [cert_type]
This command is used to delete an imported certificate of the specified type for the current virtual
site.
cert_index Optional. This parameter specifies the index of the certificate. Its
value must be 1, 2 or 3. The default value is 1.
cert_type Optional. This parameter specifies the type of the certificate. Its
value must be:
rsa: indicates that the RSA certificate will be deleted.
ecc: indicates that the ECC certificate will be deleted.
all: indicates that both RSA and ECC certificates will be
deleted.
The default value is “all”.
ssl activate certificate [cert_index] [cert_type]
This command is used to activate an imported certificate as the default certificate.
cert_index Optional. This parameter specifies the index of the certificate to be
activated. Its value must be 1, 2 or 3. The default value is 1.
cert_type Optional. This parameter specifies the type of certificate to be
activated. Its value must be:
rsa: indicates the RSA certificate will be activated.
sm2: indicates the SM2 certificates will be activated.
2000-2018 Array Networks, Inc.
All Rights Reserved. 37Chapter 3 Virtual Site
ecc: indicates that the ECC certificate will be activated.
all: indicates all types of certificates will be activated.
The default value is “all”.
Note:
For each type of certificate, only one certificate/key (with the same index) pair can
stay active in the system. The certificate/key pair generated by the command “ssl
csr” is active by default. The certificate/key pair generated by the command “ssl ecc
csr” is active by default. The certificate/key pair generated by the “ssl sm2 csr”
command is inactive by default.
If the elliptic curve field in the ClientHello message does not match the elliptic
curve in the ECC certificate activated for the virtual site, the SSL handshake will
fail.
show ssl certificate [display_mode] [cert_index] [cert_type]
This command is used to display an imported certificate.
display_mode Optional. This parameter specifies the display mode of certificate.
Its value must be:
complete: indicates that all the information of the certificate
will be displayed.
simple: indicates that only Issuer, Validity and Subject of the
certificate will be displayed.
The default value is “complete”.
cert_index Optional. This parameter specifies the index of the imported
certificate to be displayed. Its value must be 1, 2 or 3. If this
parameter is not specified, the active certificate will be displayed.
cert_type Optional. This parameter specifies the type of certificate to be
displayed. Its value must be:
rsa: indicates the RSA certificate will be displayed.
sm2: indicates the SM2 certificates will be displayed.
ecc: indicates that the ECC certificate will be displayed.
all: indicates all types of certificates will be displayed.
The default value is “all”.
2000-2018 Array Networks, Inc.
All Rights Reserved. 38Chapter 3 Virtual Site
show ssl certinfo
This global command is used to display the information about the SSL certificate(s) of a specified
virtual site.
virtual_site This parameter specifies the name of an existing virtual site.
For example:
AN#show ssl certinfo vs
RSA certificates status:
Cert Index Imported Status
1 YES Active
2 NO -
3 NO -
ECC certificates status:
Cert Index Imported Status
1 YES Active
2 NO -
3 NO -
SM2 certificates status:
Cert Index Imported Status
Sign/Enc
1 YES/NO -
2 NO /NO -
3 NO /NO -
ssl import rootca [tftp_ip] [file_name]
Under the global scope, this command is used to import a trusted CA certificate for all the virtual
sites.
Under the virtual site scope, this command is used to import a trusted CA certificate for the
current virtual site.
The administrator can execute this command and copy-n-paste the trusted CA certificate of PEM
format directly into the CLI. The system also supports importing trusted CA certificate of PEM
and DER formats from a remote TFTP server.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server, which is required only when the trusted CA certificate
is imported via TFTP. Its value must be an IPv4 address.
file_name Optional. This parameter specifies the file name of the trusted CA
certificate on the remote TFTP server, which is required only when
the trusted CA certificate is imported via TFTP. Its value must be a
2000-2018 Array Networks, Inc.
All Rights Reserved. 39Chapter 3 Virtual Site
string of 1 to 256 characters, and defaults to “.crt”.
no ssl rootca [certificate_number]
Under the global scope, this command is used to delete an imported trusted CA certificate from all
the virtual sites.
Under the virtual site scope, this command is used to delete an imported trusted CA certificate
from the current virtual site.
certificate_number Optional. This parameter specifies the serial number of the trusted
CA certificate to be deleted. Administrators can find the serial
number of the certificate via the “show ssl rootca” command. If
this parameter is not specified, all the trusted CA certificates will be
deleted.
show ssl rootca [display_mode]
Under the global scope, this command is used to display the trusted CA certificate imported for all
the virtual sites.
Under the virtual site scope, this command is used to display the trusted CA certificate imported
for the current virtual site.
display_mode Optional. This parameter specifies the display mode of certificate.
Its value must be:
complete: indicates that all the information of the certificate
will be displayed.
simple: indicates that only Issuer, Validity and Subject of the
certificate will be displayed.
The default value is “complete”.
ssl import interca [tftp_ip] [file_name]
This command is used to import an intermediate CA certificate for the current virtual site.
The administrator can execute this command and copy-n-paste the intermediate CA certificate of
PEM format directly into the CLI. The system also supports importing intermediate CA certificate
of PEM and DER formats from a remote TFTP server.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server, which is required only when the intermediate CA
certificate is imported via TFTP. Its value must be an IPv4 address.
2000-2018 Array Networks, Inc.
All Rights Reserved. 40Chapter 3 Virtual Site
file_name Optional. This parameter specifies the file name of the intermediate
CA certificate on the remote TFTP server, which is required only
when the intermediate CA certificate is imported via TFTP. Its
value must be a string of 1 to 256 characters, and defaults to
“.crt”.
no ssl interca [certificate_number]
This command is used to delete an imported intermediate CA certificate from the current virtual
site.
certificate_number Optional. This parameter specifies the serial number of the
intermediate CA certificate to be deleted. Administrators can find
the serial number of the certificate via the “show ssl interca”
command. If this parameter is not specified, all the intermediate CA
certificates will be deleted.
show ssl interca [display_mode]
This command is used to display the intermediate CA certificate imported for the current virtual
site.
display_mode Optional. This parameter specifies the display mode of certificate.
Its value must be:
complete: indicates that all the information of the certificate
will be displayed.
simple: indicates that only Issuer, Validity and Subject of the
certificate will be displayed.
The default value is “complete”.
ssl backup certificate
This command is used to back up the certificate and the private key of the current virtual site into
a PFX file. This PFX file will be zipped with the trusted CA certificate (refer to “ssl import
rootca” command) and intermediate CA certificate (refer to “ssl import interca” command) into
a .tgz file. This .tgz file can be stored in the local system or on a specified TFTP server. If anyone
wants to access the .tgz file, the correct password is required.
file_name This parameter specifies the file name. Its value must be a string of
1 to 256 characters, which is recommended to be enclosed by
double quotes. Only numbers, letters and underscore “_” are
supported.
To store the backup file locally, use a valid local file name
2000-2018 Array Networks, Inc.
All Rights Reserved. 41Chapter 3 Virtual Site
(excluding the path and extension).
To store the backup file on a remote server, use a properly
formatted TFTP string (e.g., "tftp://server/filename").
password This parameter specifies the password that allows access to the
backup file. Its value must be a string of 1 to 128 characters, which
is recommended to be enclosed by double quotes. Only numbers,
letters and underscore “_” are supported.
no ssl backup certificate
This command is used to delete the specified backup certificate/key file stored in the local system.
The parameter “file_name” must be a valid local file name.
show ssl backup certificate
This command is used to display the backup certificate/key file that stored in the local system.
ssl restore certificate
The command is used to restore the certificate and the private key from a PFX file, which can be
stored in the local system or on the remote TFTP server. The password string must be identical to
the string entered when this backup file was produced using the “ssl backup certificate”
command.
file_name This parameter specifies the file name.
password This parameter specifies the password that allows access to the
specified backup file.
ssl settings protocol
This command is used to set the supported SSL protocol version for the current virtual site. The
AG appliance supports three types of protocols: SSLv3, TLSv1 and TLSv1.2.
version This parameter specifies the SSL protocol version. Its value must
be:
SSLv3: indicates that SSLv3 protocol is supported.
TLSv1: indicates that TLSv1 protocol is supported.
TLSv12: indicates that TLSv1.2 protocol is supported.
SM2v11: indicates that SM2v1.1 protocol is supported.
ALL: indicates that the above four SSL protocols are all
supported.
To use more than one protocol, use colon “:” to separate each
2000-2018 Array Networks, Inc.
All Rights Reserved. 42Chapter 3 Virtual Site
other.
For cipher suites supported by each protocol, please refer to
ArrayOS AG 9.4 User Guide.
For example:
AN(config)#ssl settings protocol SSLv3
AN(config)#ssl settings protocol ALL
ssl settings ciphersuite
This command is used to set the supported cipher suite for the current virtual site.
cipher_string This parameter specifies the cipher suite. To use more than one
cipher suite, use colon “:” to separate each other.
Below is a list of supported cipher suites:
DES-CBC3-SHA
RC4-SHA
RC4-MD5
EXP-RC4-MD5
AES128-SHA
AES256-SHA
AES128-SHA256
AES256-SHA256
ECDHE-RSA-AES128-SHA
ECDHE-RSA-AES256-SHA
ECDHE-RSA-AES128-SHA256
ECDHE-RSA-AES256-SHA384
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-RSA-AES256-GCM-SHA384
ECDHE-ECDSA-AES128-SHA
ECDHE-ECDSA-AES256-SHA
ECDHE-ECDSA-AES128-SHA256
ECDHE-ECDSA-AES256-SHA384
ECDHE-ECDSA-AES128-GCM-SHA256
2000-2018 Array Networks, Inc.
All Rights Reserved. 43Chapter 3 Virtual Site
ECDHE-ECDSA-AES256-GCM-SHA384
ECC-SM4-SM3
ECDHE-SM4-SM3
Note: Only experienced administrators should use this command. If you have any
questions regarding these settings, please call customer support BEFORE using this
command.
ssl settings signalgo
This command is used to set the signature algorithm that will be used in the ServerKeyExchange
message generated during SSL handshake for the current virtual site. This command takes effect
for only the negotiation of ECDHE cipher suites.
If the signature algorithm field in the ClientHello message matches multiple configured signature
algorithms, the first one configured in this command will be used. If the signature algorithm field
in the ClientHello message does not match any configured signature algorithm, the SSL
handshake will fail. Please note that this configuration takes effect only when the TLSv1.2
protocol is used.
If this command is not configured, the default signature algorithms are
“sha256ECDSA:sha256RSA:sha384ECDSA:sha384RSA:sha512ECDSA:sha512RSA:sha224EC
DSA:sha224RSA:sha1ECDSA:sha1RSA”.
signature_algorithm This parameter specifies the signature algorithm that will be used in
the ServerKeyExchange message generated during SSL handshake.
Its value must be “sha256ECDSA”, “sha256RSA”,
“sha384ECDSA”, “sha384RSA”, “sha512ECDSA”, “sha512RSA”,
“sha224ECDSA”, “sha224RSA”, “sha1ECDSA”, and “sha1RSA”.
Multiple signature algorithms can be configured. To use more than
one signature algorithm, use colon “:” to separate each other.
ssl settings curves
This command is used to set the elliptic curve that will be used in the ServerKeyExchange
message generated during SSL handshake for the current virtual site. This command takes effect
for only the negotiation of ECDHE cipher suites.
If the elliptic curve field in the ClientHello message matches multiple configured elliptic curves,
the first one configured in this command will be used. If the elliptic curve field in the ClientHello
message does not match any configured elliptic curve, the SSL handshake will fail.
If this command is not configured, the default elliptic curves are
“secp256r1:secp384r1:secp521r1”.
curve_name This parameter specifies the name of the elliptic curve that will be
used in the ServerKeyExchange message generated during SSL
2000-2018 Array Networks, Inc.
All Rights Reserved. 44Chapter 3 Virtual Site
handshake. Its value must be “secp256r1”, “secp384r1” and
“secp521r1”. Multiple elliptic curves can be configured. To use
more than one elliptic curve, use colon “:” to separate each other.
ssl settings clientcert signalgo
This command is used to set the signature algorithm that will be used in the CertificateRequest
message generated during SSL handshake for the current virtual site.
For TLSv1.2, the signature algorithm field in the CertificateRequest message contains all
configured signature algorithms. For other SSL versions lower than TLSv 1.2, the configured
signature algorithm must contain sha1RSA or sha1ECDSA; otherwise, the SSL handshake will
fail.
If this command is not configured, the default signature algorithms are
“sha256ECDSA:sha256RSA:sha384ECDSA:sha384RSA:sha512ECDSA:sha512RSA:sha224EC
DSA:sha224RSA:sha1ECDSA:sha1RSA”.
signature_algorithm This parameter specifies the signature algorithm that will be used in
the CertificateRequest message generated during SSL handshake.
Its value must be “sha256ECDSA”, “sha256RSA”,
“sha384ECDSA:”, “sha384RSA:”, “sha512ECDSA”,
“sha512RSA:”, “sha224ECDSA:”, “sha224RSA”, “sha1ECDSA”
and “sha1RSA”. Multiple signature algorithms can be configured.
To use more than one signature algorithm, use colon “:” to separate
each other.
ssl settings clientauth [subject_filter]
This command is used to enable the client authentication feature. If the host is an SSL virtual site,
all SSL clients connecting to this virtual site must present a client certificate in order to proceed
with communication. If the host is an SSL real host, it will present a certificate to the server when
requested for further communication.
In addition to basic client certificate validation, the SSL virtual site can also perform pattern
matching of the certificate “Subject” field against a set of configured filter rules. If no match is
found, client access will be denied.
subject_filter Optional. This parameter specifies one or more certificate filter
rules. Its value must be enclosed in double quotes with each rule
separated by “/” (e.g., “/C=US/ST=CA”). If more than one rule is
specified, rules will be enforced with an “AND” relationship (all
rules must be matched). If this parameter is not specified, the
system will not perform filtering on the “Subject” fields.
2000-2018 Array Networks, Inc.
All Rights Reserved. 45Chapter 3 Virtual Site
The filter rules can be configured with any of the RDNs (Relative Distinguished Name) supported
by the AG appliances, including:
RDN Standard Name OID
C Country Name 2.5.4.6
ST State or Province Name 2.5.4.8
L Locality Name 2.5.4.7
O Organization Name 2.5.4.10
OU Organizational Unit Name 2.5.4.11
CN Common Name 2.5.4.3
SN Serial Number 2.5.4.5
dnQualifier DN Qualifier 2.5.4.46
Pseudonym Pseudonym 2.5.4.65
Title Title 2.5.4.12
GQ Generation Qualifier 2.5.4.44
Initials Initials 2.5.4.43
Name Name 2.5.4.41
givenName Given Name 2.5.4.42
Surname Surname 2.5.4.4
DC Domain Component 0.9.2342.19200300.100.1.25
emailAddress Email Address 1.2.840.113549.1.9.1
{OID expression} OID information, for example: 1.2.3.4
For example:
AN(config)#ssl settings clientauth
"/C=US/O=Array/OU=QA/emailAddress=admin@arraynetworks.com"
In this example, all client certificates with the country name of “US”, organization name of
“Array”, organizational unit name of “QA” and email address of “admin@arraynetworks.com” in
the certificate “Subject" field will pass the subject filter.
AN(config)#ssl settings clientauth "/2.5.4.6=JP"
In this example, the OID “2.5.4.6” represents “Country Name”. All client certificates with the
OID “2.5.4.6” of “JP” in the certificate “Subject” field will pass the subject filter.
no ssl settings clientauth
This command is used to disable the client authentication feature.
ssl settings ocsp
This command is used to configure the OCSP server and enable the OCSP server online check.
After this command is executed, the AG appliance will first attempt to validate client certificates
online through the OCSP server specified in the client certificate. If this validation fails, the AG
appliance will then attempt to validate the client certificate online through the OCSP server
configured by this command.
2000-2018 Array Networks, Inc.
All Rights Reserved. 46Chapter 3 Virtual Site
ocsp_server This parameter specifies the IP address of the OCSP server. Its
value must be an IPv4 address.
Note: If both the OCSP server and CRL check are configured, only the OCSP server will
be used to validate the certificate.
no ssl settings ocsp
This command is used to disable the OCSP server online check.
ssl import crlca [tftp_ip] [file_name]
This command is used to import a CRL CA certificate for the current virtual site.
When the AG appliance attempts to validate client certifiates using the CRL (Certificate
Revocation List) issued by CA, CRL CA certificate is needed to verify the validity of the CRL
files.
The administrator can execute this command and copy-n-paste the CRL CA certificate of PEM
format directly into the CLI. The system also supports importing CRL CA certificate of PEM and
DER formats from a remote TFTP server.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server, which is required only when the CRL CA certificate is
imported via TFTP. Its value must be an IPv4 address.
file_name Optional. This parameter specifies the file name of the CRL CA
certificate on the remote TFTP server, which is required only when
the CRL CA certificate is imported via TFTP. Its value must be a
string of 1 to 256 characters, and defaults to “.crt”.
no ssl crlca [certificate_number]
This command is used to delete an imported CRL CA certificate from the current virtual site.
certificate_number Optional. This parameter specifies the serial number of the CRL CA
certificate to be deleted. Administrators can find the serial number
of the certificate via the “show ssl crlca” command. If this
parameter is not specified, all the CRL CA certificates will be
deleted.
show ssl crlca [display_mode]
This command is used to display the CRL CA certificate imported for the current virtual site.
display_mode Optional. This parameter specifies the display mode of certificate.
Its value must be:
2000-2018 Array Networks, Inc.
All Rights Reserved. 47Chapter 3 Virtual Site
complete: indicates that all the information of the certificate
will be displayed.
simple: indicates that only Issuer, Validity and Subject of the
certificate will be displayed.
The default value is “complete”.
ssl settings crl online
This command is used to enable the CRL online check.
After this command is executed, the AG appliance will attempt to validate the certificate using the
CRL downloaded from the CDP (CRL Distribution Point) specified in the client certificate. This
command will take effect only when the client authentication feature is enabled.
Note: This command cannot be used together with the “ssl settings crl offline” command.
no ssl settings crl online
This command is used to disable the CRL online check.
ssl settings crl offline [time_interval]
[delay_time]
This command is used to enable the CRL offline check.
After this command is executed, the AG appliance will attempt to validate the certificate using the
CRL downloaded from the configured CDP at the desired time interval. HTTP, FTP and LDAP
are supported protocols to fetch the CRL files. For each virtual site, the administrator can
configure ten CDPs. This command will only take effect when the client authentication feature is
enabled.
cdp_name This parameter specifies the name of the CDP. Its value must be a
string of 1 to 32 characters. Only 0-9, a-z, A-Z and underscore “_”
are supported.
crl_distribution_point This parameter specifies the URL address of the CDP. Its value
must be a string of 1 to 512 characters.
time_interval Optional. This parameter specifies the time interval between CRL
file downloads in minutes. Its value must be an integer ranging
from 1 to 65,535, and defaults to 1440.
delay_time Optional. This parameter specifies the delay time of the CRL file
expiration in minutes. Its value must be an integer ranging from 1 to
2000-2018 Array Networks, Inc.
All Rights Reserved. 48Chapter 3 Virtual Site
65,535, and defaults to 0.
When it is larger than 0, the AG appliance will check for
expiration after downloading the CRL file. For example, if the
current time is greater than the sum of the next update time
(expiration time of this file) and delay time, the CRL file is
expired and the AG appliance will refuse all SSL connections
that need to authenticate the client certificate via the CRL. If
the current time is less than or equal to the sum of the next
update time and delay time, the CRL file is valid.
When it is equal to 0, the AG appliance will not check for
expiration after downloading the CRL file.
Note: Before executing this command, you must first import the CRL CA certificate via
the “ssl import crlca” command.
no ssl settings crl offline [cdp_name]
This command is used to disable the CRL offline check.
cdp_name Optional. This parameter specifies the name of the CDP. Its value
must be:
the CDP name: indicates that CRL files will not be
downloaded from the specified CDP.
ALL: indicates that the CRL files will not be downloaded from
any CDP.
The default value is “ALL”.
show ssl crlstatus [cdp_name]
This command is used to display the information of CRL files downloaded from the specified
CDP.
cdp_name Optional. This parameter specifies the name of the CDP. Its value
must be:
the CDP name: indicates that the system will display the CRL
files downloaded from the specified CDP.
ALL: indicates that the system will display the CRL files
downloaded from all the CDP.
The default value is “ALL”.
ssl settings authmandatory
2000-2018 Array Networks, Inc.
All Rights Reserved. 49Chapter 3 Virtual Site
This command is used to enable the client mandatory authentication mode. By default, the client
mandatory authentication mode is enabled.
no ssl settings authmandatory
This command is used to disable the client mandatory authentication mode.
ssl settings acceptchain
This command is used to enable the accept certificate chain function. Once enabled, the SSL
virtual site will utilize the certificate chain sent by the peer during an SSL handshake to verify that
peer’s certificate. The SSL virtual site will try to use the certificate chain from peer to form the
certificate chain until it finds one CA certificate in its own trust CA list. This command will only
take effect when client authentication is enabled.
no ssl settings acceptchain
This command is used to disable the accept certificate chain function.
ssl settings minimum
This command is used to specify the minimum encryption strength of the client. If any client
connecting to this virtual site does not support the encryption strength specified by the
“cipher_strength” parameter, it will be redirected to the URL specified by the “redirect_url”
parameter. This command should only be used with SSL virtual sites doing HTTPS.
cipher_strength This parameter specifies the minimum encryption strength in bits.
Its value must be 40, 56, 128,168, 256 or 512.
redirect_url This parameter specifies the HTTP or HTTPS URL address to
redirect to. Its value must be a string of 1 to 512 characters.
no ssl settings minimum
This command is used to disable the minimum encryption strength requirement.
ssl settings renegotiation
This command is used to enable the SSL renegotiation function for the current virtual site. By
default, the SSL renegotiation function is disabled for the virtual site.
Note: The SM2v1.1 protocol does not support the SSL renegotiation function.
no ssl settings renegotiation
This command is used to disable the SSL renegotiation function for the current virtual site.
ssl settings reuse
2000-2018 Array Networks, Inc.
All Rights Reserved. 50Chapter 3 Virtual Site
This command is used to enable the SSL session reuse function. By default, the SSL session reuse
function is enabled.
no ssl settings reuse
This command is used to disable the SSL session reuse function.
show ssl settings
This command is used to display the SSL settings for the current virtual site.
ssl globals sendclosenotify {on|off}
This global command is used to enable or disable the function of sending SSL close notification.
By default, this function is enabled.
ssl globals ignoreclosenotify {on|off}
This global command is used to enable or disable the function of the AG appliance ignoring the
SSL close notification sent from the client. It applies to all configured SSL virtual sites. By default,
this function is enabled.
If this function is enabled, the AG appliance will ignore SSL close notify errors when a client
does not terminate an SSL connection correctly (or terminates an SSL connection without
sending the Close Notify Alert). Consequently, the AG appliance will continue to reuse the
associated SSL sessions.
If this function is disabled, the AG appliance will require the connection to be closed with the
Close Notify Alert. In this case, if a client does not send the Close Notify Alert before closing
a connection then the associated SSL session will be marked as invalid and flushed.
ssl globals verifycert {on|off}
This global command is used to enable or disable the server certificate verification function. This
function is needed when the AG appliance needs to verify the certificates sent by the backend
servers. After this function is enabled, trusted root CA certificates should be imported under the
global scope. By default, this function is disabled.
ssl globals renegotiation {on|off}
This global command is used to enable or disable the SSL renegotiation function globally. By
default, this function is disabled globally.
Note: When any virtual site uses certificate authentication, the SSL renegotiation
function needs to be enabled globally.
ssl globals fastcrl {on|off}
This global command is used to enable or disable CRL memory. When enabled, the CRL files on
disk will be loaded into memory immediately. By default, this function is disabled.
ssl globals sessiontimeout
2000-2018 Array Networks, Inc.
All Rights Reserved. 51Chapter 3 Virtual Site
This global command is used to set the SSL session cache timeout value.
timeout This parameter specifies the timeout value in seconds. Its value
must be an integer ranging from 60 to 86,400 characters.
show ssl globals
This global command is used to display SSL global settings.
ssl start
This command is used to enable SSL service for a specific host. All services associated with this
specified SSL virtual site will be affected. The AG appliance will check the certificate chain for
the SSL virtual site when starting the virtual site. A warning message, stating that the certificate
chain is incomplete will be displayed if the certificate chain cannot be formed using the
intermediate CA file and global trusted CA file.
Note: SSL virtual site settings cannot be changed while SSL is enabled. To make
changes, SSL must first be disabled (see the “ssl stop” command below).
ssl stop
This command is used to disable the SSL service for a specific host. It will not remove the
associated information such as key and certificate data.
clear ssl
This command is used to clear the SSL configurations, including the key and certificate pair. If
this command is executed, there is no way to retrieve the key even if there is a copy of the CSR.
To reconfigure SSL for this virtual site, a new key and a replacement certificate will need to be
created.
Note: To execute this command, all services associated with this specified SSL virtual
site will be affected.
show statistics ssl
This command is used to display all the SSL statistics for the current virtual site.
clear statistics ssl
This command is used to clear all relative SSL statistics for the current virtual site.
SM2
ssl globals sm2 {on|off}
This global command is used to enable or disable the SM2 function. By default, this function is
disabled.
2000-2018 Array Networks, Inc.
All Rights Reserved. 52Chapter 3 Virtual Site
ssl sm2 csr [curve_name] [csr_format]
This command is used to generate an SM2 CSR and an SM2 signature key pair for the current
virtual site. Please enable the SM2 function first before executing this command. After this
command is executed, the administrator will be led through a series of prompts so that the system
can gather the required information to generate the CSR. The administrator can choose to set the
private key as exportable and set the passphrase for the private key to protect it. In addition, this
command also generates a “test” signature certificate for the virtual site.
Please refer to the “ssl csr” command for the requested data and other details displayed after this
command is executed.
curve_name Optional. This parameter specifies the curve name used by the SM2
algorithm. Its value must only be “sm2”. The default value is
“sm2”.
csr_format Optional. This parameter specifies the CSR format. Its value must
be “SCCA” or “CFCA”. The default value is “SCCA”.
ssl sm2 import enckey [key_index] [tftp_ip] [file_name]
This command is used to import an SM2 encryption key for the current virtual site. The
administrator can import three private keys at most.
The administrator can execute this command and copy-n-paste the private key directly into the
CLI. The system also supports importing private keys from a remote TFTP server.
key_index Optional. This parameter specifies the index to be associated with
the imported SM2 encryption key. Its value must be 1, 2 or 3. The
default value is 1.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server. This parameter needs to be specified when you want
to import the SM2 encryption key from a remote TFTP server. It
value must be an IPv4 address.
file_name Optional. This parameter specifies the file name of the SM2
encryption key on the remote TFTP server. This parameter needs to
be specified when you want to import the SM2 encryption key from
a remote TFTP server. Its value must be a string of 1 to 256
characters. The default value is “.key”.
ssl sm2 export enckey [key_index]
This command is used to export an SM2 encryption key. After this command is executed, the
specified key will be displayed.
2000-2018 Array Networks, Inc.
All Rights Reserved. 53Chapter 3 Virtual Site
key_index Optional. This parameter specifies the index of the imported SM2
encryption key to be exported. Its value must be 1, 2 or 3. If this
parameter is not specified, the active key will be displayed.
ssl sm2 import encevp [key_index] [digital_envelope_format] [tftp_ip]
[file_name]
This command is used to import an SM2 digital envelope returned by CA for the current virtual
site. Before importing the SM2 digital envelope of the SCCA format, please import the
corresponding SM2 signature key first using the “ssl sm2 import signkey” command.
The administrator can execute this command and copy-n-paste the SM2 digital envelope directly
into the CLI. The system also supports importing private keys from a remote TFTP server.
key_index Optional. This parameter specifies the index to be associated with
the imported SM2 encryption key. Its value must be 1, 2 or 3. The
default value is 1.
digital_envelope_format Optional. This parameter specifies the format of the SM2 digital
envelope obtained from the trusted CA. Its value must be “SCCA”
or “CFCA”. The default value is “SCCA”.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server. This parameter needs to be specified when you want
to import the SM2 digital envelope from a remote TFTP server. It
value must be an IPv4 address.
file_name Optional. This parameter specifies the file name of the SM2 digital
envelope on the remote TFTP server. This parameter needs to be
specified when you want to import the SM2 digital envelope from a
remote TFTP server. Its value must be a string of 1 to 256
characters. The default value is “.evp”.
ssl sm2 import enccertificate [cert_index] [tftp_ip] [file_name]
This command is used to import an SM2 encryption certificate for the current virtual site. The
administrator can import three certificates at most. The imported certificate can be activated by the
command “ssl activate certificate [cert_index]”.
The administrator can execute this command and copy-n-paste the PEM format certificate directly
into the CLI. The system also supports importing PEM, DER and PFX formats as well as the
certificates used by IIS 4, IIS 5 and Netscape iPlanet servers from a remote TFTP server.
cert_index Optional. This parameter specifies the index to be associated with
the imported SM2 encryption certificate. Its value must be 1, 2 or 3.
2000-2018 Array Networks, Inc.
All Rights Reserved. 54Chapter 3 Virtual Site
The default value is 1.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server. This parameter needs to be specified when you want
to import the SM2 encryption certificate from a remote TFTP
server. It value must be an IPv4 address.
file_name Optional. This parameter specifies the file name of the SM2
encryption certificate on the remote TFTP server. This parameter
needs to be specified when you want to import the SM2 encryption
certificate from a remote TFTP server. Its value must be a string of
1 to 256 characters. The default value is “.crt”.
no ssl sm2 enccertificate [cert_index]
This command is used to delete an imported SM2 encryption certificate. The corresponding SM2
encryption key pair will also be deleted.
ssl sm2 import signkey [key_index] [tftp_ip] [file_name]
This command is used to import an SM2 signature key for the current virtual site. The
administrator can import three private keys at most.
The administrator can execute this command and copy-n-paste the private key directly into the
CLI. The system also supports importing private keys from a remote TFTP server.
key_index Optional. This parameter specifies the index to be associated with
the imported SM2 signature key. Its value must be 1, 2 or 3. The
default value is 1.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server. This parameter needs to be specified when you want
to import the SM2 signature key from a remote TFTP server. It
value must be an IPv4 address.
file_name Optional. This parameter specifies the file name of the SM2
signature key on the remote TFTP server. This parameter needs to
be specified when you want to import the SM2 signature key from a
remote TFTP server. Its value must be a string of 1 to 256
characters. The default value is “.key”.
ssl sm2 export signkey [key_index]
This command is used to export an SM2 signature key. After this command is executed, the
specified key will be displayed.
2000-2018 Array Networks, Inc.
All Rights Reserved. 55Chapter 3 Virtual Site
key_index Optional. This parameter specifies the index of the imported SM2
signature key to be exported. Its value must be 1, 2 or 3. If this
parameter is not specified, the active key will be displayed.
ssl sm2 import signcertificate [cert_index] [tftp_ip] [file_name]
This command is used to import an SM2 signature certificate for the current virtual site. The
administrator can import three certificates at most. The imported certificate can be activated by the
command “ssl activate certificate [cert_index]”.
The administrator can execute this command and copy-n-paste the PEM format certificate directly
into the CLI. The system also supports importing PEM, DER and PFX formats as well as the
certificates used by IIS 4, IIS 5 and Netscape iPlanet servers from a remote TFTP server.
cert_index Optional. This parameter specifies the index to be associated with
the imported SM2 signature certificate. Its value must be 1, 2 or 3.
The default value is 1.
tftp_ip Optional. This parameter specifies the IP address of the remote
TFTP server. This parameter needs to be specified when you want
to import the SM2 signature certificate from a remote TFTP server.
It value must be an IPv4 address.
file_name Optional. This parameter specifies the file name of the SM2
signature certificate on the remote TFTP server. This parameter
needs to be specified when you want to import the SM2 signature
certificate from a remote TFTP server. Its value must be a string of
1 to 256 characters. The default value is “.crt”.
no ssl sm2 signcertificate [cert_index]
This command is used to delete an imported SM2 signature certificate. The corresponding SM2
signature key pair will also be deleted.
2000-2018 Array Networks, Inc.
All Rights Reserved. 56Chapter 4 AAA
Chapter 4 AAA
The AAA module provides user authentication, authorization and accounting functions. The
commands in this chapter illustrate how to deploy this module.
General Settings
aaa {on|off}
This command is used to enable or disable the AAA function for the virtual site. When this
function is enabled, users will have to log in before gaining access to internal resources; when this
function is disabled, users will automatically pass authentication and obtain authorized resources
according to their assigned roles. Note that any roles depending on “Group Name” conditions will
no longer work. Roles depending on other conditions still work as before such as “Username” (all
users will be assigned the same “guest” username), AAA method, Source IP, and Login Time. By
default, this function is enabled.
show aaa configure
This command is used to display the AAA configurations of the virtual site.
clear aaa configure
This command is used to clear the AAA configurations of the virtual site.
AAA Lockout
Note:
If AAA lockout and LocalDB lockout are both configured, only the configurations of
AAA lockout will take effect.
The AAA lockout function cannot take effect for the certificate authentication.
The configurations of AAA lockout cannot be synchronized to the peer HA units.
For the two-step SMS authentication, the AAA lockout function takes effect only for
the static authentication, such as LocalDB and LDAP, and cannot take effect for the
SMS verification code authentication.
ForAAA servers with multiple AAA methods configured, the AAA lockout function
takes effect for all AAA methods in the rank list.
With the system reboot, the recorded number of login failures of all AAA accounts
will be cleared.
aaa lockout auto loginfailure [failure_times] [duration]
2000-2018 Array Networks, Inc.
All Rights Reserved. 57Chapter 4 AAA
This command is used to enable automatic login-failure lockout for all AAA accounts. A AAA
account will be locked out after the number of login failures using this account reaches the
specified value of the parameter “failure_times”. By default, this function is disabled.
failure_times Optional. This parameter specifies the number of login failures for
locking out AAA accounts. Its value must be an integer ranging
from 1 to 65,535. The default value is 10.
duration Optional. This parameter specifies the duration of the lockout in
seconds. Its value must be an integer ranging from 0 to
4,294,967,295. The default value is 0, indicating that the AAA
account will remain locked out until being manually unlocked by
using the command “aaa lockout unlock”.
no aaa lockout auto loginfailure
This command is used to disable automatic login-failure lockout for all AAA accounts.
show aaa lockout auto loginfailure
This command is used to display the configuration of automatic login-failure lockout for all AAA
accounts.
aaa lockout manual [duration]
This command is used to manually lock out a specified AAA account for a specific duration.
account_name This parameter specifies the name of the AAA account to be locked
out.
duration Optional. This parameter specifies the duration of the lockout in
seconds. Its value must be an integer ranging from 0 to
4,294,967,295. The default value is 0, indicating that the account
will be locked out until being manually unlocked by using the
command “aaa lockout unlock [account_name]”.
aaa lockout list [lockout_type] [account_name] [start] [count]
This command is used to display the currently locked AAA accounts.
lockout_type Optional. This parameter specifies the type of the locked AAA
accounts. Its value must be “auto”, “manual” or “all”. The default
value is “all”, indicating that all types of locked AAA accounts will
be displayed.
account_name Optional. This parameter specifies the name of the locked AAA
account. Its value must be a case-sensitive string of 1 to 64
2000-2018 Array Networks, Inc.
All Rights Reserved. 58Chapter 4 AAA
characters.
If the parameter is specified, the specified locked AAA
account will be displayed.
If the parameter is not specified, all locked AAA accounts will
be displayed.
The default value is empty.
start Optional. This parameter specifies the start of locked AAA accounts
from which to be displayed. Its value must be an integer ranging
from 1 to 4,294,967,295 and the default value is 1.
count Optional. This parameter specifies the number of locked AAA
accounts to be displayed. Its value must be an integer ranging from
1 to 4,294,967,295. The default value is 0, indicating all locked
AAA accounts will be displayed.
aaa lockout unlock [account_name]
This command is used to unlock a previously locked AAA account.
account_name Optional. This parameter specifies the name of the AAA account to
be unlocked. The default value is empty, indicating all locked AAA
accounts will be unlocked.
show aaa lockout count
This command is used to display the statistics of locked AAA accounts.
Server
aaa server name [description]
This command is used to define a AAA server of a particular type.
type This parameter specifies the type of the AAA server. Its value must
only be:
localdb
ldap
radius
certificate
2000-2018 Array Networks, Inc.
All Rights Reserved. 59Chapter 4 AAA
sms
smx
http
server_name This parameter specifies the name of the AAA server, which must
be unique among all servers in the same virtual site. Its value must
be a string of 1 to 32 characters.
For LocalDB, the server name must be the same as the virtual site
name. In addition, only one LocalDB server can be defined per
virtual site.
For SMX, the characters for the server name must only contain 0-9,
a-z, A-Z, and characters “_” and “-”.
description Optional. This parameter specifies the server description. Its value
must be a string of 1 to 127 characters. If it is not specified, the
default description will be the value of “server_name”.
Note: Please ensure that the SSL renegotiation feature has been enabled both globally
and for the virtual site under the following conditions:
Multiple AAA methods are configured and one of them uses the Certificate
authentication (no matter the AAA method includes the Certificate authentication
only or is multi-factor authentication including Certificate authentication)
The AAA rank function is disabled.
no aaa server name
This command is used to delete a specified AAA server.
show aaa server name
This command is used to display all the configured AAA servers.
LocalDB
LocalDB Server
aaa server localdb usernamecaseinsensitive
This command is used to set the username as case-insensitive during the LocalDB authentication.
Note: Please delete LocalDB accounts with usernames different only in case sensitivity
before this command is configured.
2000-2018 Array Networks, Inc.
All Rights Reserved. 60Chapter 4 AAA
no aaa server localdb usernamecaseinsensitive
This command is used to set the username as case-sensitive during the LocalDB authentication.
aaa server localdb defaultgroup
This command is used to define the default group assigned to authenticated users who do not
belong to any other LocalDB group.
default_group This parameter specifies the name of the default LocalDB group. Its
value must be a string of 1 to 80 characters.
no aaa server localdb defaultgroup
This command is used to delete the default LocalDB group configured for authenticated users who
do not belong to any other LocalDB group.
show aaa server localdb defaultgroup
This command is used to display the default LocalDB group configured for authenticated users
who do not belong to any other LocalDB group.
aaa server localdb authmode [mode]
This command is used to set the mode of the LocalDB authentication. If this command is not
configured, the LocalDB server uses only the static password for authentication.
mode Optional. This parameter specifies the mode of the LocalDB
authentication. Its value must be:
0: indicates that users only need to input the static password to
log into the virtual site.
1: indicates that users only need to input the dynamic
password (generated by the MotionProOTP application
installed on the mobile phone) to log into the virtual site. For
example, if the dynamic code is “768950”, users should input
“768950” to log into the virtual site.
2: indicates that users need to input both the static password
and dynamic password to log into the virtual site. For example,
if the static password is “a” and the dynamic code is “768950”,
users should input “a768950” to log into the virtual site.
The default value is 0.
show aaa server localdb authmode
This command is used to display the mode of the LocalDB authentication.
aaa server localdb dynamiccode rebind {enable|disable}
2000-2018 Array Networks, Inc.
All Rights Reserved. 61Chapter 4 AAA
This command is used to enable or disable the dynamic code rebinding for LocalDB accounts.
With this function enabled, after logging into the MotionProOTP application in one mobile client,
the user can also log into the MotionProOTP application in another mobile client with the same
LocalDB account. The old registered credential of the user will be replaced by the new registered
credential. By default, this function is disabled.
LocalDB Account
localdb account [phone] [mail] [nfs_group]
[nfs_account] [custom_info1] [custom_info2] [custom_info3] [custom_info4]
[custom_info5]
This command is used to create a new LocalDB account or update the existing LocalDB account.
If the administrator wants to use LocalDB authentication or the Site2Site VPN function, this
command must be configured. For the Site2Site VPN function, a LocalDB account should be
configured for each spoke to log into the virtual site.
account_name This parameter specifies the name of the LocalDB account to be
created or updated. Its value must be a case-sensitive string of 1 to
64 characters.
password This parameter specifies the password of the LocalDB account. Its
value must be a case-sensitive string of 1 to 32 characters enclosed
by double quotes. Only 0-9, a-z, A-Z, the space character and some
special printable ASCII characters such as ! @ # $ % ^ & * ( ) _ - ~
= { } [ ] | \ / ? : ; ’ ` < > , . are allowed.
phone Optional. This parameter specifies the telephone number of the
LocalDB account. Its value must be a string of 1 to 32 characters
enclosed by double quotes. Only numbers, spaces, “+” and “-” are
allowed. The default value is empty.
mail Optional. This parameter specifies the mail address of the LocalDB
account in the format of “abc@xyz.com”. Its value must be a string
of 1 to 128 characters enclosed by double quotes. The default value
is empty.
nfs_group Optional. This parameter specifies the NFS (Network File System)
group ID of the LocalDB account. Its value must be an integer
ranging from 0 to 65,535. The default value is 0.
nfs_account Optional. This parameter specifies the NFS (Network File System)
account of the LocalDB account. Its value must be an integer
ranging from 0 to 65,535. The default value is 0.
2000-2018 Array Networks, Inc.
All Rights Reserved. 62Chapter 4 AAA
custom_info1 Optional. This parameter specifies the customized user information
of the LocalDB account. Its value must be a string of 1 to 256
characters. The default value is empty.
custom_info2 Optional. This parameter specifies the customized user information
of the LocalDB account. Its value must be a string of 1 to 256
characters. The default value is empty.
custom_info3 Optional. This parameter specifies the customized user information
of the LocalDB account. Its value must be a string of 1 to 256
characters. The default value is empty.
custom_info4 Optional. This parameter specifies the customized user information
of the LocalDB account. Its value must be a string of 1 to 256
characters. The default value is empty.
custom_info5 Optional. This parameter specifies the customized user information
of the LocalDB account. Its value must be a string of 1 to 256
characters. The default value is empty.
no localdb account
This command is used to delete an existing LocalDB account.
show localdb account [account_name] [group_name] [start] [count] [column]
[index]
This command is used to display the specified LocalDB account.
account_name Optional. This parameter specifies a string to match the existing
LocalDB accounts. Its value must be a case-sensitive string of 1 to
64 characters.
If the parameter is specified, LocalDB accounts whose names
including this string will be displayed.
If the parameter is not specified, all LocalDB accounts will be
displayed.
The default value is empty.
group_name Optional. This parameter specifies the name of the LocalDB group
to which the LocalDB accounts to be displayed belongs to.
If this parameter is specified, only LocalDB accounts belong
to the LocalDB group will be displayed.
2000-2018 Array Networks, Inc.
All Rights Reserved. 63Chapter 4 AAA
If this parameter is not specified, the displayed LocalDB
accounts will not be filtered by the LocalDB group.
The default value is empty.
start Optional. This parameter specifies the start of LocalDB accounts
from which to be displayed. Its value must be an integer ranging
from 1 to 4,294,967,295 and the default value is 1.
count Optional. This parameter specifies the number of LocalDB accounts
to be displayed. Its value must be an integer ranging from 1 to
4,294,967,295. The default value is 0, indicating all LocalDB
accounts will be displayed.
column Optional. This parameter specifies the columns of a LocalDB
account entry to be displayed. This parameter supports the
following columns that must be represented by the letters in the
brackets in the parameter value: user_name(U), telephone(T),
e-mail(E), nfs_info(N), coutom_info1-5(C), assigned_group(G),
force_passwd_change(F), lockout_manual(M),
lockout_manual_expires_time(L), passwd_expire_time(P), ip(I),
netmask(K), and user_passwd(W). The parameter value is
case-sensitive and can support multiple columns. The default value
is “UTENC”.
index Optional. This parameter specifies how to sort the displayed
LocalDB accounts in the output. This parameter supports sorting
LocalDB accounts by: user_name (alphabetical or U),
create_time(time), telephone(T), e-mail(E),
coutom_info1-5(coutom_info1-5),
lockout_manual_expires_time(L), passwd_expire_time(P), ip(I), or
netmask(K). This parameter value is case-insensitive and the
default value is “alphabetical”.
clear localdb account
This command is used to delete all existing LocalDB accounts.
show statistics localdb account [account_name] [group_name]
This command is used to display the LocalDB account statistics.
account_name Optional. This parameter specifies a string to match the existing
LocalDB accounts. Its value must be a case-sensitive string of 1 to
64 characters.
2000-2018 Array Networks, Inc.
All Rights Reserved. 64Chapter 4 AAA
If this parameter is specified, LocalDB accounts statistics
whose account names including this string will be displayed.
If the parameter is not specified, the statistics of all LocalDB
accounts will be displayed.
The default value is empty.
group_name Optional. This parameter specifies the name of the LocalDB group
to which the LocalDB accounts to be displayed belongs to.
If this parameter is specified, only LocalDB account statistics
belongs to the LocalDB group will be displayed.
If this parameter is not specified, the displayed LocalDB
account statistics will not be filtered by the LocalDB group.
The default value is empty.
localdb update accountname
This command is used to change the name of the specified LocalDB account.
account_name This parameter specifies the original LocalDB account name.
new_account_name This parameter specifies the new account name for the LocalDB
account. Its value must be a string of 1 to 64 characters.
localdb update password
This command is used to change the password of the specified LocalDB account. If the command
“localdb passwdqc oldpasswd” is configured, the new password must not be the same as the old
password.
account_name This parameter specifies the name of the LocalDB account.
new_password This parameter specifies the new password of the LocalDB account.
Its value must be a case-sensitive string of 1 to 32 characters
enclosed by double quotes. Only 0-9, a-z, A-Z, the space character
and some special printable ASCII characters such as ! @ # $ % ^ &
* ( ) _ - + = { } [ ] | \ / ? : ; ’ < > , . are allowed. The string cannot
contain any of the characters “ ~ `”.
LocalDB Group
localdb group [nfs_group]
This command is used to add a LocalDB group.
2000-2018 Array Networks, Inc.
All Rights Reserved. 65Chapter 4 AAA
group_name This parameter specifies the name of the LocalDB group. Its value
must be a case-sensitive string of 1 to 64 characters.
nfs_group Optional. This parameter specifies the name of the NFS file share
group. Its value must be an integer ranging from 0 to 65,535. The
default value is 0.
no localdb group
This command is used to delete a specified LocalDB group.
show localdb group [group_name] [account_name] [start] [count] [column]
[index]
This command is used to display the specified LocalDB group.
group_name Optional. This parameter specifies a string to match the existing
LocalDB groups. Its value must be a case-sensitive string of 1 to 64
characters.
If this parameter is specified, the LocalDB groups whose
names including the string will be displayed.
If this parameter is not specified, all LocalDB groups will be
displayed.
The default value is empty.
account_name Optional. This parameter specifies the name of the LocalDB
account.
If this parameter is specified, only LocalDB groups including
the specified LocalDB accounts will be displayed.
If this parameter is not specified, the displayed LocalDB
groups will not be filtered by the LocalDB account.
The default value is empty.
start Optional. This parameter specifies the start of LocalDB groups
from which to be displayed. Its value must be an integer ranging
from 1 to 4,294,967,295. The default value is 1.
count Optional. This parameter specifies the number of LocalDB groups
to be displayed. Its value must be an integer ranging from 1 to
4,294,967,295. The default value is 0, indicating all LocalDB
accounts will be displayed.
2000-2018 Array Networks, Inc.
All Rights Reserved. 66Chapter 4 AAA
column Optional. This parameter specifies the columns of a LocalDB group
entry to be displayed. This parameter supports the following
columns that must be represented by the letters in the brackets in
the parameter value: user_name(U), telephone(T), e-mail(E),
nfs_info(N), coutom_info1-5(C), assigned_group(G),
force_passwd_change(F), lockout_manual(M),
lockout_manual_expires_time(L), passwd_expire_time(P), ip(I),
netmask(K), and user_passwd(W). The parameter value is
case-sensitive and can support multiple columns. The default value
is “UTENC”.
index Optional. This parameter specifies how to sort the displayed
LocalDB groups in the output. This parameter supports sorting
LocalDB groups by: user_name (alphabetical or U),
create_time(time), telephone(T), e-mail(E),
coutom_info1-5(coutom_info1-5),
lockout_manual_expires_time(L), passwd_expire_time(P), ip(I) or
netmask(K). This parameter value is case-insensitive and the
default value is “alphabetical”.
clear localdb group
This command is used to delete all existing LocalDB groups.
localdb update groupname
This command is used to change the name of an existing LocalDB group.
group_name This parameter specifies the original name of the LocalDB group.
Its value must be a string of 1 to 64 characters.
new_groupname This parameter specifies the new name of the LocalDB group. Its
value must be a string of 1 to 64 characters.
localdb member
This command is used to associate an existing LocalDB account with an existing LocalDB group.
One LocalDB account can be associated with 20 LocalDB groups.
group_name This parameter specifies the name of the LocalDB group. Its value
must be a string of 1 to 64 characters.
account_name This parameter specifies the name of the LocalDB account. Its
value must be a string of 1 to 64 characters.
no localdb member
2000-2018 Array Networks, Inc.
All Rights Reserved. 67Chapter 4 AAA
This command is used to disassociate an existing LocalDB account from an existing LocalDB
group.
show localdb member account [account_name]
This command is used to display the associations of LocalDB groups with the specified LocalDB
account. If the “account_name” parameter is not specified, all associations between LocalDB
groups and accounts in the LocalDB will be displayed.
show localdb member group [group_name]
This command is used to display the associations of LocalDB accounts with the specified
LocalDB group. If the “group_name” parameter is not specified, all associations between
LocalDB groups and accounts in the LocalDB will be displayed.
clear localdb member [group_name]
This command is used to disassociate all LocalDB accounts from the specified LocalDB group. If
the “group_name” parameter is not specified, all LocalDB accounts are disassociated with all
LocalDB groups.
show statistics localdb group [group_name] [account_name]
This command is used to display the LocalDB group statistics.
group_name Optional. This parameter specifies a string to match the existing
LocalDB groups. Its value must be a case-sensitive string of 1 to 64
characters.
If this parameter is specified, LocalDB group statistics whose
group names including the string will be displayed.
If this parameter is not specified, the statistics of all LocalDB
groups will be displayed.
The default value is empty.
account_name Optional. This parameter specifies the name of the LocalDB
account.
If this parameter is specified, only LocalDB group statistics
including the specified LocalDB accounts will be displayed.
If this parameter is not specified, the displayed LocalDB group
statistics will not be filtered by the LocalDB account.
The default value is empty.
LocalDB Account Password Settings
localdb passwdqc length [length]
2000-2018 Array Networks, Inc.
All Rights Reserved. 68Chapter 4 AAA
This command is used to enable the password checking policy requiring a minimum password
length. By default, this policy is disabled. After this command is configured, to update the
password of the existing LocalDB account or create a new account, the length of the new
password must be greater than or equal to the value specified by the parameter “length”.
length Optional. This parameter specifies the minimum length of the
LocalDB account password. Its value must be an integer ranging
from1 to 32. The default value is 8.
no localdb passwdqc length
This command is used to disable the password checking policy requiring a minimum password
length.
localdb passwdqc upperchar
This command is used to enable the password checking policy requiring at least one upper-case
character in the LocalDB account password. By default, this policy is disabled. After this
command is configured, to update the password of the existing LocalDB account or create a new
account, the new password must include at least one upper-case letter.
no localdb passwdqc upperchar
This command is used to disable the password checking policy requiring at least one upper-case
letter in the LocalDB account password.
localdb passwdqc lowerchar
This command is used to enable the password checking policy requiring at least one lower-case
character in the LocalDB account password. By default, this policy is disabled. After this
command is configured, to update the password of the existing LocalDB account or create a new
account, the new password must include at least one lower-case character.
no localdb passwdqc lowerchar
This command is used to disable the password checking policy requiring at least one lower-case
letter in the LocalDB account password.
localdb passwdqc numchar
This command is used to enable the password checking policy requiring at least one numeric
character in the LocalDB account password. By default, this policy is disabled. After this
command is configured, to update the password of the existing LocalDB account or create a new
account, the new password must include at least one numeric character.
no localdb passwdqc numchar
This command is used to disable the password checking policy requiring at least one numeric
character in the LocalDB account password.
localdb passwdqc nonalphanum
2000-2018 Array Networks, Inc.
All Rights Reserved. 69Chapter 4 AAA
This command is used to enable the password checking policy requiring at least one
non-alphanumeric character in the LocalDB account password. By default, this policy is disabled.
After this command is configured, to update the password of the existing LocalDB account or
create a new account, the new password must include at least one non-alphanumeric character.
no localdb passwdqc nonalphanum
This command is used to disable the password checking policy requiring at least one
non-alphanumeric character in the LocalDB account password.
localdb passwdqc username
This command is used to enable the password checking policy requiring that the username cannot
be a subset of the password. By default, this policy is disabled. After this command is configured,
to update the password of the existing LocalDB account or create a new account, the new
password cannot include the account name.
no localdb passwdqc username
This command is used to disable the password checking policy requiring that the password cannot
be a subset of the username.
localdb passwdqc oldpasswd
This command is used to enable the password checking policy requiring that the new password
cannot be the same as the old password. By default, this policy is disabled. After this command is
configured, to update the password of the existing LocalDB account or create a new account, the
new password cannot be the same as the old password.
no localdb passwdqc oldpasswd
This command is used to disable the password checking policy requiring that the new LocalDB
account password cannot be the same as the old password.
localdb passwdqc minunique [unique_char]
This command is used to enable the password checking policy requiring that a minimum number
of unique characters included in the LocalDB account password. By default, this policy is disabled.
After this command is configured, to update the password of the existing LocalDB account or
create a new account, the new password must include a specified number (by the parameter
“unique_char”) of unique characters.
unique_char Optional. This parameter specifies the minimum number of unique
characters. Its value must be a number between 1 and 32. The
default value is 5.
no localdb passwdqc minunique
This command is used to disable the password checking policy requiring that a minimum number
of unique characters included in the LocalDB account password.
2000-2018 Array Networks, Inc.
All Rights Reserved. 70Chapter 4 AAA
localdb passwdqc all
This command is used to enable all the above password checking policies.
no localdb passwdqc all
This command is used to disable all the above password checking policies.
show localdb passwdqc
This command is used to display all the configured password checking policies.
clear localdb passwdqc
This command is used to clear all password checking policies.
localdb passwdexpire age [account_name] [duration] [mode]
This command is used to set the password expiration age for a specified LocalDB account.
account_name Optional. This parameter specifies the name of an existing LocalDB
account. The default value is empty, indicating the password
expiration age is set for all LocalDB accounts.
duration Optional. This parameter specifies the expiration age (counted from
the last password change) of the LocalDB account password in
seconds. Its value must be an integer ranging from 1 to
2,147,483,647. The default value is 99,999,999.
mode Optional. This parameter specifies the time to execute this
command. The parameter value must be empty or “repeat”. If this
parameter is empty, the LocalDB user will be asked to change the
password once and only when the password expiration age has
elapsed since the user changes the password last time. When this
parameter is set to “repeat”, the LocalDB user will be asked to
change the password every time the password expiration age has
elapsed after changing the password. The default value is empty.
no localdb passwdexpire age
This command is used to delete the password expiration age configuration for a specified
LocalDB account.
show localdb passwdexpire age [account_name] [mode]
This command is used to display the password expiration age configuration for a specified
LocalDB account. If the “account_name” parameter is not specified, the password expiration age
configuration for all LocalDB accounts will be displayed.
clear localdb passwdexpire age
2000-2018 Array Networks, Inc.
All Rights Reserved. 71Chapter 4 AAA
This command is used to delete the password expiration age configuration for all LocalDB
accounts.
localdb passwdexpire nextlogin [account_name]
This command is used to enable forcible password expiration upon next login for the specified
LocalDB account. The LocalDB user will be asked to change the password on next login. By
default, this function is disabled.
account_name Optional. This parameter specifies the name of an existing LocalDB
account. The default value is empty, indicating the forcible
password expiration upon next login for all LocalDB accounts will
be enabled.
no localdb passwdexpire nextlogin
This command is used to disable forcible password expiration upon next login for the specified
LocalDB account.
show localdb passwdexpire nextlogin [account_name]
This command is used to display the configuration of forcible password expiration upon next login
for the specified LocalDB account. If the “account_name” parameter is not specified, the
password configuration of expiration upon next login for all LocalDB accounts will be displayed.
clear localdb passwdexpire nextlogin
This command is used to delete the configuration of password expiration upon next login for all
LocalDB accounts.
LocalDB Lockout
localdb lockout auto idletime [idle_time] [duration]
This command is used to enable auto idle lockout for all LocalDB accounts. LocalDB accounts
will be locked out when the idle time is up. By default, this function is disabled.
idle_time Optional. This parameter specifies the idle time after which the
LocalDB account will be locked out, in seconds. Its value must be
integer ranging from 1 to 4,294,967,295. The default value is
99,999,999.
duration Optional. This parameter specifies the duration of the lockout, in
seconds. Its value must be an integer ranging from 0 to
4,294,967,295. If its value is set to “0”, then the LocalDB account
will remain locked out until being manually unlocked by using the
command “localdb lockout unlock [account_name]”. The default
value is 0.
2000-2018 Array Networks, Inc.
All Rights Reserved. 72Chapter 4 AAA
no localdb lockout auto idletime
This command is used to disable the auto idle lockout for all LocalDB accounts.
show localdb lockout auto idletime
This command is used to display the configuration of the auto idle lockout for all LocalDB
accounts.
localdb lockout auto loginfailure [failure_times] [duration]
This command is used to enable auto login failure lockout for all LocalDB accounts. LocalDB
accounts will be locked out after reaching the number of login failures specified by the parameter
“failure_times”. By default, this function is disabled.
failure_times Optional. This parameter specifies the number of login failures after
which the LocalDB account is locked out. Its value must be an
integer ranging from 1 to 65,535. The default value is 10.
duration Optional. This parameter specifies the duration of the lockout in
seconds. Its value must be an integer ranging from 0 to
4,294,967,295. The default value is 0, indicating that the LocalDB
account will remain locked out until being manually unlocked by
using the command “localdb lockout unlock [account_name]”.
no localdb lockout auto loginfailure
This command is used to disable auto login failure lockout for all LocalDB accounts.
show localdb lockout auto loginfailure
This command is used to display the configuration of auto login failure lockout for all LocalDB
accounts.
localdb lockout manual [account_name] [duration]
This command is used to manually lock out a specified LocalDB account for a specific duration.
After this command is configured, the specified LocalDB account will be locked out for a specific
duration.
account_name Optional. This parameter specifies the name of the account to be
locked out. The default value is empty, indicating all LocalDB
accounts will be locked out by default.
duration Optional. This parameter specifies the duration in seconds for
which the account will be locked out. Its value must be an integer
ranging from 0 to 4,294,967,295. If its value is set to “0”, the
LocalDB account will be locked out until being manually unlocked
by using the command “localdb lockout unlock [account_name]”.
2000-2018 Array Networks, Inc.
All Rights Reserved. 73Chapter 4 AAA
The default value is 0.
show localdb lockout manual [account_name]
This command is used to display the lockout duration of a specified LocalDB account. If the
“account_name” parameter is not specified, the lockout duration of all LocalDB accounts will be
displayed.
localdb lockout list [type] [username] [start] [count]
This command is used to display the currently locked LocalDB accounts.
type Optional. This parameter specifies the lockout type of the locked
LocalDB accounts to be displayed. Its value must only be:
“loginfailure”: indicates that the LocalDB accounts locked out
due to login failures will be displayed.
“idletime”: indicates that the LocalDB accounts locked out due
to idle timeout will be displayed.
“manual”: indicates that the LocalDB accounts locked out
manually by the administrator will be displayed.
“all”: indicates that the LocalDB accounts of all the preceding
three types will be displayed.
The default value is all.
username Optional. This parameter specifies a string to match the LocalDB
account. Its value must be a string of 1 to 64 characters. All locked
LocalDB accounts whose names including the string will be
displayed. If this parameter is not specified, locked accounts will
not be filtered by username.
start Optional. This parameter specifies the start of locked LocalDB
accounts to be displayed. Its value must be between 1 and
4,294,967,295. The default value is 1.
count Optional. This parameter specifies the number of locked LocalDB
accounts to be displayed. Its value must be an integer ranging from
0 to 4,294,967,295. The default value is 0, indicating all locked
LocalDB accounts matching the other parameter settings will be
displayed.
localdb lockout unlock [account_name]
This command is used to unlock a previously locked LocalDB account.
2000-2018 Array Networks, Inc.
All Rights Reserved. 74Chapter 4 AAA
account_name Optional. This parameter specifies the name of the LocalDB
account to be unlocked. The default value is empty, indicating all
locked LocalDB accounts will be unlocked.
show statistics localdb lockout [account_name]
This command is used to display the lockout statistics of a specified LocalDB account.
account_name Optional. This parameter specifies a string to match the account. All
LocalDB accounts including the string will be matched. If the
parameter “account_name” is not specified, the lockout statistics for
all LocalDB accounts will be displayed.
LocalDB Backup and Restoration
localdb backup
This command is used to back up the virtual site’s LocalDB. A maximum of 20 LocalDB backup
files can be configured in the system. If 20 LocalDB backup files already exist, to create new
LocalDB backup files, the old ones must be deleted.
backup_name This parameter specifies the name of the LocalDB backup. Its value
must be a string of 1 to 32 characters.
Note: For the MotionPro-type virtual site, this command will back up all the data in the
LocalDB including the MDM data but excluding the MDM CLI configurations.
no localdb backup
This command is used to delete the specified LocalDB backup file.
show localdb backup
This command is used to display the LocalDB backup files.
clear localdb backup
This command is used to delete all LocalDB backup files.
localdb autobackup [time] [dayofweek]
This command is used to configure the LocalDB auto-backup settings. If this command is not
configured, the default setting “localdb autobackup 3 0:00 0” will be used, which means to
automatically back up the LocalDB daily at 0:00 and at most three auto-backup files can be kept.
If three auto-backup files already exist, new auto-backup files will overwrite the old ones.
count This parameter specifies the number of auto-backup files to be kept
in the system. Its value must be an integer ranging from 0 to 5. If
the parameter is set to “0”, auto-backup will be turned off. When
2000-2018 Array Networks, Inc.
All Rights Reserved. 75Chapter 4 AAA
the count is exceeded, the oldest backup file would be overwritten.
time Optional. This parameter specifies the time for the auto-backup in
“HH:MM” (24-hour) format, for example, 6:23, 05:05, 23:59. The
default value is 0:00.
dayofweek Optional. This parameter specifies the day of the week for the
auto-backup. Its value must be an integer ranging from 0 to 7. The
default value is 0, indicating the LocalDB database will be backed
up on a daily basis.
If the parameter is set to “1” to “7”, the LocalDB database will be
backed up once a week, respectively from Monday to Sunday.
show localdb autobackup
This command is used to display the settings of the existing LocalDB auto-backup.
localdb restore
This command is used to restore LocalDB from the specified LocalDB backup.
backup_name This parameter specifies the name of the LocalDB backup database.
Its value must be a string of 1 to 32 characters.
LocalDB Export and Import
localdb export {account|group|member}
This command is used to export accounts, groups or member relations from the LocalDB database
into a configuration file on the system.
file_name This parameter specifies the name of the file on the system. Its
value must be a string of 1 to 32 characters.
account|group|member This parameter specifies the type of information to be exported. Its
value must only be “account”, “group” or “member”.
account: indicates that the account information, such as the
username, password, creation time and so on, will be exported.
group: indicates that the group information, such as the group
name, expiration time, creation time and so on, will be
exported.
member: indicates that only the account and group name will
be exported.
2000-2018 Array Networks, Inc.
All Rights Reserved. 76Chapter 4 AAA
Note: The files exported from LocalDB directly are in the UTF-8 encoding format. To
read or edit the exported file, make sure that your file viewer or editor supports UTF-8
encoding.
no localdb export {account|group|member}
This command is used to delete the configuration file exported from the LocalDB database.
show localdb export {account|group|member}
This command is used to display the configuration of accounts, groups or member relations
exported from the LocalDB database.
clear localdb export {account|group|member}
This command is used to delete all configurations of accounts, groups or member relations
exported from the LocalDB database.
localdb netexport scp {account|group|member}
This command is used to export a file containing accounts, groups or member relations to an SCP
server.
account|group|member This parameter specifies the type of information to be exported. Its
value must only be “account”, “group” or “member”.
account: indicates that the account information, such as the
username, password, creation time and so on, will be exported.
group: indicates that the group information, such as the group
name, the expiration time, creation time and so on, will be
exported.
member: indicates that only the account and group name will
be exported.
server_name This parameter specifies the name of the server to which data will
be exported. Its value must be a string of 1 to 128 characters.
user_name This parameter specifies the name of the remote user on the SCP
server. Its value must be a string of 1 to 64 characters.
file_path This parameter specifies the path, which must include the file name,
to export the file on the SCP server. Its value must be a string of 1
to 256 characters.
2000-2018 Array Networks, Inc.
All Rights Reserved. 77Chapter 4 AAA
Note: The files exported via SCP are in the UTF-8 encoding format. To read or edit the
exported file, make sure that your file viewer or editor supports UTF-8 encoding.
localdb netexport tftp {account|group|member}
This command is used to export a file containing accounts, groups or member relations to a TFTP
server.
account|group|member This parameter specifies the type of information to be exported. Its
value must only be “account”, “group” or “member”.
account: indicates that the account information, such as the
username, password, creation time and so on, will be exported.
group: indicates that the group information, such as the group
name, the expiration time, creation time and so on, will be
exported.
member: indicates that only the account and group name will
be exported.
ip This parameter specifies the IP address of the TFTP server.
file_name This parameter specifies the name of the file to export data on the
TFTP server. Its value must be a string of 1 to 256 characters.
Note: The files exported via TFTP are in the UTF-8 encoding format. To read or edit the
exported file, make sure that your file viewer or editor supports UTF-8 encoding.
localdb import {account|group|member} [overwrite|ignore]
This command is used to import a file containing accounts, groups or member relations into
LocalDB from the system.
file_name This parameter specifies the name of the file to be imported into
LocalDB. Its value must be a string of 1 to 127 characters.
account|group|member This parameter specifies the type of information to be imported. Its
value must only be “account”, “group” or “member”.
account: indicates that the account information, such as the
username, password, creation time and so on, will be imported.
group: indicates that the group information, such as the group
name, expiration time, creation time and so on, will be
imported.
member: indicates that only the account and group name will
2000-2018 Array Networks, Inc.
All Rights Reserved. 78Chapter 4 AAA
be imported.
overwrite|ignore Optional. This parameter specifies how to handle the conflicted
duplicate data. Its value must only be:
overwrite: The duplicate data will be merged with the existing
data.
ignore: The duplicate data will not be imported.
If this parameter is not specified, the administrator must execute
this command based on the CLI prompt.
Note: The files imported to LocalDB directly must be in the UTF-8 encoding format.
Otherwise, the importing might fail.
localdb netimport http {account|group|member} {overwrite|ignore}
This command is used to import a file containing accounts, groups or member relations from an
HTTP resource.
account|group|member This parameter specifies the type of information to be imported. Its
value must only be “account”, “group” or “member”.
account: indicates that the account information, such as the
username, password, creation time and so on, will be exported.
group: indicates that the group information, such as the group
name, expiration time, creation time and so on, will be
exported.
member: indicates that only the account and group name will
be exported.
url This parameter specifies the URL of the HTTP resource. Its value
must be a string of 1 to 64 characters.
overwrite|ignore This parameter specifies how to handle the conflicted duplicate
data. Its value must be “overwrite” and “ignore”.
overwrite: The duplicate data will be merged with the existing
data.
ignore: The duplicate data will not be imported.
Note: The files imported via SCP must be in the UTF-8 encoding format. Otherwise, the
importing might fail.
2000-2018 Array Networks, Inc.
All Rights Reserved. 79Chapter 4 AAA
localdb netimport scp {account|group|member}
{overwrite|ignore}
This command is used to import a file containing accounts, groups or member relations from an
SCP server.
account|group|member This parameter specifies the type of information to be imported. Its
value must only be “account”, “group” or “member”.
account: indicates that the account information, such as the
username, password, creation time and so on, will be imported.
group: indicates that the group information, such as the group
name, expiration time, creation time and so on, will be
imported.
member: indicates that only the account and group name will
be imported.
server_name This parameter specifies the name of the server from which data
will be imported. Its value must be a string of 1 to 127 characters.
user_name This parameter specifies the name of the remote user on the SCP
server. Its value must be a string of 1 to 64 characters.
file_path This parameter specifies the path, which must include the file name,
to import the file from the SCP server. Its value must be a string of
1 to 256 characters.
overwrite|ignore This parameter specifies how to handle the conflicted duplicate
data. Its value must be “overwrite” and “ignore”.
overwrite: The duplicate data will be merged with the existing
data.
ignore: The duplicate data will not be imported.
Note: The files imported via SCP must be in the UTF-8 encoding format. Otherwise, the
importing might fail.
localdb netimport tftp {account|group|member}
{overwrite|ignore}
This command is used to import a file containing accounts, groups or member relations from a
TFTP server.
account|group|member This parameter specifies the type of information to be imported. Its
2000-2018 Array Networks, Inc.
All Rights Reserved. 80Chapter 4 AAA
value must only be “account”, “group” or “member”.
account: indicates that the account information, such as the
username, password, creation time and so on, will be imported.
group: indicates that the group information, such as the group
name, expiration time, creation time and so on, will be
imported.
member: indicates that only the account and group name will
be imported.
ip This parameter specifies the IP address of the TFTP server.
file_name This parameter specifies the name of the file to import data from on
the TFTP server. Its value must be a string of 1 to 256 characters.
overwrite|ignore This parameter specifies how to handle conflict, e.g., duplicate data.
Its value must be “overwrite” and “ignore”.
overwrite: The duplicate data will be merged with the existing
data.
ignore: The duplicate data will not be imported.
Note: The files imported via TFTP must be in the UTF-8 encoding format. Otherwise,
the importing might fail.
LocalDB IP
localdb ip account
This command is used to set a fixed IP address for the specified LocalDB account. After the fixed
IP address is set for the specified LocalDB account:
For users accessing the backend resources through the L3VPN tunnel, the system will assign
the fixed IP address to the LocalDB account while ignoring the IP address assignment by the
Netpool authorized to the LocaDB account.
For users accessing the backend resources through the Site2Site VPN tunnel, the system will
assign the fixed IP address (tunnel IP) to the LocalDB account.
account_name This parameter specifies the name of the LocalDB account.
ip_address This parameter specifies the IP address assigned to the LocalDB
account. Its value must be given in dotted decimal notation.
netmask This parameter specifies the netmask of subnet to which the IP
2000-2018 Array Networks, Inc.
All Rights Reserved. 81Chapter 4 AAA
address belongs. Its value must be given in dotted decimal notation.
no localdb ip account
This command is used to delete the fixed IP address set for the specified LocalDB account.
show localdb ip account
This command is used to display the fixed IP address set for the specified LocalDB account.
LocalDB SSO
localdb sso account
[sso_domain]
This command is used to configure an application login credential for the specified LocalDB
account in the LocalDB server.
account_name This parameter specifies the LocalDB account name. Its value must
be a string of 1 to 64 characters.
sso_account This parameter specifies the account name of the application login
credential used for Application SSO. Its value must be a string of 1
to 64 characters.
sso_passwd This parameter specifies the password of the application login
credential used for Application SSO. Its value must be a string of 1
to 64 characters. Only 0-9, a-z, A-Z and printable ASCII characters
are allowed.
sso_domain Optional. This parameter specifies the domain or workgroup used
for Application SSO. Its value must be a string of 1 to 256
characters. By default, this parameter is not specified.
Note:
The portal login username must be the same as the LocalDB account username
associated with the application login credential.
If the Application SSO function is enabled for DesktopDirect applications, the
administrator needs to associate the DesktopDirect resources with the application
login name used for Application SSO instead of the binding LocalDB account using
the command “art desktop assign user” or “art application associate user”.
no localdb sso account
This command is used to delete the application login credential configured for the specified
LocalDB account.
2000-2018 Array Networks, Inc.
All Rights Reserved. 82Chapter 4 AAA
show localdb sso account
This command is used to display the application login credential configured for the specified
LocalDB account.
LocalDB Status
show localdb config
This global command is used to display all LocalDB configurations for a particular virtual site.
show localdb config
This command is used to display all LocalDB configurations of the virtual site.
LocalDB Statistics
show statistics aaa
This command is used to display the AAA statistics of the virtual site.
show statistics aaa [virtual_site]
This global command is used to display the AAA statistics of the specified virtual site. If the
parameter “virtual_site” is not specified, the AAA statistics of all virtual sites will be displayed.
clear statistics aaa
This command is used to delete the AAA statistics of the virtual site.
clear statistics aaa [virtual_site]
This global command is used to delete the AAA statistics of the specified virtual site. If the
parameter “virtual_site” is not specified, the AAA statistics of all virtual sites will be deleted.
LDAP
aaa server ldap host
[index] [tls_flag]
This command is used to configure an LDAP host for the specified LDAP server. A maximum of
three LDAP hosts can be configured for one LDAP server.
ldap_server_name This parameter specifies the name of an existing LDAP server. Its
value must be a string of 1 to 32 characters.
ip This parameter specifies the IP address of the LDAP host. Its value
must be an IPv4 address.
port This parameter specifies the port of the LDAP host. Its value must
be an integer ranging from 1 to 65,535.
2000-2018 Array Networks, Inc.
All Rights Reserved. 83Chapter 4 AAA
username This parameter specifies the username of the LDAP server
administrator. Its value must be a string of 1 to 127 characters.
password This parameter specifies the password of the LDAP server
administrator.
base_dn This parameter specifies the Distinguished Name (DN) of the
LDAP entry at which to start the search for users. Its value must be
a string of 1 to 900 characters.
timeout This parameter specifies the timeout value of the search in seconds.
Its value must be an integer ranging from 1 to 65,535.
index Optional. This parameter specifies the host index. Its value must be
1, 2 or 3. The default value is 1.
tls_flag Optional. This parameter specifies whether to access the LDAP
server over the TLS protocol. Its value must be:
“tls”: indicates that the LDAP server is accessed over the TLS
protocol.
empty: indicates the LDAP server is not accessed over the
TLS protocol.
The default value is empty.
no aaa server ldap host
This command is used to delete an LDAP host of the specified LDAP server.
show aaa server ldap host
This command is used to display the LDAP server host(s) configured for the specified LDAP
server.
aaa server ldap idletime [idle_time]
This command is used to set the idle timeout value for the specified LDAP server. The connection
to the LDAP server will be terminated when the connection is idle for the specified timeout value.
ldap_server_name This parameter specifies the name of an existing LDAP server.
idle_time Optional. This parameter specifies the idle timeout value in
seconds. Its value must be an integer ranging from 60 to 3000. The
default value is 600.
2000-2018 Array Networks, Inc.
All Rights Reserved. 84Chapter 4 AAA
no aaa server ldap idletime
This command is used to delete the idle timeout setting of the specified LDAP server.
show aaa server ldap idletime
This command is used to display the idle timeout value configured for the specified LDAP server.
aaa server ldap searchfilter
This command is used to configure a search filter for the specified LDAP server. The search filter
plays an important role in authenticating and authorizing users through LDAP. For the functions
of the search filter in static and dynamic binding, please refer to the commands “aaa server ldap
bind dynamic” and “aaa server ldap bind static”.
ldap_server_name This parameter specifies the name of an existing LDAP server.
filter_string This parameter specifies a filter string used to search for the LDAP
entries. Its value must be a string of 1 to 80 characters enclosed by
double quotes.
The filter string consists of:
attribute: Common Name (cn), Distinguished Name (dn), User
Id (uid), Organization Unit (ou) and so on.
comparison operator: “>”, “<” or “=”.
logical operator: “& (and),” “| (or)”, “! (not)”, “= (equal to)”,
or “* (any)”.
Please refer to the RFC for details of the LDAP filter string.
The filter string can contain at most three tokens represented by
“”, which is case-insensitive. For example, if the
“filter_string” parameter is set to “cn=”, the system will
generate a search filter by replacing “” with an end user’s
real username upon receiving authentication or authorization
requests.
Note: If this command is not configured for the specified LDAP server, AAA uses
“uid=” as the default search filter string.
For example:
Search an entry with cn being the real username:
vs(config)aaa server ldap searchfilter ldap1 "cn="
Search an entry without cn being the real username:
2000-2018 Array Networks, Inc.
All Rights Reserved. 85Chapter 4 AAA
vs(config)aaa server ldap searchfilter ldap1 "(!(cn=))"
Search an entry with objectClass being Person and with sn being the real username or cn being a
value containing the real username:
vs(config)aaa server ldap searchfilter ldap1
"(&(objectClass=Person)(|(sn=)(cn=*)))"
no aaa server ldap searchfilter
This command is used to delete the search filter configured for the specified LDAP server.
show aaa server ldap searchfilter
This command is used to display the search filter configured for the specified LDAP server.
aaa server ldap attribute group
This command is used to specify the attribute used to obtain the external LDAP group of the user
from the LDAP entry for the specified LDAP server.
ldap_server_name This parameter specifies the name of an existing LDAP server.
attribute This parameter specifies the name of the attribute used to obtain the
external LDAP group of the user from the LDAP entry. Its value
must be a string of 1 to 80 characters.
no aaa server ldap attribute group
This command is used to delete the configuration of the attribute used to obtain the external LDAP
group from the LDAP entry for the specified LDAP server.
show aaa server ldap attribute group
This command is used to display the configuration of the attribute used to obtain the external
LDAP group from the LDAP entry for the specified LDAP server.
aaa server ldap attribute phonenumber
This command is used to specify the attribute used to obtain the mobile phone number of the user
from the LDAP entry for the specified LDAP server.
ldap_server_name This parameter specifies the name of an existing LDAP server.
attribute This parameter specifies the name of the attribute used to obtain the
mobile phone number of the user from the LDAP entry. Its value
must be a string of 1 to 80 characters.
no aaa server ldap attribute phonenumber
2000-2018 Array Networks, Inc.
All Rights Reserved. 86Chapter 4 AAA
This command is used to delete the configuration of the attribute used to obtain the mobile phone
number of the user from the LDAP entry for the specified LDAP server.
show aaa server ldap attribute phonenumber
This command is used to display the configuration of the attribute used to obtain the mobile phone
number of the user from the LDAP entry for the specified LDAP server.
aaa server ldap attribute defaultgroup
This command is used to configure the default group assigned to authenticated users for whom no
LDAP group is obtained for the specified LDAP server.
ldap_server_name This parameter specifies an existing name of the LDAP server.
group This parameter specifies the default group name for the user for
whom no LDAP group is obtained. Its value must be a string of 1 to
80 characters.
no aaa server ldap attribute defaultgroup
This command is used to delete the configuration of the default group assigned to authenticated
users for whom no LDAP group is obtained for the specified LDAP server.
show aaa server ldap attribute defaultgroup
This command is used to display the configuration of the default LDAP group assigned to
authenticated users for whom no LDAP group is obtained for the specified LDAP server.
aaa server ldap bind dynamic
This command is used to enable the “dynamic” LDAP bind mode for the specified LDAP server.
In this case, AAA will fetch the DN from the LDAP server first.
After the “dynamic” LDAP bind mode is enabled, AAA sends a bind request containing the end
user’s username and password to the LDAP server and then a search request containing the search
filter string configured by the command “aaa server ldap searchfilter” to obtain the LDAP entry
of the end user. Then AAA sends the DN obtained from the LDAP entry together with the
password of the end user in another bind request to the LDAP server. After the end user passes the
authentication, AAA reuses the obtained LDAP entry to authorize the end user.
ldap_server_name This parameter specifies the name of an existing LDAP server.
no aaa server ldap bind dynamic
This command is used to disable the “dynamic” LDAP bind mode for the specified LDAP server.
aaa server ldap bind static
This command is used to enable the “static” LDAP bind mode for the specified LDAP server. In
this case, the system will construct the user’s DN by concatenating the strings
2000-2018 Array Networks, Inc.
All Rights Reserved. 87Chapter 4 AAA
“”. is the username used to log into the virtual site.
“” and “”must be the same for all users using the same virtual site.
After the “static” LDAP bind mode is enabled, AAA sends the DN
() together with the password of the end user in a bind request to
the LDAP server. After the end user passes the authentication, AAA sends a search request
containing the search filter string configured by the command “aaa server ldap searchfilter” to
obtain the LDAP entry of this end user. Then, it authorizes the end user based on the obtained
LDAP entry.
ldap_server_name This parameter specifies the name of an existing LDAP server.
dn_prefix This parameter specifies the DN prefix extracted from the LDAP
server. Its value must be a string of 1 to 80 characters.
dn_suffix This parameter specifies the DN suffix extracted from the LDAP
server. Its value must be a string of 1 to 80 characters.
For example:
vs(config)aaa server ldap bind static "AD" "cn=" ",ou=array,dc=spxad,dc=cn"
no aaa server ldap bind static
This command is used to disable the “static” LDAP bind mode for the specified LDAP server.
show aaa server ldap bind
This command is used to display the configuration of the LDAP bind mode for the specified
LDAP server.
Note: The “static” and “dynamic” LDAP bind function cannot be enabled at the same
time.
aaa server ldap pwdexpirewarning
This command is used to configure password expiry warning, that is, configure whether and when
to display a password expiry warning message on the welcome page for the specified LDAP
server. After this command is configured, if the remaining valid time of the LDAP user’s
password is equal to or less than the value of the “password_expiry_warning” parameter at user
login, a password expiry warning message will be displayed on the welcome page. If this
command is not configured, no password expiry warning message will be displayed on the
welcome page.
ldap_server_name This parameter specifies the name of the existing LDAP server.
2000-2018 Array Networks, Inc.
All Rights Reserved. 88Chapter 4 AAA
password_expiry_warning This parameter specifies the time in seconds that a warning
message will be displayed on the welcome page preceding to the
user’s LDAP password expiry. Its value must be an integer ranging
from 1 to 1,209,600.
Note:
Before using the LDAP password change function, please make sure that:
On related LDAP servers, the lifetime of LDAP passwords has been configured.
For the OpenLDAP server, the external default policy has been configured.
For the Windows Active Directory (AD) server, its system time must be the same as
the system time of the AG appliance.
On the AG appliance, the related Windows AD servers have been configured to use
port 636 and to be accessed using the TLS protocol.
no aaa server ldap pwdexpirewarning
This command is used to delete the configuration of the password expiry warning for the specified
LDAP server.
show aaa server ldap pwdexpirewarning
This command is used to display the configuration of the password expiry warning for the
specified LDAP server.
aaa server ldap pwdpolicy
This command is used to set the policy DN for the specified LDAP server when the LDAP server
is an OpenLDAP server.
Before configuring password expiry warning for the OpenLDAP server, you must execute this
command to set the policy DN first. Otherwise, the password expiry warning configuration will
not be accepted by the OpenLDAP server.
ldap_server_name This parameter specifies the name of an existing LDAP server. Its
value must be a string of 1 to 32 characters.
password_policy_DN This parameter specifies the policy DN. Its value must be a string of
1 to 32 characters and must be the same as the default policy DN
set on the OpenLDAP server.
For example:
vs(config)$ aaa server ldap pwdpolicy AD "cn=pwspolicy"
no aaa server ldap pwdpolicy
2000-2018 Array Networks, Inc.
All Rights Reserved. 89Chapter 4 AAA
This command is used to delete the configuration of the policy DN for the specified LDAP server.
show aaa server ldap pwdpolicy
This command is used to display the configuration of the policy DN for the specified LDAP
server.
aaa group in dn
This command is used to enable the function of extracting the DN as the user’s group. The
administrator can use the command to “aaa group regex” to define which part of the DN will be
extracted as the user’s group. By default, this function is disabled.
no aaa group in dn
This command is used to disable the function of extracting the DN as the user’s group.
aaa group regex
This command is used to define which part of the DN to be extracted as the user’s group.
expression This parameter specifies a regular expression that indicates the part
of the DN to be extracted as the user’s group. Its value must be a
string of 1 to 64 characters. The “()” meta-character is supported. At
most five “()” meta-characters can be configured.
For example,
vs(config)$ aaa group regex "OU=([^,]*), OU=([^,]*)"
If the DN is “OU=Information Department, OU=Users, OU=1025, DC=staff, DC=org”, the
“Information Department” and “Users” will be extracted respectively as two groups of the user.
LDAP Autosearch
aaa server ldap autosearch profile
This command is used to define an LDAP auto-search profile. A maximum of five LDAP
auto-search profiles can be configured for a virtual site.
profile_name This parameter specifies the name of the LDAP auto-search profile.
Its value must be a string of 1 to 32 characters.
no aaa server ldap autosearch profile
This command is used to delete the specified LDAP auto-search profile.
show aaa server ldap autosearch profile
This command is used to display all LDAP auto-search profiles.
aaa server ldap autosearch host
2000-2018 Array Networks, Inc.
All Rights Reserved. 90Chapter 4 AAA
This command is used to configure an LDAP host for the specified LDAP auto-search profile. The
LDAP host must be configured before the profile is enabled using the command “aaa server ldap
autosearch on ”.
profile_name This parameter specifies the name of an existing LDAP auto-search
profile.
ip This parameter specifies the IP address of the LDAP host. Its value
must be an IPv4 address.
port This parameter specifies the port of the LDAP host. Its value must
be an integer ranging from 1 to 65,535.
username This parameter specifies the username of the LDAP server
administrator.
password This parameter specifies the password of the LDAP server
administrator.
base_dn This parameter specifies the DN of the LDAP entry at which to start
the search for users. Its value must be a string of 1 to 900
characters.
timeout This parameter specifies the maximum timeout in seconds. Its value
must be an integer ranging from 1 to 65,535.
tls_flag Optional. This parameter specifies whether to access the LDAP
server over the TLS protocol. Its value must be:
“tls”: indicates that the LDAP server is accessed over the TLS
protocol.
empty: indicates the LDAP server is not accessed over the
TLS protocol.
The default value is empty.
no aaa server ldap autosearch host
This command is used to delete the LDAP host configured for the specified LDAP auto-search
profile.
show aaa server ldap autosearch host
This command is used to display the LDAP host configured for the specified LDAP auto-search
profile.
2000-2018 Array Networks, Inc.
All Rights Reserved. 91Chapter 4 AAA
aaa server ldap autosearch filter
This command is used to configure the search filter for the specified LDAP auto-search profile.
The search filter must be configured before the profile is enabled using the command “aaa server
ldap autosearch on ”.
This command is also used to modify the existing configuration of the search filter for the
specified LDAP auto-search profile.
profile_name This parameter specifies the name of the LDAP auto-search profile.
filter_string This parameter specifies a filter string used to filter the LDAP
entries. Its value must be a string of 1 to 128 characters, which must
be enclosed by double quotes.
Please refer to the command “aaa server ldap searchfilter” for
details of the parameter explanation.
no aaa server ldap autosearch filter
This command is used to delete the search filter configured for the specified LDAP auto-search
profile.
show aaa server ldap autosearch filter
This command is used to display the search filter configured for the specified LDAP auto-search
profile.
aaa server ldap autosearch attribute
This command is used to configure the LDAP attribute to be searched for the specified LDAP
auto-search profile. The LDAP attribute must be configured before the profile is enabled using the
command “aaa server ldap autosearch on ”.
This command is also used to modify the existing configuration of the LDAP attribute to be
searched for the specified LDAP auto-search profile.
profile_name This parameter specifies the name of an existing LDAP auto-search
profile.
search_attribute This parameter specifies the name of the LDAP attribute to be
searched. Its value must be a string of 1 to 32 characters.
no aaa server ldap autosearch attribute
This command is used to delete the configuration of the LDAP attribute to be searched for the
specified LDAP auto-search profile.
show aaa server ldap autosearch attribute
2000-2018 Array Networks, Inc.
All Rights Reserved. 92Chapter 4 AAA
This command is used to display the configuration of the LDAP attribute to be searched for the
specified LDAP auto-search profile.
aaa server ldap autosearch time daily
This command is used to configure a daily auto-search frequency for the specified LDAP
auto-search profile. By default, auto-search is performed on 0:00 daily for the LDAP auto-search
profile.
This command is also used to modify the existing configuration of the daily auto-search frequency
for the specified LDAP auto-search profile.
profile_name This parameter specifies the name of an existing LDAP auto-search
profile.
hour This parameter specifies the hour when the daily auto-search is
carried out. Its value must be an integer ranging from 0 to 23,
indicating the hour ranging from 0:00 to 23:00.
aaa server ldap autosearch time weekly
This command is used to configure a weekly auto-search frequency for the specified LDAP
auto-search profile.
This command is also used to modify the existing configuration of the weekly auto-search
frequency for the specified LDAP auto-search profile.
profile_name This parameter specifies the name of an existing LDAP auto-search
profile.
hour This parameter specifies the hour when the weekly auto-search is
carried out. Its value must be an integer ranging from 0 to 23,
indicating the hour ranging from 0:00 to 23:00.
day This parameter specifies the day when the weekly auto-search is
carried out. Its value must be “Monday”, “Tuesday”, “Wednesday”,
“Thursday”, “Friday”, “Sataurday” and “Sunday”, which is
case-insensitive.
aaa server ldap autosearch time monthly
This command is used to configure a monthly auto-search frequency for the specified LDAP
auto-search profile.
This command is also used to modify the existing configuration of the monthly auto-search
frequency for the specified LDAP auto-search profile.
2000-2018 Array Networks, Inc.
All Rights Reserved. 93Chapter 4 AAA
profile_name This parameter specifies the name of an existing LDAP auto-search
profile.
hour This parameter specifies the hour when the monthly auto-search is
carried out. Its value must be an integer ranging from 0 to 23,
indicating the hour ranging from 0:00 to 23:00.
date This parameter specifies the date when the monthly auto-search is
carried out. Its value must be an integer ranging from 1 to 31.
If a month does not have the specified date, such as 31 in June, the
search will not be carried out in this month.
no aaa server ldap autosearch time
This command is used to delete the setting of the auto-search frequency for the specified LDAP
auto-search profile.
show aaa server ldap autosearch time
This command is used to display the setting of auto-search frequency for the specified LDAP
auto-search profile.
aaa server ldap autosearch email
This command is used to configure the email address for the specified LDAP auto-search profile.
When the search result is different from the last search result, an email will be sent to the
configured email addresses to notify the administrators of the LDAP entry changes. A maximum
of five “aaa server ldap autosearch email” configurations are supported for every profile. This
command configuration is optional for every profile.
profile_name This parameter specifies the name of the LDAP auto-search profile.
email_address This parameter specifies the email address. Its value must be a
string of 1 to 128 characters enclosed by double quotes.
no aaa server ldap autosearch email
This command is used to delete the configuration of an email address for the specified LDAP
auto-search profile.
show aaa server ldap autosearch email
This command is used to display all the email addresses configured for the specified LDAP
auto-search profile.
aaa server ldap autosearch subject
2000-2018 Array Networks, Inc.
All Rights Reserved. 94Chapter 4 AAA
This command is used to configure the email subject for the specified LDAP auto-search profile.
The subject will be used for sending emails to all the email addresses of this profile. This
command configuration is optional for every profile.
profile_name This parameter specifies the name of the LDAP auto-search profile.
email_subject This parameter specifies the email subject. Its value must be a
string of 1 to 256 characters enclosed by double quotes.
no aaa server ldap autosearch subject
This command is used to delete the configuration of the email subject for the specified LDAP
auto-search profile.
show aaa server ldap autosearch subject
This command is used to display the email subject configured for the specified LDAP auto-search
profile.
aaa server ldap autosearch {on|off}
This command is used to enable or disable the specified LDAP auto-search profile. Before
enabling the LDAP auto-search profile, make sure that related LDAP auto-search configurations
have been made.
profile_name This parameter specifies the name of an existing LDAP auto-search
profile.
show aaa server ldap autosearch status
This command is used to display the status of the specified LDAP auto-search profile.
aaa server ldap autosearch update
This command is used to carry out a search immediately based on the specified LDAP auto-search
profile.
profile_name This parameter specifies the name of an exisiting LDAP
auto-search profile.
aaa server ldap autosearch result
This command is used to display the search results and result changes of the specified LDAP
auto-search profile.
profile_name This parameter specifies the name of an existing LDAP auto-search
profile.
aaa server ldap autosearch acknowledge
2000-2018 Array Networks, Inc.
All Rights Reserved. 95Chapter 4 AAA
This command is used to acknowledge the search result changes of the specified LDAP
auto-search profile.
profile_name This parameter specifies the name of an existing LDAP auto-search
profile.
RADIUS
aaa server radius host
[index] [accounting_port]
This command is used to configure a RADIUS host for a specified RADIUS server. A maximum
of three RADIUS hosts can be configured for one RADIUS server.
radius_server_name This parameter specifies the name of an existing RADIUS server.
Its value must be a string of 1 to 32 characters.
ip This parameter specifies the IP address of the RADIUS host. Its
value must be an IPv4 address.
authentication_port This parameter specifies the port number used for RADIUS
authentication. Its value must be an integer ranging from 1 to
65,535.
secret This parameter specifies the shared secret text string used by the
AG appliance and the RADIUS server to encrypt passwords and
exchange responses.
retries This parameter specifies the retry times to connect the RADIUS
server. Its value must be an integer ranging from 1 to 65,535.
timeout This parameter specifies the timeout value of the search in seconds.
Its value must be an integer ranging from 1 to 65,535.
index Optional. This parameter specifies the host index. Its value must be
1, 2 or 3. The default value is 1.
accounting_port Optional. This parameter specifies the port number used for
RADIUS accounting. Its value must be an integer ranging from 1 to
65535. The default value is 1813.
no aaa server radius host
This command is used to delete a RADIUS host configured for the specified RADIUS server.
2000-2018 Array Networks, Inc.
All Rights Reserved. 96Chapter 4 AAA
show aaa server radius host
This command is used to display the RADIUS host(s) configured for the specified RADIUS
server.
aaa server radius attribute group
This command is used to specify an attribute used to obtain the external RADIUS group of the
user from the RADIUS entry for the specified RADIUS server. Please note that individual
attributes may vary depending on the individual network requirements.
radius_server_name This parameter specifies the name of an existing RADIUS server.
attribute This parameter specifies the ID of the attribute used to obtain the
external RADIUS group of the user from the RADIUS entry. Its
value must be an integer ranging from 1 to 63. For details of each
attribute, please refer to the following list.
Please note that the attributes may vary depending on the individual
network requirements.
1 User-Name
2 User-Password
3 CHAP-Password
4 NAS-IP-Address
5 NAS-Port
6 Service-Type
7 Framed-Protocol
8 Framed-IP-Address
9 Framed-IP-Netmask
10 Framed-Routing
11 Filter-Id
12 Framed-MTU
13 Framed-Compression
14 Login-IP-Host
15 Login-Service
16 Login-TCP-Port
17 (unassigned)
2000-2018 Array Networks, Inc.
All Rights Reserved. 97Chapter 4 AAA
18 Reply-Message
19 Callback-Number
20 Callback-Id
21 (unassigned)
22 Framed-Route
23 Framed-IPX-Network
24 State
25 Class
26 Vendor Specific
27 Session Timeout
28 Idle-Timeout
29 Termination-Action
30 Called-Station-Id
31 Calling-Station-Id
32 NAS-Identifier
33 Proxy-State
34 Login-LAT-Service
35 Login-LAT-Node
36 Login-LAT-Group
37 Framed-AppleTalk-Link
38 Framed-AppleTalk-Network
39 Framed-AppleTalk-Zone
40-59 (rev. for accounting)
60 CHAP-Challenge
61 NAS-Port-Type
62 Port-Limit
63 Login-LAT-Port
Note: To modify the existing attribute, please delete the existing configuration using the
command “no aaa server radius attribute group” first.
2000-2018 Array Networks, Inc.
All Rights Reserved. 98Chapter 4 AAA
no aaa server radius attribute group
This command is used to delete the configuration of the attribute used to obtain the external
RADIUS group of the user from the RADIUS entry for the specified RADIUS server.
show aaa server radius attribute group
This command is used to display the configuration of the attribute used to obtain the external
RADIUS group of the user from the RADIUS entry for the specified RADIUS server.
aaa server radius attribute clientip
This command is used to specify the attribute used to obtain the VPN client IP and netmask of the
user from the RADIUS entry for the specified RADIUS server.
radius_server_name This parameter specifies the name of an existing RADIUS server.
attribute_ip This parameter specifies the ID of the attribute used to obtain the
VPN client IP of the user from the RADIUS entry for the specified
RADIUS server.
attribute_netmask This parameter specifies the ID of the attribute used to obtain the
VPN netmask of the user from the RADIUS entry for the specified
RADIUS server.
no aaa server radius attribute clientip
This command is used to delete the configuration of the attributes used to obtain the VPN client IP
and netmask of the user from the RADIUS entry for the specified RADIUS server.
show aaa server radius attribute clientip
This command is used to display the configuration of the attributes used to obtain the VPN client
IP and netmask of the user from the RADIUS entry for the specified RADIUS server.
aaa server radius attribute phonenumber
This command is used to specify the attribute used to obtain the mobile phone numbers of the user
from the RADIUS entry for the specified RADIUS server.
radius_server_name This parameter specifies the name of an existing RADIUS server.
attribute This parameter specifies the mobile phone numbers of users
extracted from the RADIUS server. Its value must be a string of 1
to 80 characters.
no aaa server radius attribute phonenumber
2000-2018 Array Networks, Inc.
All Rights Reserved. 99Chapter 4 AAA
This command is used to delete the attribute used to obtain the mobile phone number of the user
from the RADIUS entry for the specified RADIUS server.
show aaa server radius attribute phonenumber
This command is used to display the attribute used to obtain the mobile phone number of the user
from the RADIUS entry for the specified RADIUS server.
aaa server radius defaultgroup
This command is used to configure the default group assigned to authenticated users for whom no
RADIUS group is obtained for the specified RADIUS server.
radius_server_name This parameter specifies the name of an existing RADIUS server.
group This parameter specifies the default RADIUS group name. Its value
must be a string of 1 to 80 characters.
no aaa server radius defaultgroup
This command is used to delete the default group assigned to authenticated users for whom no
RADIUS group is obtained for the specified RADIUS server.
show aaa server radius defaultgroup
This command is used to display the default group assigned to authenticated users for whom no
RADIUS group is obtained for the specified RADIUS server.
aaa server radius nasip
This command is used to set the “NAS-IP-Address” (IP address of NAS, Network Access Server)
attribute in the RADIUS requests for the specified RADIUS server. If this command is not
configured, the system will select an available port IP address as the NAS IP address in the
sequence of “port1, port2, port3…”.
radius_server_name This parameter specifies the name of an existing RADIUS server.
nasip This parameter specifies the NAS IP address for the RADIUS
server. Its value must be an IPv4 address.
Note: The “NAS-IP-Address” attribute must be specified if only the bond or VLAN
interface is configured with the IP address but no system interface is configured with the IP
address on the AG appliance.
no aaa server radius nasip
This command is used to delete the setting of the “NAS-IP-Address” attribute for the specified
RADIUS server.
show aaa server radius nasip
2000-2018 Array Networks, Inc.
All Rights Reserved. 100Chapter 4 AAA
This command is used to display the setting of the “NAS-IP-Address” attribute for the specified
RADIUS server.
Certificate
aaa server certificate authenticate type
This command is used to set the Certificate server used for authentication and the authentication
type of the Certificate server.
cert_server_name This parameter specifies the name of an existing Certificate server
used for authentication.
authentication_type This parameter specifies the authentication type of the Certificate
server. Its value must be:
anonymous: indicates the system will only authenticate the
user’s SSL client certificate.
challenge: indicates the system will authenticate the user’s
SSL client certificate and validate that the username and
password of the user’s account exists on the LDAP or
LocalDB server assisting the Certificate server in
authentication.
nochallenge: indicates the system will authenticate the user’s
SSL client certificate and validate that the username of the
user’s account exists on the LDAP or LocalDB server assisting
the Certificate server in authentication.
Note: For the authentication types “challenge” and “nochallenge”, the administrator needs
to set the type of the AAA server assisting this Certificate server in authentication using
the “aaa server certificate authenticate server” command and configure other related
settings. For the authentication types “challenge”, after passing the certificate
authentication, the user will be directed to the challenge page, requiring the user to enter
the (username and) password. For details, please refer to the command “aaa server
certificate authenticate userid”.
no aaa server certificate authenticate type
This command is used to delete the configuration of the Certificate server used for authentication.
show aaa server certificate authenticate type
This command is used to display the configuration of the Certificate server used for
authentication.
2000-2018 Array Networks, Inc.
All Rights Reserved. 101Chapter 4 AAA
aaa server certificate anonymous
This command is used to set the certificate field used to obtain the username of the user account
from the certificate for the specified Certificate server used for authentication of the “anonymous”
type. If this command is not configured, the default username of the user account is “cert user”.
The value of the specified certificate field will be used as the account name of the user and will be
displayed on the portal welcome page when the user passes the certificate authentication.
cert_server_name This parameter specifies the name of an existing Certificate server.
cert_field This parameter specifies the certificate field used to obtain the
username of the user account from the certificate. Its value must be
a string of 1 to 256 characters and must be:
Standard certificate field names
All standard OIDs in the standard certificate fields (in the
format of x.x.x.x and must be enclosed by double quotes)
Standard extension OIDs in the extension field (in the format
of x.x.x.x and must be enclosed by double quotes)
Combination of the DN name and OID (in the format of
DN.OID)
Standard extension field names in the extension field (only
ext.subjectAltName and ext.issuerAltName).
For detailed description for the values of the “cert_field” parameter,
please refer to the command “aaa server certificate
externalgroup”.
The following table describes the values of the “cert_field” parameter in detail.
Value Description
The “cert_field” parameter supports the following standard
certificate field names:
subject and
subject.cn/c/o/ou/st/l/emailaddress/pseudonym/title/sn/name/s
urname/givenname/initials/dnqualifier/gq/dn/dc (certificate’s
Standard certificate field subject field)
names
issuer and
issuer.cn/c/o/ou/st/l/emailaddress/pseudonym/title/sn/name/su
rname/givenname/initials/dnqualifier/gq/dc (certificate’s
issuer field)
serial (certificate’s serial number field)
2000-2018 Array Networks, Inc.
All Rights Reserved. 102Chapter 4 AAA
Value Description
notbefore (certificate’s not before field)
notafter (certificate’s not after field)
commonname (certificate’s common name field, same as the
subject.cn)
validity (certificate’s validity field)
publickey (certificate’s public key field)
All standard OIDs in the
OIDs for the standard certificate field names
standard certificate fields
The “cert_field” parameter supports the following standard
extension OIDs enclosed by double quotes:
2.5.29.35
2.5.29.14
2.5.29.15
2.5.29.32
2.5.29.33
2.5.29.17
Standard extension OIDs in 2.5.29.18
the extension field
2.5.29.9
2.5.29.19
2.5.29.30
2.5.29.36
2.5.29.37
2.5.29.31
2.5.29.54
2.5.29.46
The “cert_field” parameter supports the following combinations of
the DN name and OID:
subject.oid: for example, subject.1.2.840.113549.1.9.1
Combination of the DN
indicates the OID 1.2.840.113549.1.9.1 (email address) in the
name and OID
certificate’s subject field.
issuer.oid: for example, issuer.1.2.840.113549.1.9.1 indicates
the OID 1.2.840.113549.1.9.1 (email address) in the
2000-2018 Array Networks, Inc.
All Rights Reserved. 103Chapter 4 AAA
Value Description
certificate’s issuer field.
ext.oid: for example, ext.2.5.29.35 indicates the OID
2.5.29.35 in the certificate’s extension field.
oid.oid: for example, oid.2.5.29.17 indicates the OID
2.5.29.17 in the entire certificate’s To Be Signed (TBS) part.
The “cert_field” parameter supports only the following two
standard extension field names:
Standard extension field
names in the extension field ext.subjectAltName
ext.issuerAltName
no aaa server certificate anonymous
This command is used to delete the configuration of the certificate field used to obtain the
username of the user account from the certificate for the specified Certificate server used for
authentication of the “anonymous” type.
show aaa server certificate anonymous
This command is used to display the configuration of the certificate field used to obtain the
username of the user account from the certificate for the specified Certificate server used for
authentication of the “anonymous” type.
aaa server certificate authenticate userid
This command is used to set the user ID action for the specified Certificate server whose
authentication type is “challenge”. When this command is not configured, the username text box
will not be displayed for the user to enter the username on the Certificate challenge page. The
value of the certificate field specified by the command “aaa server certificate ldap search” or
“aaa server certificate localdb search” will be used as the username.
This command is also used to modify the existing configuration of the user ID action of the
specified Certificate server used for authentication.
cert_server_name This parameter specifies the name of an existing Certificate server
whose authentication type is “challenge”.
id_action This parameter specifies the user ID action for the Certificate
server. Its value must be:
showid: indicates that the username text box will be displayed
on the Certificate challenge page and the value of the
certificate field specified by the command “aaa server
certificate ldap search” or “aaa server certificate localdb
search” is displayed as the username.
2000-2018 Array Networks, Inc.
All Rights Reserved. 104Chapter 4 AAA
getid: indicates that the username text box will be displayed on
the Certificate challenge page and the user needs to enter the
username manually.
no aaa server certificate authenticate userid
This command is used to delete the configuration of the user ID action for the specified Certificate
server whose authentication type is “challenge”.
show aaa server certificate authenticate userid
This command is used to display the configuration of the user ID action for the specified
Certificate server whose authentication type is “challenge”.
aaa server certificate authenticate server
This command is used to set the type of the AAA server assisting the specified Certificate server
in authentication. This command needs to be configured only when the authentication type of the
Certificate server is “challenge” or “nochallenge”.
cert_server_name This parameter specifies the name of an existing Certificate server
used for authentication.
server_type This parameter specifies the type of the AAA server assisting the
Certificate server for authentication. Its value must be:
localdb: indicates that the virtual site’s LocalDB server will
assist the Certificate server in authentication.
ldap: indicates that the LDAP server specified by the “aaa
server certificate ldap serverid” command will assist the
Certificate server in authentication.
no aaa server certificate authenticate server
This command is used to delete the configuration of the type of the AAA server assisting the
specified Certificate server in authentication.
show aaa server certificate authenticate server
This command is used to display the configuration of the type of the AAA server assisting the
specified Certificate server in authentication.
aaa server certificate ldap serverid
This command is used to set the LDAP server used to assist the specified Certificate server in
authentication or authorization.
2000-2018 Array Networks, Inc.
All Rights Reserved. 105Chapter 4 AAA
cert_server_name This parameter specifies the name of an existing Certificate server.
ldap_server_name This parameter specifies the name of an existing LDAP server.
no aaa server certificate ldap serverid
This command is used to delete the configuration of the LDAP server used to assist the specified
Certificate server in authentication or authorization.
show aaa server certificate ldap serverid
This command is used to display the configuration of the LDAP server used to assist the specified
Certificate server in authentication or authorization.
aaa server certificate ldap search
[user_id]
This command is used to configure the search filter for the specified Certificate server using an
LDAP server to assist in authentication or authorization.
When the authentication type of the Certificate server is “nochallenge” or “challenge”, the LDAP
attribute specified by the “ldap_attribute” parameter and the value of the certificate field specified
by the “cert_field” parameter in the client certificate will constitute the search filter. For the
authentication type “nochallenge”, if any LDAP entry on the LDAP server matches this search
filter, the user passes the authentication and the value of the certificate field specified by the
“cert_field” parameter in the client certificate will be displayed as the username in the portal
welcome page. For the authentication type “challenge”, if any LDAP entry on the LDAP server
matches this search filter and the username and password on the Certificate challenge page, the
user passes the authentication and the value of the LDAP attribute specified by the “user_id”
parameter in the retrieved LDAP entry will be displayed as the username in the portal welcome
page.
cert_server_name This parameter specifies the name of an existing Certificate server.
cert_field This parameter specifies the certificate field used to obtain the
username of the user account from the certificate. Its value must be
a string of 1 to 256 characters. Its value must be:
Standard certificate field names
All standard OIDs in the standard certificate fields (in the
format of x.x.x.x and must be enclosed by double quotes)
Standard extension OIDs in the extension field (in the format
of x.x.x.x and must be enclosed by double quotes)
Combination of the DN name and OID (in the format of
DN.OID)
2000-2018 Array Networks, Inc.
All Rights Reserved. 106Chapter 4 AAA
Standard extension field names in the extension field (only
ext.subjectAltName and ext.issuerAltName).
For detailed description for the values of the “cert_field” parameter,
please refer to the command “aaa server certificate
externalgroup”.
ldap_attribute This parameter specifies the LDAP attribute used to constitute the
search filter. Its value must be a string of 1 to 80 characters.
user_id Optional. This parameter specifies the LDAP attribute used to
identify the user. If this parameter is not specified, the default value
is the same as the value of the “ldap_attribute” parameter.
no aaa server certificate ldap search
This command is used to delete the search rule configured for the specified Certificate server
using an LDAP server to assist in authentication or authorization.
show aaa server certificate ldap search
This command is used to display the search filter configured for the specified Certificate server
using an LDAP server to assist in authentication or authorization.
aaa server certificate localdb search
This command is used to configure the search filter for the specified Certificate server using the
LocalDB server to assist in authentication or authorization.
For the authentication type “nochallenge”, if the username of any LocalDB account on the
LocalDB server matches the value of the certificate field specified by the “cert_field” parameter in
the client certificate, the user passes the authentication and the certificate field specified by the
“cert_field” parameter in the client certificate will be displayed as the username in the portal
welcome page. For the authentication type “challenge”, if the username and password of any
LocalDB account on the LocalDB server match the username and password on the certificate
challenge page, the user passes the authentication and the username used by the certificate
Challenge page will be displayed as the username in the portal welcome page.
cert_server_name This parameter specifies the name of an existing Certificate server
used for authentication.
cert_field This parameter specifies the certificate field used to obtain the
username of the user account from the certificate. Its value must be
a string of 1 to 32 characters and must be:
Standard certificate field names
All standard OIDs in the standard certificate fields (in the
2000-2018 Array Networks, Inc.
All Rights Reserved. 107Chapter 4 AAA
format of x.x.x.x and must be enclosed by double quotes)
Standard extension OIDs in the extension field (in the format
of x.x.x.x and must be enclosed by double quotes)
Combination of the DN name and OID (in the format of
DN.OID)
Standard extension field names in the extension field (only
ext.subjectAltName and ext.issuerAltName).
For detailed description for the values of the “cert_field” parameter,
please refer to the command “aaa server certificate
externalgroup”.
no aaa server certificate localdb search
This command is used to delete the search filter configured for the specified Certificate server
using the LocalDB server to assist in authentication or authorization.
show aaa server certificate localdb search
This command is used to display the search filter configured for the specified Certificate server
using the LocalDB server to assist in authentication or authorization.
The following commands are used to configure authorization using the Certificate server.
During the authorization using the Certificate server, the external group name of the user can be
obtained from three ways:
Specified certificate field in the client certificate
LDAP server
LocalDB
The three ways are mutually exclusive for one Certificate server used for authorization.
aaa server certificate externalgroup
This command is used to set the certificate field used to obtain the external group name for the
specified Certificate server. The value of the certificate field in the client certificate will be used as
the external group name of the user.
cert_server_name This parameter specifies the name of an existing Certificate server.
cert_field This parameter specifies the certificate field used to obtain the
external group name in the client certificate. Its value must be a
string of 1 to 64 characters. Its value must be:
Standard certificate field names
All standard OIDs in the standard certificate fields (in the
2000-2018 Array Networks, Inc.
All Rights Reserved. 108Chapter 4 AAA
format of x.x.x.x and must be enclosed by double quotes)
Standard extension OIDs in the extension field (in the format
of x.x.x.x and must be enclosed by double quotes)
Combination of the DN name and OID (in the format of
DN.OID)
Standard extension field names in the extension field (only
ext.subjectAltName and ext.issuerAltName).
no aaa server certificate externalgroup
This command is used to delete the configuration of the certificate field used to obtain the external
group name for the specified Certificate server.
aaa server certificate externaldefault