Enable

These scenarios show how to configure secure mode and which configuration is not allowed to be configured while this mode is set

Toggle Secure Mode

Description

Shows how to toggle secure mode (on and off)

Scenario

Step 1: Set the following configuration in DUT0 related to secure mode without committing:

set system login user admin authentication encrypted-password '$6$mF4iNVoOShe5og69$MUwBcSKwuWUAAWLsk2EUWUnARj2YB4Pe8vbSjHKnfOYR6O8Ac7mAwtA5PHQzDf/cx4leCMvK6qaLLA5vcAMM21'
set system security medium

Step 2: Execute commit command. This will log out the device

Step 3: Login as admin with password 1!Teldatqqqq

Step 4: Run command show running at DUT0 and check if output contains the following tokens:

system security medium
Show output
# Teldat OSDx VM version v4.2.8.1
# Thu 11 Dec 2025 15:04:28 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$mF4iNVoOShe5og69$MUwBcSKwuWUAAWLsk2EUWUnARj2YB4Pe8vbSjHKnfOYR6O8Ac7mAwtA5PHQzDf/cx4leCMvK6qaLLA5vcAMM21'
set system security medium

Step 5: Modify the following configuration lines in DUT0 :

delete system security

Step 6: Set the following configuration in DUT0 related to secure mode without committing:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 7: Execute commit command. This will log out the device

Step 8: Login as admin with password admin

Step 9: Run command show running at DUT0 and check if output does not contain the following tokens:

system security medium
Show output
# Teldat OSDx VM version v4.2.8.1
# Thu 11 Dec 2025 15:04:30 +00:00
# Warning: Configuration has not been saved
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Multi-User

Description

Secure mode fails if there is more than one user configured

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role role_level_10 level 10
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system login user test authentication encrypted-password '$6$W1LjkdfP5PF3SF8e$DpBPL1ZstkWNEI.F1TUh2mR2DsQD80NIDY.cz5LMKORQ3Mtt4qaMAtUXb1ybidtDz.vuEY5DSWcL85IqPc8yn0'
set system login user test role role_level_10

Step 2: Set the following configuration in DUT0 related to secure mode without committing:

set system login user admin authentication encrypted-password '$6$ciCYzRfDowYK6cqw$SN3rtLSX.hdjFoOn3VNgUTi5f7fq9DyRjnWFPinAcxh6vvk6QNsObeRuC4kTxsBlKhahtSpGJBvXmwzrk/mab0'
set system security medium

Step 3: Run command commit at DUT0 and check if output contains the following tokens:

You must delete all users except yours in the system
Show output
[ system security medium ]
You must delete all users except yours in the system.                   If your user belongs to a tacacs or radius system, you must keep only local admin user
Commit validation failed
CLI Error: Command error

User Password

Description

New password for admin user fails if does not meet the password criteria or if a encrypted password is manually configured

Scenario

Step 1: Set the following configuration in DUT0 related to secure mode without committing:

set system login user admin authentication encrypted-password '$6$wU4Oshr.dbLqtlbt$mVKqieR7fapthAnH1DUK.5flHoKFcl4qiBDgkzNRuqmcR0x7K.P03C4JM6l1RZNpP0PzF/r41nESMyLU61t3r0'
set system security medium

Step 2: Run command commit at DUT0 and check if output contains the following tokens:

Password does not meet the criteria for secure mode
Show output
[ system login user admin ]
Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters !, @, #, $, %, ^, &, *, (, ) and must be at least 12 characters long.
Commit validation failed
CLI Error: Command error

Note

Exit configuration discarding all changes running “exit discard”

Step 3: Set the following configuration in DUT0 related to secure mode without committing:

set system security medium

Step 4: Run command set system login user admin authentication encrypted-password $6$/eFHGvwPTaHOPSIr$YIFZ4Oi./fbp.67T4y.76q9PRyhIP5.YO0NkPrgiE44JIkEWUs.MxjgXrD/QDHYRnyNQ/m5yf/KcWxQpDoS9a/ at DUT0 and check if output contains the following tokens:

Cannot be set manually in secure mode
Show output
Cannot be set manually in secure mode
CLI Error: Command error

Secure mode only available for admin roles

Description

Secure mode is only available to be configured or deleted if the user has an admin role

Scenario

Step 1: Set the following configuration in DUT0 :

set system login role role_level_10 level 10
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system login user test authentication encrypted-password '$6$VjiZaI/lPF1q6VIK$yMJwPT1pXP1r/J5iBL6bb0BRk.CqkijR50bz5GH3lg2mIbvx0fx2apD/JLNvN8AixQ.rpEcys4qnKsKQr/yax0'
set system login user test role role_level_10

Step 2: Login as test with password test

Step 3: Enter to configuration menu by typing configure

Step 4: Run command set system security medium at DUT0 and check if output contains the following tokens:

Only max level users can enable this mode
Show output
Only max level users can enable this mode
CLI Error: Command error

Incompatible configuration with secure mode

Description

If there are any active configuration specific to different services on a device and an attempt to enable secure mode is made, an incompatibility error is displayed.

Scenario

Example 1

Step 1: Set the following configuration in DUT0 :

set service ssh cipher aes128-cbc
set service ssh host-key 'running://host.key'
set service ssh host-key-algorithms ssh-rsa
set service ssh keepalive-count-max 3
set service ssh keepalive-interval 59
set service ssh key-exchange curve25519-sha256
set service ssh login-grace-time 31
set service ssh mac hmac-md5
set service ssh pubkey-accepted-algorithms ssh-rsa
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 related to secure mode without committing:

set system login user admin authentication encrypted-password '$6$ZDkvpUk467UIhW85$Iy9OQARI2CER5iltt9JTTMExHe99yFCPgTnx2.UHz9IOdHcgnIi.mnZZF7N7krreAZCQQUV/bUrNFi.GVWtpM1'
set system security medium

Step 3: Run command commit at DUT0 and check if output contains the following tokens:

is/are not found in the following list:
must be greater than or equal to
must be less than or equal to
must correspond to one of the following elliptic curves (ECDSA):
Show output
[ system security medium ]
service ssh cipher [aes128-cbc] is/are not found in the following list: [aes128-ctr, aes192-ctr, aes256-ctr]
[ system security medium ]
service ssh mac [hmac-md5] is/are not found in the following list: [hmac-sha2-256, hmac-sha2-512]
[ system security medium ]
service ssh key-exchange [curve25519-sha256] is/are not found in the following list: [diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521]
[ system security medium ]
service ssh host-key [running://host.key] must correspond to one of the following elliptic curves (ECDSA): [ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521].
[ system security medium ]
service ssh pubkey-accepted-algorithms [ssh-rsa] is/are not found in the following list: [ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521]
[ system security medium ]
service ssh host-key-algorithms [ssh-rsa] is/are not found in the following list: [ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521]
[ system security medium ]
service ssh login-grace-time [31] must be less than or equal to 30
[ system security medium ]
service ssh keepalive-interval [59] must be greater than or equal to 60
[ system security medium ]
service ssh keepalive-count-max [3] must be greater than or equal to 5
[ system security medium ]
Commit validation failed
CLI Error: Command error

Example 2

Step 1: Set the following configuration in DUT0 :

set service dns proxy cipher 1 algorithm TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
set service dns proxy server-name SERVER
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 related to secure mode without committing:

set system login user admin authentication encrypted-password '$6$XOE57/oag4JkJUeb$rg42dDN9.WX0ONPG4reiF8cD8EG2NBvAuqWMf1SO46MbpMORbM0ecvrjLpJ1U4pC6eBvi4bcvkAhqB0F9Taw6.'
set system security medium

Step 3: Run command commit at DUT0 and check if output contains the following tokens:

is/are not found in the following list:
Show output
[ system security medium ]
service dns proxy cipher 1 algorithm [TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA] is/are not found in the following list: [TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256]
[ system security medium ]
Commit validation failed
CLI Error: Command error

Example 3

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set vpn ipsec auth-profile AUTH global-secrets ike-psk %any-AUTH-local encrypted-secret U2FsdGVkX1/UENCkDaOmIGGbrqAub569eoV0AOVsTic=
set vpn ipsec auth-profile AUTH local auth ike-psk id %any
set vpn ipsec esp-group ESP proposal 1 encryption null
set vpn ipsec esp-group ESP proposal 1 hash md5
set vpn ipsec esp-group ESP proposal 1 pfs dh-group14
set vpn ipsec ike-group IKE proposal 1 dh-group 14
set vpn ipsec ike-group IKE proposal 1 encryption 3des
set vpn ipsec ike-group IKE proposal 1 hash md5

Step 2: Set the following configuration in DUT0 related to secure mode without committing:

set system login user admin authentication encrypted-password '$6$6chPxOvZVoKfexG9$AWIjvhyK4.uxsxGOCHDMZY2V2MqTIvcyW74h/WquvsSmq6FK7ehHCQpKskSGffGZaNCjU/.q6DK3MWhYBUJ.6/'
set system security medium

Step 3: Run command commit at DUT0 and check if output contains the following tokens:

is/are not found in the following list:
Show output
[ system security medium ]
vpn ipsec auth-profile AUTH local [auth] is/are not found in the following list: [id, pkcs12, crl]
[ system security medium ]
vpn ipsec esp-group ESP proposal 1 pfs [dh-group14] is/are not found in the following list: [dh-group15, dh-group16, dh-group17, dh-group18, dh-group19, dh-group20, dh-group21]
[ system security medium ]
vpn ipsec esp-group ESP proposal 1 encryption [null] is/are not found in the following list: [aes128gcm128, aes192gcm128, aes256gcm128, chacha20poly1305]
[ system security medium ]
vpn ipsec esp-group ESP proposal 1 hash [md5] is/are not found in the following list: [sha256, sha384, sha512]
[ system security medium ]
vpn ipsec ike-group IKE key-exchange [ikev1] is/are not found in the following list: [ikev2]
[ system security medium ]
vpn ipsec ike-group IKE proposal 1 dh-group [14] is/are not found in the following list: [15, 16, 17, 18, 19, 20, 21]
[ system security medium ]
vpn ipsec ike-group IKE proposal 1 encryption [3des] is/are not found in the following list: [aes128gcm128, aes192gcm128, aes256gcm128, chacha20poly1305]
[ system security medium ]
vpn ipsec ike-group IKE proposal 1 hash [md5] is/are not found in the following list: [sha256, sha384, sha512]
[ system security medium ]
Commit validation failed
CLI Error: Command error

Example 4

Step 1: Set the following configuration in DUT0 :

set system login parameters max-sessions 6
set system login parameters password-prompt-delay 9
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 related to secure mode without committing:

set system login user admin authentication encrypted-password '$6$TlYWaMLHYQF1FUiW$3gvWa/4A00w39fjJj2WutFUAJ7mQsTjl0TuX0WgvnASlJq659yqCFIoJJxvP3U/gvhn3mZiCZNvjDBdTD0o9/0'
set system security medium

Step 3: Run command commit at DUT0 and check if output contains the following tokens:

must be greater than or equal to
must be less than or equal to
Show output
[ system security medium ]
system login parameters max-sessions [6] must be less than or equal to 5
[ system security medium ]
system login parameters password-prompt-delay [9] must be greater than or equal to 10
[ system security medium ]
Commit validation failed
CLI Error: Command error

Example 5

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system ntp authentication-key 1 algorithm md5
set system ntp authentication-key 1 encrypted-key U2FsdGVkX197Jwim4oqsNzpbaKSVLiD/VJ/u+inziAk=
set system ntp server address 10.215.168.1

Step 2: Set the following configuration in DUT0 related to secure mode without committing:

set system login user admin authentication encrypted-password '$6$//aXSK2riFrv9vpt$PMBVU.RzDM4.KttUhouY8XcbQU68REJPH8pHOrboZZK73eg4.T.IF1AgRKUgvaID0MKbz9j6Raeha3//i/bvV.'
set system security medium

Step 3: Run command commit at DUT0 and check if output contains the following tokens:

is/are not found in the following list:
Show output
[ system security medium ]
system ntp authentication-key 1 algorithm [md5] is/are not found in the following list: [sha256, sha384, sha512]
[ system security medium ]
Commit validation failed
CLI Error: Command error