Show Full-configuration

0 views
Skip to first unread message

Antonio Brittenham

unread,
Aug 5, 2024, 10:21:27 AM8/5/24
to logeduve
Theparagraph can also (usually?/Always?) be found in the show and/or show full-configuration CLI output. This relationship holds for the pathway but this configu is missing from from the show and show full-configuration.

Again, because you are in vdom "FG-traffic" config mode. Just "end" to get out of vdom config mode, then get in "config global". Then show would show the interface config.

Or, just log out completely, then re-get in then "show" before getting into a vdom or global. You should see the entire config with those three sections.


Not sure what are missing in the output of "show system interface" you posted. Those are all I would expect on your 40F regardless which VDOM you're in. "system interface" is under global so the output is the same.


As I said above, you have to get down to the "config system interface" config mode first to execute show or show full. It's same as "config vpn ipsec phase1-interface". You have to get down to the the config mode in the CLI command tree.

Otherwise, "show" shows the entire VDOM config.



Oh, I see what you mean. Since "config system interface" is under global, if you do "show" without getting into the config mode (which is inside of "global" not inside of a vdom), you wouldn't see the interface config at all. It shows just vdom config.



Is that what you meant? If you get in "config global", instead of "config vdom"->"edit FG-traffic", when you run "show" you can see the entire "global" config including the interface config.


3. vdom "FG-traffic"



And the interface config is in the section 1. You have to be in there to see the content when you run "show" or "show full".

You can easily understand that when you back up the entire config into a file and exiamine it in a text editor to see those three sections.


The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.


You can use the show command within a config shell todisplay the configuration of that shell, or you can use theshow command with a full path to display the configurationof the specified shell. To display the configuration of all configshells, you can use the show command from the rootprompt.


That makes me wonder where that comes from. The gitlab.rb contains a commented out section where I see that email address, but it is commented out. When I run gitlab-ctl show-config there is nothing in there with ad...@example.com.


The built in defaults are the ones that are commented out in the config. If the option is commented out in the config file it is considered as non-existant by the software, therefore the default value is used. The default values are usually the ones that are set in the commented line in the config.


For example, not so long ago, I decided to change some default options for newly created repos on my GL instance. I opened the gitlab.rb file, copied the lines that I want to change, uncommented them and changed their values


That is simply not true. It is only so if you have not done any upgrade. I have a GitLab server installed about three years ago, I forgot which version that was, maybe 9.x. I have upgraded the major version at least three times. During all these upgrades some defaults have changed, but my original gitlab.rb is basically the same as the one I started with.


The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.


The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.


This document describes the configuration steps on how to display the full running configuration for users logged in to the router with low privilege levels. To understand the next problem and workaround it is necessary to understand privilege levels. The available privilege levels range from 0 to 15, and allow the administrator to customise what commands are available at what privilege level. By default, the three privilege levels on a router are:


The remaining levels in between these minimum and maximum levels are undefined until the administrator assigns commands and/or users to them. Therefore, the administrator can assign users different privilege levels in between these minimum and maximum privilege levels to separate what different users have access too. The administrator can then allocate individual commands (and various other options) to an individual privilege level to make this available for any user at this level. For example:


With this configuration, when user1 connected to the router they would be able to run the show access-lists command, and/or anything else enabled at that privilege level. However the same cannot be said for enabled the show running-config command, as is discussed later in the problem statement.


When configuring different access levels to the router for different users, it is a common application for a network administrator to attempt to assign certain users to only have access to show commands, and not provide access to any configuration commands. This is a simple task for most show commands, as you can grant access through a simple configuration as per this:


With this example configuration, the second line can allow the test_user to have access to a plethora of show related commands, which are normally not available at this privilege level. However, the show running-config command is treated differently to most show commands. Even with the third line of example code, only an omitted/abbreviated show running-config is displayed for the user despite the command being specified at the correct privilege level.


As you can see this output does not show any configuration, and would not be helpful to a user trying to collect information about the configuration of the router. This is because the show running-config command displays all of the commands that the user is able to modify at their current privilege level. This is designed as a security configuration to prevent the user from having access to commands that have been configured previously from their current privilege level. This is an issue when attempting to create a user with access to show commands, as show running-config is a standard command for engineers to initially collect when troubleshooting.


The addition of view full to the command, (and in turn the privilege level of the command to allow the user access to the command), now allows the user to view the full show running-config without any omitted commands.


However this does then raise the question, by providing the user access to this version of the command, does this not raise the initial security risk that was attempting to be solved by designing an omitted version?


As a workaround to the solution and to ensure consistency in a secure network design, you can create an alias for the user that runs the full version of the show running-config command without providing access/knowledge to the user, as shown here:


In this example the show running-config is the alias name, and when the user is logged into the router, they can then enter this alias name instead of the command and receive the expected output without knowledge of the actual command that is being run.


In conclusion, this is just one example of how to have more control when administratively creating user privilege access at different levels. There are a plethora of options to create various privilege levels and access to different commands, and this is an example of how to ensure a show only user still has access to the full running config when they have no access to any configuration commands.


Unreal.



The next thing i tried, was selecting a handful of the AP's that didn't reflect the changes after doing a full config update, and updated their firmware from 10.0.3r4 to 10.4.r4 which is the latest one. Still the AP's don't show the changes made...... so frustrating


If you have your cloned and assigned AP template within your Network Policy, that is the AP template it will default to. It was that template where I changed and assigned the radio profiles. So when I selected an AP and then Revert Device to Template Defaults, the AP took the template along with the radio profiles.


There is no 1:1 match for this command in Comware. You can use "display current-configuration" and "display default-configuration", but it's not the same level of details that you get by Cisco's "show run all"


You are right, this 'all' option has been added in release 3207 for 5130 and hopefully will be implemented on all Comware 7-based devices soon or later as I also find it very handy when you need to quickly find out what are the defaults for particular feature. However, so far the majority of CW7 devices still don't have this feature and every time I doubt about default option of a feature I need to check the command reference guide... Hope this will change soon!

3a8082e126
Reply all
Reply to author
Forward
0 new messages