Zeroizing the file storage of the management module
Zeroizing the management module files
Use the erase all command as follows to erase all management module files, including configuration files, core dumps, password files, crypto-key files, and so on . Software images are not erased.
erase all zeroize
When executed without the zeroize
option,
files are removed, but the flash storage is not zeroized. The data
is still physically present in the flash. The flash can be removed
from the switch and the data recovered with file recovery tools.
NOTE: It is recommended that zeroization be performed from the serial console so that the status information can be viewed during the zeroization process. | |
Zeroizing from the ROM console
Use the erase-all zeroize command at the prompt to zeroize the file storage from the ROM console of the switch. This is typically done during a switch recovery process. The warning messages are the same as for the CLI command.
Zeroization
Sometimes it is desirable to completely remove the information stored in user files from flash storage. The zeroization feature will remove and "zeroize" all the files from flash storage except software images. Information removed includes the following:
switch configurations
system generated private keys
user installed private keys
legacy manager/operator password files
crypto-key files
fdr logs
core dumps
Zeroization can be initiated in these ways:
CLI command erase all
ROM console command
During Secure Mode transition, initiated through the secure-mode CLI command executed in a serial session
The zeroization process takes some time, so it is performed during the initial process of a switch reboot. After zeroization, the configuration file is rebuilt from the default config file, which is similar to the config rebuilding process performed by the erase startup-config command.
When zeroization is triggered by a secure mode transition, HA handles zeroization on the AMM and SMM automatically.
When the CLI command (erase all zeroize) is used to start zeroization, the AMM syncs with the SMM and ensures that the SMM performs the same level of zeroization before the AMM starts the zeroization process on itself. The AMM before the zeroization process occurs remains the AMM, unless it takes over a minute for the AMM to boot up, in which case the prior SMM becomes the AMM.
When zeroization is started from the ROM console, there is no synchronization performed between the AMM and SMM, as zeroization from the ROM console is treated as a recovery facility. Each MM has to be zeroized individually.
For information about Secure Mode and zeroization, see the "Secure Mode (5400zl and 3800)" in the Access Security Guide for your switch.