Storing Data In USB
First Published: March 29, 2005
Last Updated: December 3, 2010
The Universal Serial Bus (USB) Storage feature enables certain models of Cisco routers to support USB flash modules and with SmartCard technology (which is owned by Aladdin Knowledge Systems) in a USB key form factor (also referred to as a USB eToken) to provide secure access to a router.
USB eTokens provides secure configuration distribution and allows users to store Virtual Private Network (VPN) credentials for deployment. USB flash drives allow users to store images and configurations external to the router.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information for Storing Data In USB.
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
•Prerequisites for Storing Data In USB
•Restrictions for Storing Data In USB
•Information About Storing Data In USB
•How to Set Up and Use USB Modules on Cisco Routers
•Configuration Examples for Secure Token Support
•Additional References
•Feature Information for Storing Data In USB
Prerequisites for Storing Data In USB
Before you can use a USB Flash module or an eToken, you should have the following system requirements:
•A Cisco 871 router, Cisco 1800 series, Cisco 2800 series, or a Cisco 3800 series router.
•At least a Cisco IOS Release 12.3(14)T image running on any of the supported platforms.
•A Cisco supported USB flash or USB eToken.
•A k9 image is required for USB eToken support. (However, USB flash support is available in all images.)
Restrictions for Storing Data In USB
•USB eToken support requires a 3DES (k9) Cisco IOS software image, which provides secure file storage.
•USB hubs are currently not supported. Thus, the number of supported devices is limited to the number of available USB ports on the router chassis.
•You cannot boot an image from an eToken or a USB flash. (However, you can boot a configuration from both an eToken and flash.)
Information About Storing Data In USB
To use a USB flash module and a secure eToken on your router, you should understand the following concepts:
•Roles of the USB eToken and the USB Flash
•USB Storage Filesystem Support
•Benefits of Storing Data In USB
•Login Methods for the eToken
Roles of the USB eToken and the USB Flash
Both USB eTokens and USB flash modules can be used to store files (such as router configurations). The following sections discuss how each device functions and describe the differences between each device:
•How a USB eToken Works
•How a USB Flash Works
•Functionality Differences Between an eToken and a USB Flash
How a USB eToken Works
A SmartCard is a small plastic card, containing a microprocessor and memory that allows you to store and process data. A SmartCard eToken is a SmartCard with a USB interface. The eToken can securely store any type of file within its available storage space (32KB). Configuration files that are stored on the eToken can be encrypted and accessed only via a user PIN. The router will not load the configuration file unless the proper PIN has been configured for secure deployment of router configuration files.
After you plug the eToken into the router, you must log into the eToken; thereafter, you can change default settings, such as the user PIN (default: 1234567890) and the allowed number of failed login attempts before future logins are refused (default: 15 attempts). For more information on accessing and configuring the eToken, see the section "Accessing and Setting Up the eToken."
After you have successfully logged into the eToken, you can copy files from the router on to the eToken via the copy command. By default, after the eToken is removed from the router, all associated RSA keys are removed; IPSec tunnels are not torn down until the next Internet Key Exchange (IKE) negotiation period. (To change the default behavior and configure a specified length of time before the IPSec tunnels are torn down, issue the crypto pki token removal timeout command.)
For more information about the eToken by Aladdin Knowledge Systems, see the Aladdin website at http://www.aladdin.com/etoken/cisco/.
How a USB Flash Works
A Cisco USB flash module allows you to store and deploy router configurations and Cisco IOS software images. Cisco USB flash modules are available in 64MB, 128 MB, and 256MB versions.
Note The USB flash is not a replacement for the router compact flash, which must be present for the router to boot.
After you plug the USB flash module into the router, the router will automatically begin to boot the configuration file if the start-up configuration contains the boot config command to specify the new configuration located on the USB flash device; for example boot config usbflash0: new-config.
Functionality Differences Between an eToken and a USB Flash
Both eTokens and USB flash provide users with secondary storage; however, each device has its own benefits and limitations. To help determine which device better suits your needs, Table 1 highlights the functionality differences between the eToken and the USB flash.
Table 1 Functionality Differences Between an eToken and a USB Flash
|
|
|
|
Used to securely store and transfer digital certificates, preshared keys, and router configurations from the eToken to the router. |
Used to store and deploy router configurations and images from the USB Flash to the router. |
|
32KB |
•64MB •128MB •256MB |
|
•Typically used to store digital certificates, preshared keys, and router configurations for IPSec VPNs. •eTokens cannot store Cisco IOS images. |
Stores a file type that might be stored on a compact flash. |
|
•Files can be encrypted and accessed only with a user PIN. •Files can also be stored in a nonsecure format. |
Files can be stored only in a nonsecure format. |
|
•The router can use the configuration stored in the eToken during boot time •The router can use the secondary configuration stored in the eToken during boot time. (A secondary configuration allows users to load their IPSec configuration.) |
•Configuration file can be automatically transferred from the USB Flash to the router if the boot config command is issued (for example, boot config usbflash0: new-config). |
USB Storage Filesystem Support
Since USB storage device capacities are increasing, it is necessary that the DOSFS and the usbflash components are modified so that large capacity USB storage devices can be used. The USB Storage Filesystem Support feature extends DOSFS support for USB flash devices. With this feature you can use large capacity USB storage devices for data storage.
Benefits of Storing Data In USB
USB flash drive and USB eToken support on a Cisco router provides the following application benefits:
Removable Credentials: Provide or Store VPN Credentials on an External Device for Deployment
An Aladdin eToken can use SmartCard technology to store a digital certificate and configuration for IPSec VPN deployment. This ability enhances the capability of the router to generate RSA public keys to authenticate at least one IPSec tunnel. (Because a router can initiate multiple IPSec tunnels, the eToken can contain several certificates, as appropriate.)
Storing VPN credentials on an external device reduces the threat of compromising secure data.
PIN Configuration for Secure File Deployment
An Aladdin eToken can store a configuration file that can be used for enabling encryption on the router via a user-configured PIN. (That is, no digital certificates, preshared keys, or VPNs are used.)
Touchless or Low Touch Configuration
Both the eToken and USB Flash can provide remote software configuration and provisioning with little or no human interaction. Configuration is set up as an automated process. That is, both devices can store a bootstrap configuration that the router can use to boot from after the eToken or USB Flash has been inserted into the router. The bootstrap configuration connects the router to a TFTP server, which contains a configuration that completely configures the router.
Login Methods for the eToken
Two methods of login are available for the eToken:
•Automatic Login
•Manual Login
Automatic Login
Automatic login allows the router to completely come back up without any user or operator intervention. The PIN is stored in the private configuration, so it is not visible in the startup or running configuration.
Note A hand-generated startup configuration can contain the automatic login command for deployment purposes, but the copy system:running-config nvram: startup-config command must be issued to put the hand-generated configuration in the private configuration.
Manual Login
Manual login can be used when storing a PIN on the router is not desirable. Manual login can be executed with or without privileges, and it will make files and RSA keys on the eToken available to the Cisco IOS software. If a secondary configuration file is configured, it will only be executed with the privileges of the user who is performing the login. Thus, if you want to use manual login and set up the secondary configuration on the eToken to perform anything useful, you need to enable privileges.
Manual login can also be used in recovery scenarios for which the router configuration has been lost. If the scenario contains a remote site that normally connects to the core network with a VPN, the loss of the configuration and RSA keys requires out-of-band services that the eToken can provide. The eToken can contain a boot configuration, a secondary configuration, or both, and RSA keys to authenticate the connection.
Manual login may also be suitable for some initial deployment or hardware replacement scenarios for which the router is obtained from the local supplier or drop-shipped to the remote site.
Unlike automatic login, manual login requires the user to know the actual token PIN. The Aladdin's Windows-based utilities can be used to copy the RSA keys and secondary config files from the eToken if the user has physical access to the eToken.
How to Set Up and Use USB Modules on Cisco Routers
This section contains the following procedures that allow you to configure a router to support USB modules:
•Storing the Configuration on an External USB Flash Drive or eToken
•Accessing and Setting Up the eToken
•Troubleshooting USB Flash Drives and eTokens
Storing the Configuration on an External USB Flash Drive or eToken
To store the configuration file in the USB flash drive module or in an eToken, complete the tasks in this section:
SUMMARY STEPS
1. enable
2. configure terminal
3. boot config file-system-prefix:[directory/]filename [nvbypass]
DETAILED STEPS
|
|
|
Step 1 |
enable
Router> enable |
Enables privileged EXEC mode. •Enter your password if prompted. |
Step 2 |
configure terminal
Router# configure terminal |
Enters global configuration mode. |
Step 3 |
boot config file-system-prefix:[directory/]filename [nvbypass]
Router(config)# boot config usbflash0:
|
Specifies that the startup configuration file is stored in a USB Flash drive or secure eToken. Note If a USB flash drive is used, the router will boot a boot helper from flash:. The boot helper is a Cisco IOS image that resides in flash:. The Cisco IOS image that is used must be USB-aware. |
Accessing and Setting Up the eToken
Logging Into the eToken
To log into an eToken manually or automatically, complete the tasks in this section.
SUMMARY STEPS
1. enable
2. crypto pki token token-name [admin] login [pin]
or
configure terminal
3. crypto pki token token-name user-pin [pin]
4. exit
5. show usbtoken[0-9]:filename
DETAILED STEPS
|
|
|
Step 1 |
enable
Router> enable |
Enables privileged EXEC mode. •Enter your password if prompted. |
Step 2 |
crypto pki token token-name [admin] login [pin]
Router# crypto pki token usbtoken0 admin login 5678
or configure terminal
Router# configure terminal |
Manually logs into the eToken. You must specify the admin keyword if later you want to change the user PIN. or Puts the router in global configuration mode, which allows you to configure automatic eToken login. |
Step 3 |
crypto pki token token-name user-pin [pin]
Router(config)# crypto pki token usbtoken0 user-pin 1234 |
(Optional) Creates a PIN that automatically allows the router to log into the USB eToken at router startup. Note Do not issue this command if you have already set up manual login. |
Step 4 |
exit
Router(config)# exit
|
Exits global configuration mode. |
Step 5 |
show usbtoken[0-9]:filename
Router# |
(Optional) Verifies whether the USB eToken has been logged onto the router. |
What to Do Next
•RSA keys are loaded after the eToken is successfully logged into the router.
•By default, newly generated RSA keys are stored on the most recently inserted eToken. Regenerated keys should be stored in the same location that the original RSA key was generated.
Setting Administrative Functions on the eToken
To change default settings, such as the user PIN and the maximum number of failed on the eToken, complete the tasks in this section:
SUMMARY STEPS
1. enable
2. crypto pki token token-name [admin] change-pin [pin]
3. configure terminal
4. crypto pki token {token-name | default} removal timeout [minutes]
5. crypto pki token {token-name | default} max-retries [number]
6. exit
7. copy usbflash[0-9]:filename destination-url
8. show usbtoken[0-9]:filename
9. crypto pki token token-name logout
DETAILED STEPS
|
|
|
Step 1 |
enable
Router> enable |
Enables privileged EXEC mode. •Enter your password if prompted. |
Step 2 |
crypto pki token token-name [admin] change-pin [pin]
Router# crypto pki token usbtoken0 admin change-pin |
(Optional) Changes the user PIN number on the USB eToken. •If the PIN is not changed, the default PIN—1234567890—will be used. Note After the PIN has been changed, you must reset the login failure count to zero (via the crypto pki token max-retries command). The maximum number of allowable login failures is set (by default) to 15. |
Step 3 |
configure terminal
Router# configure terminal |
Enters global configuration mode. |
Step 4 |
crypto pki token {token-name | default} removal timeout [seconds]
Router(config)# crypto pki token usbtoken0 removal timeout 60 |
(Optional) Sets the time interval, in seconds, that the router will wait before removing the RSA keys that are stored in the eToken after the eToken has been removed from the router. Note If this command is not issued, all RSA keys and IPSec tunnels associated with the eToken are torn down immediately after the eToken is removed from the router. |
Step 5 |
crypto pki token {token-name | default} max-retries [number]
Router(config)# crypto pki token usbtoken0 max-retries 20 |
(Optional) Sets the maximum number of consecutive failed login attempts allowed before access to the eToken is denied. •By default, the value is set at 15. |
Step 6 |
exit
Router(config)# exit |
Exits global configuration mode. |
Step 7 |
copy usbflash[ 0-9]:filename destination-url
Router# copy usbflash0:
|
Copies files from the router to the eToken. •destination-url—See the copy command page documentation for a list of supported options. |
Step 8 |
show usbtoken[0-9]:filename
Router# |
(Optional) Displays information about the USB eToken. You can use this command to verify whether the USB eToken has been logged onto the router. |
Step 9 |
crypto pki token token-name logout
Router# crypto pki toke usbtoken0 logout |
Logs the router out of the USB eToken. Note If you want to save any data to the USB eToken, you must log back into the eToken. |
Troubleshooting USB Flash Drives and eTokens
This section contains descriptions of the following Cisco IOS commands that can be used to help troubleshoot possible problems that may arise while using a USB Flash or a USB eToken:
•The show file systems Command
•The show usb device Command
•The show usb controllers Command
•The dir Command
The show file systems Command
Step 1 Use the show file systems command to determine whether the router recognizes that there is a USB module plugged into a USB port. The USB module should appear on the list of file systems. If the module does not appear on the list, it can indicate any of the following problems:
•A connection problem with the USB module
•The Cisco IOS image running on the router does not support a USB module
•A hardware problem with the USB module itself
Step 2 Use the show file systems command to determine if a USB Flash module is formatted properly. To be compatible with a Cisco router, a USB Flash module must be formatted in a FAT16 format. If that is not the case, the show file systems command will display an error indicating an incompatible file system.
Sample output from the show file systems command showing a USB Flash module and a USB eToken appear below. The USB module listing appears in the last line of the examples.
Router# show file systems
Size(b) Free(b) Type Flags Prefixes
* 129880064 69414912 disk rw flash:#
491512 486395 nvram rw nvram:
63158272 33037312 usbflash rw usbflash0:
32768 858 usbtoken rw usbtoken1:
The show usb device Command
Step 1 Use the show usb device command to determine if a USB module is supported by Cisco. The sample output for both the USB Flash and the USB eToken that indicates whether or not the module is supported are highlighted in the sample outputs below.
The following sample output is for a USB Flash module:
Serial Number:0750D84030316868
USB Version Compliance:2.0
Max. Packet Size of Endpoint Zero:64
Number of Configurations:1
Transfer Direction:Device to Host
Transfer Direction:Host to Device
The following sample output is for a supported USB eToken:
Description:eToken Pro 4254
USB Version Compliance:1.0
Max. Packet Size of Endpoint Zero:8
Number of Configurations:1
The show usb controllers Command
Step 1 Use the show usb controllers command to determine if there is a hardware problem with a USB Flash module. If the show usb controllers command displays an error, it indicates a hardware problem in the USB module.
You can also use the show usb controllers command to verify that copy operations onto a USB Flash module are occurring successfully. Issuing the show usb controllers command after performing a file copy should display successful data transfers.
Sample output for the show usb controllers command for a working USB Flash module appears below:
Router# show usb controllers
Controller Specific Information:
Hardware Interrupt Status:0x24
Hardware Interrupt Enable:0x80000040
Hardware Interrupt Disable:0x80000040
Frame Interval:0x27782EDF
Hardware Configuration:0x3029
Direct Address Length:0x80A00
ATL PTD Skip Map:0xFFFFFFFF
ATL Current Active PTD:0x0
ATL Threshold Timeout:0xFF
Transfer Completion Codes:
No Response :0 Overrun :0
Buffer Overrun :0 Buffer Underrun :0
Canceled Transfers :2 Control Timeout :0
Interrupt Transfer :0 Bulk Transfer :0
Isochronous Transfer :0 Control Transfer:0
Interrupt Transfer :0 Bulk Transfer :26
Isochronous Transfer :0 Control Transfer:894
Enumeration Failures :0 No Class Driver Found:0
USB MSCD SCSI Class Driver Counters:
Good Status Failures :3 Command Fail :0
Good Status Timed out:0 Device not Found:0
Device Never Opened :0 Drive Init Fail :0
Illegal App Handle :0 Bad API Command :0
Invalid Unit Number :0 Invalid Argument:0
Application Overflow :0 Device in use :0
Control Pipe Stall :0 Malloc Error :0
Device Stalled :0 Bad Command Code:0
Device Detached :0 Unknown Error :0
USB Aladdin Token Driver Counters:
Token Inserted :1 Token Removed :0
Send Insert Msg Fail :0 Response Txns :434
Dev Entry Add Fail :0 Request Txns :434
Dev Entry Remove Fail:0 Request Txn Fail:0
Response Txn Fail :0 Command Txn Fail:0
USB Flash File System Counters:
Flash Disconnected :0 Flash Connected :1
Flash Device Fail :0 Flash Ok :1
Flash startstop Fail :0 Flash FS Fail :0
USB Secure Token File System Counters:
Token Inserted :1 Token Detached :0
Token FS success :1 Token FS Fail :0
Token Max Inserted :0 Create Talker Failures:0
Token Event :0 Destroy Talker Failures:0
Watched Boolean Create Failures:0
The dir Command
Step 1 Use the dir command with the usbflash[0-9]: or the usbtoken[0-9]: keyword to display all files, directories, and their permission strings on the USB Flash or USB eToken.
The following sample output displays directory information for the USB Flash:
1 -rw- 30125020 Dec 22 2032 05:31:32 +00:00 c3825-entservicesk9-mz.123-14.T
63158272 bytes total (33033216 bytes free)
The following sample output displays directory information for the USB eToken:
2 d--- 64 Dec 22 2032 05:23:40 +00:00 1000
5 d--- 4096 Dec 22 2032 05:23:40 +00:00 1001
8 d--- 0 Dec 22 2032 05:23:40 +00:00 1002
10 d--- 512 Dec 22 2032 05:23:42 +00:00 1003
12 d--- 0 Dec 22 2032 05:23:42 +00:00 5000
13 d--- 0 Dec 22 2032 05:23:42 +00:00 6000
14 d--- 0 Dec 22 2032 05:23:42 +00:00 7000
15 ---- 940 Jun 27 1992 12:50:42 +00:00 mystartup-config
16 ---- 1423 Jun 27 1992 12:51:14 +00:00 myrunning-config
32768 bytes total (858 bytes free)
The following sample output displays directory information for all devices the router is aware of:
Router# dir all-filesystems
No space information available
144 dr-x 0 <no date> memory
1 -rw- 1906 <no date> running-config
114 dr-x 0 <no date> vfiles
No space information available
1 -rw- 30125020 Dec 22 2032 03:06:04 +00:00 c3825-entservicesk9-mz.123-14.T
129880064 bytes total (99753984 bytes free)
476 -rw- 1947 <no date> startup-config
477 ---- 46 <no date> private-config
478 -rw- 1947 <no date> underlying-config
1 -rw- 0 <no date> ifIndex-table
2 ---- 4 <no date> rf_cold_starts
3 ---- 14 <no date> persistent-data
491512 bytes total (486395 bytes free)
1 -rw- 30125020 Dec 22 2032 05:31:32 +00:00 c3825-entservicesk9-mz.123-14.T
63158272 bytes total (33033216 bytes free)
2 d--- 64 Dec 22 2032 05:23:40 +00:00 1000
5 d--- 4096 Dec 22 2032 05:23:40 +00:00 1001
8 d--- 0 Dec 22 2032 05:23:40 +00:00 1002
10 d--- 512 Dec 22 2032 05:23:42 +00:00 1003
12 d--- 0 Dec 22 2032 05:23:42 +00:00 5000
13 d--- 0 Dec 22 2032 05:23:42 +00:00 6000
14 d--- 0 Dec 22 2032 05:23:42 +00:00 7000
15 ---- 940 Jun 27 1992 12:50:42 +00:00 mystartup-config
16 ---- 1423 Jun 27 1992 12:51:14 +00:00 myrunning-config
32768 bytes total (858 bytes free)
Configuration Examples for Secure Token Support
This section contains the following configuration example:
•Example: Logging Into and Saving RSA Keys to eToken
Example: Logging Into and Saving RSA Keys to eToken
The following configuration example shows to how log into the eToken, generate RSA keys, and store the RSA keys onto the eToken:
! Configure the router to automatically log into the eToken
crypto pki token default user-pin 0 1234567890
! Generate RSA keys and enroll certificates with the CA.
crypto pki trustpoint IOSCA
enrollment url http://10.23.2.2
crypto ca authenticate IOSCA
Certificate has the following attributes:
Fingerprint MD5:23272BD4 37E3D9A4 236F7E1A F534444E
Fingerprint SHA1:D1B4D9F8 D603249A 793B3CAF 8342E1FE 3934EB7A
% Do you accept this certificate? [yes/no]:yes
Trustpoint CA certificate accepted.
% Start certificate enrollment ..
% Create a challenge password. You will need to verbally provide this
password to the CA Administrator in order to revoke your certificate.
For security reasons your password will not be saved in the configuration.
Please make a note of it.
% The subject name in the certificate will include:c2851-27.cisco.com
% Include the router serial number in the subject name? [yes/no]:no
% Include an IP address in the subject name? [no]:no
Request certificate from CA? [yes/no]:yes
% Certificate request sent to Certificate Authority
% The 'show crypto ca certificate IOSCA verbose' command will show the fingerprint.
*Jan 13 06:47:19.413:CRYPTO_PKI: Certificate Request Fingerprint MD5:E6DDAB1B
0E30EFE6 54529D8A DA787DBA
*Jan 13 06:47:19.413:CRYPTO_PKI: Certificate Request Fingerprint SHA1:3B0F33B
7 57C02A10 3935042B C4B6CD3D 61039251
*Jan 13 06:47:21.021:%PKI-6-CERTRET:Certificate received from Certificate Authority
! Issue the write memory command, which will automatically save the RSA keys to the eToken
! instead of private NVRAM.
Building configuration...
*Jan 13 06:47:29.481:%CRYPTO-6-TOKENSTOREKEY:Key c2851-27.cisco.com stored on
Cryptographic Token eToken Successfully
The following sample output from the show crypto key mypubkey rsa command displays stored credentials after they are successfully load from the eToken. Credentials that are stored on the eToken are in the protected area. When storing the credentials on the eToken, the files are stored in a directory called /keystore. However, the key files are hidden from the CLI.
Router#
show crypto key mypubkey rsa
% Key pair was generated at:06:37:26 UTC Jan 13 2005
Key name:c2851-27.cisco.com
Usage:General Purpose Key
305C300D 06092A86 4886F70D 01010105 00034B00 30480241 00E3C644 43AA7DDD
732E0F4E 3CA0CDAB 387ABF05 EB8F22F2 2431F1AE 5D51FEE3 FCDEA934 7FBD3603
7C977854 B8E999BF 7FC93021 7F46ABF8 A4BA2ED6 172D3D09 B5020301 0001
% Key pair was generated at:06:37:27 UTC Jan 13 2005
Key name:c2851-27.cisco.com.server
307C300D 06092A86 4886F70D 01010105 00036B00 30680261 00DD96AE 4BF912EB
2C261922 4784EF98 2E70E837 774B3778 7F7AEB2D 87F5669B BF5DDFBC F0D521A5
56AB8FDC 9911968E DE347FB0 A514A856 B30EAFF4 D1F453E1 003CFE65 0CCC6DC7
21FBE3AC 2F8DEA16 126754BC 1433DEF9 53266D33 E7338C95 BB020301 0001
Additional References
The following sections provide references related to the Storing data using USB feature.
Related Documents
|
|
Connecting the USB modules to the router |
Cisco Access Router USB Flash Module and USB eToken Hardware Installation Guide |
eToken and USB Flash data sheet |
USB eToken and USB Flash Features Support |
File management (loading, copying, and rebooting files) |
The section "File Management" in the Cisco IOS Configuration Fundamentals and Network Management Configuration Guide |
Configuring digital certificate encryption |
The chapter "Configuring Certification Authority Interoperability" in the Cisco IOS Security Configuration Guide |
Standards
MIBs
|
|
None |
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs |
RFCs
Technical Assistance
|
|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
http://www.cisco.com/cisco/web/support/index.html |
Feature Information for Storing Data In USB
Table 2 lists the features in this module and provides links to specific configuration information.
Not all commands may be available in your Cisco IOS software release. For release information about a specific command, see the command reference documentation.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note Table 2 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Table 2 Feature Information for Storing Data In USB
|
|
|
USB Storage |
12.3(14)T |
The USB Storage feature enables certain models of Cisco routers to support USB flash modules and with SmartCard technology (which is owned by Aladdin Knowledge Systems) in a USB key form factor (also referred to as a USB eToken) to provide secure access to a router. The following sections provide information about this feature: •Information About Storing Data In USB •How to Set Up and Use USB Modules on Cisco Routers •Configuration Examples for Secure Token Support The following commands were introduced or modified: crypto pki token change-pin, crypto pki token login, crypto pki token logout, crypto pki token max-retries, crypto pki token removal timeout, crypto pki token secondary config, crypto pki token user-pin, debug usb, driver, show usb driver, show usb controllers, show usb device, show usb driver, show usb port, show usbtoken, show usb tree, boot config, copy, delete, dir, format. |
USB Storage Filesystem Support |
12.2(33)SRE |
The USB Storage Filesystem Support feature extends DOSFS support for USB flash devices. With this feature you can use large capacity USB storage devices for data storage. In 12.2(33)SRE, this feature was introduced on the Cisco 7200-NPE-G2. The following sections provide information about this feature: •USB Storage Filesystem Support The following commands were introduced or modified: cd, verify, mkdir, fsck. |
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2007-2010 Cisco Systems, Inc. All rights reserved.