7705 SAR OS System Management Guide Page 27
Security
In This Chapter
This chapter provides information to configure security parameters. Topics in this chapter
include:
• Authentication, Authorization, and Accounting on page 28
→ Authentication on page 29
→ Authorization on page 31
→ Accounting on page 33
• Security Controls on page 35
→ When a Server Does Not Respond on page 35
→ Access Request Flow on page 35
• Vendor-Specific Attributes (VSAs) on page 37
→ Sample User (VSA) Configuration on page 39
• Other Security Features on page 41
→ Secure Shell (SSH) on page 41
→ CSM Filters and CSM Security on page 42
→ Exponential Login Backoff on page 43
→ Encryption on page 43
• Configuration Notes on page 44
• Configuring Security with CLI on page 45
• Security Command Reference on page 69