Security
7705 SAR OS System Management Guide Page 45
Configuring Security with CLI
This section provides information to configure security using the command line interface.
Topics in this section include:
• Setting Up Security Attributes on page 46
→ Configuring Authentication on page 46
→ Configuring Authorization on page 47
→ Configuring Accounting on page 48
• Security Configurations on page 49
• Security Configuration Procedures on page 51
→ Configuring Management Access Filters on page 51
→ Configuring CPM (CSM) Filters on page 53
→ Configuring Password Management Parameters on page 54
→ Configuring Profiles on page 55
→ Configuring Users on page 56
→ Copying and Overwriting Users and Profiles on page 57
→ Configuring SSH on page 61
→ Configuring Login Controls on page 61
• RADIUS Configurations on page 63
→ Configuring RADIUS Authentication on page 63
→ Configuring RADIUS Authorization on page 64
→ Configuring RADIUS Accounting on page 65
• TACACS+ Configurations on page 66
→ Enabling TACACS+ Authentication on page 66
→ Configuring TACACS+ Authorization on page 67
→ Configuring TACACS+ Accounting on page 67