7705 SAR OS System Management Guide 3
Table of Contents
Preface................................................................................................................................................... 11
About This Guide................................................................................................................................................11
Audience .......................................................................................................................................................11
List of Technical Publications ........................................................................................................................12
Technical Support .........................................................................................................................................13
Getting Started...................................................................................................................................... 15
In This Chapter ...................................................................................................................................................15
Alcatel-Lucent 7705 SAR System Management Configuration Process ............................................................15
Security ................................................................................................................................................ 17
In This Chapter ...................................................................................................................................................17
Authentication, Authorization, and Accounting ..................................................................................................18
Authentication................................................................................................................................................19
Local Authentication.................................................................................................................................20
RADIUS Authentication............................................................................................................................21
TACACS+ Authentication.........................................................................................................................21
Authorization .................................................................................................................................................22
Local Authorization...................................................................................................................................23
RADIUS Authorization..............................................................................................................................23
TACACS+ Authorization...........................................................................................................................23
Accounting.....................................................................................................................................................24
RADIUS Accounting.................................................................................................................................24
TACACS+ Accounting..............................................................................................................................24
Security Controls ................................................................................................................................................26
When a Server Does Not Respond ...............................................................................................................26
Access Request Flow....................................................................................................................................26
Vendor-Specific Attributes (VSAs)......................................................................................................................28
Sample User (VSA) Configuration.................................................................................................................30
Alcatel-Lucent Dictionary .........................................................................................................................30
Other Security Features .....................................................................................................................................32
Secure Shell (SSH) .......................................................................................................................................32
CSM Filters and CSM Security......................................................................................................................33
Exponential Login Backoff.............................................................................................................................35
Encryption .....................................................................................................................................................35
802.1x Network Access Control ....................................................................................................................35
Configuration Notes............................................................................................................................................36
Reference Sources........................................................................................................................................36
Configuring Security with CLI .............................................................................................................................37
Setting Up Security Attributes.............................................................................................................................38
Configuring Authentication ............................................................................................................................38
Configuring Authorization ..............................................................................................................................39
Configuring Accounting .................................................................................................................................40
Security Configurations ......................................................................................................................................41
Security Configuration Procedures.....................................................................................................................43
Configuring IPv4 or IPv6 Management Access Filters ..................................................................................43