EasyManua.ls Logo

Alcatel-Lucent 7705 SAR - Default Chapter; Table of Contents

Alcatel-Lucent 7705 SAR
356 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
7705 SAR OS System Management Guide 3
Table of Contents
Preface................................................................................................................................................... 11
About This Guide................................................................................................................................................11
Audience .......................................................................................................................................................11
List of Technical Publications ........................................................................................................................12
Technical Support .........................................................................................................................................13
Getting Started...................................................................................................................................... 15
In This Chapter ...................................................................................................................................................15
Alcatel-Lucent 7705 SAR System Management Configuration Process ............................................................15
Security ................................................................................................................................................ 17
In This Chapter ...................................................................................................................................................17
Authentication, Authorization, and Accounting ..................................................................................................18
Authentication................................................................................................................................................19
Local Authentication.................................................................................................................................20
RADIUS Authentication............................................................................................................................21
TACACS+ Authentication.........................................................................................................................21
Authorization .................................................................................................................................................22
Local Authorization...................................................................................................................................23
RADIUS Authorization..............................................................................................................................23
TACACS+ Authorization...........................................................................................................................23
Accounting.....................................................................................................................................................24
RADIUS Accounting.................................................................................................................................24
TACACS+ Accounting..............................................................................................................................24
Security Controls ................................................................................................................................................26
When a Server Does Not Respond ...............................................................................................................26
Access Request Flow....................................................................................................................................26
Vendor-Specific Attributes (VSAs)......................................................................................................................28
Sample User (VSA) Configuration.................................................................................................................30
Alcatel-Lucent Dictionary .........................................................................................................................30
Other Security Features .....................................................................................................................................32
Secure Shell (SSH) .......................................................................................................................................32
CSM Filters and CSM Security......................................................................................................................33
Exponential Login Backoff.............................................................................................................................35
Encryption .....................................................................................................................................................35
802.1x Network Access Control ....................................................................................................................35
Configuration Notes............................................................................................................................................36
Reference Sources........................................................................................................................................36
Configuring Security with CLI .............................................................................................................................37
Setting Up Security Attributes.............................................................................................................................38
Configuring Authentication ............................................................................................................................38
Configuring Authorization ..............................................................................................................................39
Configuring Accounting .................................................................................................................................40
Security Configurations ......................................................................................................................................41
Security Configuration Procedures.....................................................................................................................43
Configuring IPv4 or IPv6 Management Access Filters ..................................................................................43

Table of Contents

Related product manuals