Avaya Inc. – External Distribution
Table of Contents
Conventions ................................................................................................................................... 4
1. Overview ................................................................................................................................. 5
2. Management IP Address ....................................................................................................... 6
3. Local password protection ................................................................................................... 7
3.1 CLI/WEB Password Protection ........................................................................................ 7
3.2 Password Security ........................................................................................................... 8
3.3 Telnet Password Protection using Local Authentication ............................................... 10
3.4 Telnet Access Configuration Examples using Local Users with Password Security
disabled ..................................................................................................................................... 11
3.4.1 Local Password Configuration - Password Security Disabled ..................................................11
3.4.2 Verify Operations .....................................................................................................................12
3.4.3 Local Password Configuration - Password Security Enabled ...................................................13
4. IP Manager ............................................................................................................................ 14
4.1 IP Manager Configuration Example ............................................................................... 15
5. Telnet Password Protection using RADIUS Authentication ........................................... 16
5.1 Password Fallback ......................................................................................................... 17
5.2 Use Management IP ...................................................................................................... 18
5.3 RADIUS Password Configuration Example ................................................................... 19
5.3.1 Ethernet Routing Switch Configuration ....................................................................................19
5.3.2 IDE RADIUS Configuration ......................................................................................................20
6. TACACS+ .............................................................................................................................. 26
6.1 TACACS+ Configuration Example ................................................................................ 27
6.1.1 Ethernet Routing Switch Configuration ....................................................................................27
6.1.1.1 Ethernet Routing Switch Verify Operations .................................................................................. 27
6.1.2 IDE TACACS+ Configuration ...................................................................................................28
7. SSHv2 ................................................................................................................................... 33
7.1 SSH Configuration Examples ........................................................................................ 34
7.1.1 SSH using Password Authentication ........................................................................................34
7.1.2 Verify Operations .....................................................................................................................37
7.1.3 SSH using Public Key Authentication .......................................................................................38
7.1.4 Verify Operations .....................................................................................................................43
8. WEB Access – Enterprise Device Manager ...................................................................... 44
9. Secure Socket Layer Protocol – SSL................................................................................. 45
10. Simple Network Management Protocol - SNMP ........................................................... 47
10.1 SNMP Basic Operations ................................................................................................ 47
10.2 SNMPv1 Community Strings ......................................................................................... 47
10.3 SNMP MIB View ............................................................................................................ 48
10.4 SNMP Trap Receivers ................................................................................................... 49
10.5 SNMP System Name, Contact, and Location ............................................................... 50
10.6 Disable SNMPv1 and SNMPv2 ..................................................................................... 50
10.7 SNMPv3 ......................................................................................................................... 51
10.8 Enabling Secure SNMP ................................................................................................. 52