EasyManua.ls Logo

Avaya ERS 2500 - Default Chapter; Table of Contents

Avaya ERS 2500
62 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Avaya Inc. External Distribution
2
avaya.com
Table of Contents
Conventions ................................................................................................................................... 4
1. Overview ................................................................................................................................. 5
2. Management IP Address ....................................................................................................... 6
3. Local password protection ................................................................................................... 7
3.1 CLI/WEB Password Protection ........................................................................................ 7
3.2 Password Security ........................................................................................................... 8
3.3 Telnet Password Protection using Local Authentication ............................................... 10
3.4 Telnet Access Configuration Examples using Local Users with Password Security
disabled ..................................................................................................................................... 11
3.4.1 Local Password Configuration - Password Security Disabled ..................................................11
3.4.2 Verify Operations .....................................................................................................................12
3.4.3 Local Password Configuration - Password Security Enabled ...................................................13
4. IP Manager ............................................................................................................................ 14
4.1 IP Manager Configuration Example ............................................................................... 15
5. Telnet Password Protection using RADIUS Authentication ........................................... 16
5.1 Password Fallback ......................................................................................................... 17
5.2 Use Management IP ...................................................................................................... 18
5.3 RADIUS Password Configuration Example ................................................................... 19
5.3.1 Ethernet Routing Switch Configuration ....................................................................................19
5.3.2 IDE RADIUS Configuration ......................................................................................................20
6. TACACS+ .............................................................................................................................. 26
6.1 TACACS+ Configuration Example ................................................................................ 27
6.1.1 Ethernet Routing Switch Configuration ....................................................................................27
6.1.1.1 Ethernet Routing Switch Verify Operations .................................................................................. 27
6.1.2 IDE TACACS+ Configuration ...................................................................................................28
7. SSHv2 ................................................................................................................................... 33
7.1 SSH Configuration Examples ........................................................................................ 34
7.1.1 SSH using Password Authentication ........................................................................................34
7.1.2 Verify Operations .....................................................................................................................37
7.1.3 SSH using Public Key Authentication .......................................................................................38
7.1.4 Verify Operations .....................................................................................................................43
8. WEB Access Enterprise Device Manager ...................................................................... 44
9. Secure Socket Layer Protocol SSL................................................................................. 45
10. Simple Network Management Protocol - SNMP ........................................................... 47
10.1 SNMP Basic Operations ................................................................................................ 47
10.2 SNMPv1 Community Strings ......................................................................................... 47
10.3 SNMP MIB View ............................................................................................................ 48
10.4 SNMP Trap Receivers ................................................................................................... 49
10.5 SNMP System Name, Contact, and Location ............................................................... 50
10.6 Disable SNMPv1 and SNMPv2 ..................................................................................... 50
10.7 SNMPv3 ......................................................................................................................... 51
10.8 Enabling Secure SNMP ................................................................................................. 52

Table of Contents

Related product manuals