EasyManuals Logo

Foundry Networks Switch and Router User Manual

Default Icon
1070 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #5 background imageLoading...
Page #5 background image
December 2000 v
SETTING A TELNET PASSWORD ...........................................................................................................3-9
S
ETTING PASSWORDS FOR MANAGEMENT PRIVILEGE LEVELS ..............................................................3-10
R
ECOVERING FROM A LOST PASSWORD ..............................................................................................3-11
D
ISPLAYING THE SNMP COMMUNITY STRING ......................................................................................3-12
D
ISABLING PASSWORD ENCRYPTION ...................................................................................................3-12
SETTING UP LOCAL USER ACCOUNTS .......................................................................................................3-12
C
ONFIGURING A LOCAL USER ACCOUNT .............................................................................................3-13
E
STABLISHING SNMP COMMUNITY STRINGS .............................................................................................3-14
ENCRYPTION OF SNMP COMMUNITY STRINGS ...................................................................................3-15
A
DDING AN SNMP COMMUNITY STRING .............................................................................................3-15
D
ISPLAYING THE SNMP COMMUNITY STRINGS ....................................................................................3-16
CONFIGURING TACACS/TACACS+ SECURITY .........................................................................................3-18
H
OW TACACS+ DIFFERS FROM TACACS .........................................................................................3-18
TACACS/TACACS+ A
UTHENTICATION, AUTHORIZATION, AND ACCOUNTING .......................................3-18
TACACS/TACACS+ CONFIGURATION CONSIDERATIONS ....................................................................3-22
I
DENTIFYING THE TACACS/TACACS+ SERVERS ...............................................................................3-22
S
ETTING OPTIONAL TACACS/TACACS+ PARAMETERS .....................................................................3-23
C
ONFIGURING AUTHENTICATION-METHOD LISTS FOR TACACS/TACACS+ .........................................3-24
C
ONFIGURING TACACS+ AUTHORIZATION .........................................................................................3-25
C
ONFIGURING TACACS+ ACCOUNTING ..............................................................................................3-27
C
ONFIGURING AN INTERFACE AS THE SOURCE FOR ALL TACACS/TACACS+ PACKETS ......................3-27
D
ISPLAYING TACACS/TACACS+ STATISTICS AND CONFIGURATION INFORMATION ..............................3-28
C
ONFIGURING RADIUS SECURITY ............................................................................................................3-33
RADIUS A
UTHENTICATION, AUTHORIZATION, AND ACCOUNTING ..........................................................3-33
RADIUS C
ONFIGURATION CONSIDERATIONS ......................................................................................3-36
RADIUS C
ONFIGURATION PROCEDURE ..............................................................................................3-36
C
ONFIGURING FOUNDRY-SPECIFIC ATTRIBUTES ON THE RADIUS SERVER ..........................................3-36
I
DENTIFYING THE RADIUS SERVER TO THE FOUNDRY DEVICE ............................................................3-37
S
ETTING RADIUS PARAMETERS ........................................................................................................3-38
C
ONFIGURING AUTHENTICATION-METHOD LISTS FOR RADIUS ............................................................3-38
C
ONFIGURING RADIUS AUTHORIZATION .............................................................................................3-40
C
ONFIGURING RADIUS ACCOUNTING .................................................................................................3-40
C
ONFIGURING AN INTERFACE AS THE SOURCE FOR ALL RADIUS PACKETS .........................................3-41
D
ISPLAYING RADIUS CONFIGURATION INFORMATION ..........................................................................3-42
C
ONFIGURING AUTHENTICATION-METHOD LISTS ........................................................................................3-47
C
ONFIGURATION CONSIDERATIONS FOR AUTHENTICATION-METHOD LISTS ............................................3-48
E
XAMPLES OF AUTHENTICATION-METHOD LISTS ..................................................................................3-48
CHAPTER 4
C
ONFIGURING SECURE SHELL..................................................................... 4-1
SETTING THE HOST NAME AND DOMAIN NAME .............................................................................................4-2
G
ENERATING A HOST RSA KEY PAIR ..........................................................................................................4-2
P
ROVIDING THE PUBLIC KEY TO CLIENTS ..............................................................................................4-2
C
ONFIGURING RSA CHALLENGE-RESPONSE AUTHENTICATION .....................................................................4-3
I
MPORTING AUTHORIZED PUBLIC KEYS INTO THE FOUNDRY DEVICE .......................................................4-3

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Foundry Networks Switch and Router and is the answer not in the manual?

Foundry Networks Switch and Router Specifications

General IconGeneral
BrandFoundry Networks
ModelSwitch and Router
CategorySwitch
LanguageEnglish

Related product manuals