EasyManua.ls Logo

Foundry Networks Switch and Router - Page 5

Default Icon
1070 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
December 2000 v
SETTING A TELNET PASSWORD ...........................................................................................................3-9
S
ETTING PASSWORDS FOR MANAGEMENT PRIVILEGE LEVELS ..............................................................3-10
R
ECOVERING FROM A LOST PASSWORD ..............................................................................................3-11
D
ISPLAYING THE SNMP COMMUNITY STRING ......................................................................................3-12
D
ISABLING PASSWORD ENCRYPTION ...................................................................................................3-12
SETTING UP LOCAL USER ACCOUNTS .......................................................................................................3-12
C
ONFIGURING A LOCAL USER ACCOUNT .............................................................................................3-13
E
STABLISHING SNMP COMMUNITY STRINGS .............................................................................................3-14
ENCRYPTION OF SNMP COMMUNITY STRINGS ...................................................................................3-15
A
DDING AN SNMP COMMUNITY STRING .............................................................................................3-15
D
ISPLAYING THE SNMP COMMUNITY STRINGS ....................................................................................3-16
CONFIGURING TACACS/TACACS+ SECURITY .........................................................................................3-18
H
OW TACACS+ DIFFERS FROM TACACS .........................................................................................3-18
TACACS/TACACS+ A
UTHENTICATION, AUTHORIZATION, AND ACCOUNTING .......................................3-18
TACACS/TACACS+ CONFIGURATION CONSIDERATIONS ....................................................................3-22
I
DENTIFYING THE TACACS/TACACS+ SERVERS ...............................................................................3-22
S
ETTING OPTIONAL TACACS/TACACS+ PARAMETERS .....................................................................3-23
C
ONFIGURING AUTHENTICATION-METHOD LISTS FOR TACACS/TACACS+ .........................................3-24
C
ONFIGURING TACACS+ AUTHORIZATION .........................................................................................3-25
C
ONFIGURING TACACS+ ACCOUNTING ..............................................................................................3-27
C
ONFIGURING AN INTERFACE AS THE SOURCE FOR ALL TACACS/TACACS+ PACKETS ......................3-27
D
ISPLAYING TACACS/TACACS+ STATISTICS AND CONFIGURATION INFORMATION ..............................3-28
C
ONFIGURING RADIUS SECURITY ............................................................................................................3-33
RADIUS A
UTHENTICATION, AUTHORIZATION, AND ACCOUNTING ..........................................................3-33
RADIUS C
ONFIGURATION CONSIDERATIONS ......................................................................................3-36
RADIUS C
ONFIGURATION PROCEDURE ..............................................................................................3-36
C
ONFIGURING FOUNDRY-SPECIFIC ATTRIBUTES ON THE RADIUS SERVER ..........................................3-36
I
DENTIFYING THE RADIUS SERVER TO THE FOUNDRY DEVICE ............................................................3-37
S
ETTING RADIUS PARAMETERS ........................................................................................................3-38
C
ONFIGURING AUTHENTICATION-METHOD LISTS FOR RADIUS ............................................................3-38
C
ONFIGURING RADIUS AUTHORIZATION .............................................................................................3-40
C
ONFIGURING RADIUS ACCOUNTING .................................................................................................3-40
C
ONFIGURING AN INTERFACE AS THE SOURCE FOR ALL RADIUS PACKETS .........................................3-41
D
ISPLAYING RADIUS CONFIGURATION INFORMATION ..........................................................................3-42
C
ONFIGURING AUTHENTICATION-METHOD LISTS ........................................................................................3-47
C
ONFIGURATION CONSIDERATIONS FOR AUTHENTICATION-METHOD LISTS ............................................3-48
E
XAMPLES OF AUTHENTICATION-METHOD LISTS ..................................................................................3-48
CHAPTER 4
C
ONFIGURING SECURE SHELL..................................................................... 4-1
SETTING THE HOST NAME AND DOMAIN NAME .............................................................................................4-2
G
ENERATING A HOST RSA KEY PAIR ..........................................................................................................4-2
P
ROVIDING THE PUBLIC KEY TO CLIENTS ..............................................................................................4-2
C
ONFIGURING RSA CHALLENGE-RESPONSE AUTHENTICATION .....................................................................4-3
I
MPORTING AUTHORIZED PUBLIC KEYS INTO THE FOUNDRY DEVICE .......................................................4-3

Table of Contents

Related product manuals