User Manual UMN:CLI
SURPASS hiD 6615 S223/S323 R1.5
A50010-Y3-C150-2-7619 5
4.2.2 Authentication Interface.....................................................................................50
4.2.3 Primary Authentication Method .........................................................................50
4.2.4 RADIUS Server .................................................................................................51
4.2.4.1 RADIUS Server for System Authentication .......................................................51
4.2.4.2 RADIUS Server Priority .....................................................................................51
4.2.4.3 Timeout of Authentication Request....................................................................51
4.2.4.4 Frequency of Retransmit ...................................................................................52
4.2.5 TACACS Server.................................................................................................52
4.2.5.1 TACACS Server for System Authentication.......................................................52
4.2.5.2 TACACS Server Priority ....................................................................................52
4.2.5.3 Timeout of Authentication Request....................................................................52
4.2.5.4 Additional TACACS+ Configuration...................................................................53
4.2.6 Accounting Mode...............................................................................................54
4.2.7 Displaying System Authentication .....................................................................54
4.2.8 Sample Configuration........................................................................................55
4.3 Assigning IP Address.........................................................................................56
4.3.1 Enabling Interface..............................................................................................57
4.3.2 Disabling Interface.............................................................................................57
4.3.3 Assigning IP Address to Network Interface .......................................................58
4.3.4 Static Route and Default Gateway ....................................................................58
4.3.5 Displaying Forwarding Information Base(FIB) Table.........................................59
4.3.6 Forwarding Information Base(FIB) Retain.........................................................59
4.3.7 Displaying Interface ...........................................................................................60
4.3.8 Sample Configuration........................................................................................60
4.4 SSH (Secure Shell) ...........................................................................................61
4.4.1 SSH Server........................................................................................................61
4.4.1.1 Enabling SSH Server.........................................................................................61
4.4.1.2 Displaying On-line SSH Client...........................................................................61
4.4.1.3 Disconnecting SSH Client .................................................................................61
4.4.1.4 Displaying Connection History of SSH Client....................................................61
4.4.1.5 Assigning Specific Authentication Key...............................................................62
4.4.2 SSH Client .........................................................................................................62
4.4.2.1 Login to SSH Server..........................................................................................62
4.4.2.2 File Copy ...........................................................................................................62
4.4.2.3 Configuring Authentication Key .........................................................................62
4.5 802.1x Authentication ........................................................................................64
4.5.1 802.1x Authentication ........................................................................................65
4.5.1.1 Enabling 802.1x.................................................................................................65
4.5.1.2 Configuring RADIUS Server..............................................................................65
4.5.1.3 Configuring Authentication Mode ......................................................................66
4.5.1.4 Authentication Port ............................................................................................67
4.5.1.5 Force Authorization............................................................................................67
4.5.1.6 Configuring Interval for Retransmitting Request/Identity Packet ......................67
4.5.1.7 Configuring Number of Request to RADIUS Server .........................................68
4.5.1.8 Configuring Interval of Request to RADIUS Server ..........................................68
4.5.2 802.1x Re-Authentication ..................................................................................68
4.5.2.1 Enabling 802.1x Re-Authentication ...................................................................68
4.5.2.2 Configuring the Interval of Re-Authentication ...................................................69
4.5.2.3 Configuring the Interval of Requesting Re-authentication.................................69
4.5.2.4 802.1x Re-authentication ..................................................................................69
4.5.3 Initializing Authentication Status ........................................................................70