Alcatel Carrier Internetworking Solutions omniswitch Switch User Manual


 
Contents
viiiOmniSwitch 6600 Family Switch Management Guide March 2005
Default User Settings ...............................................................................................7-7
How User Settings Are Saved ..................................................................................7-7
Creating a User ................................................................................................................7-8
Removing a User ......................................................................................................7-8
User-Configured Password ......................................................................................7-8
Setting a Minimum Password Size ...........................................................................7-9
Configuring Password Expiration ............................................................................7-9
Default Password Expiration .............................................................................7-9
Specific User Password Expiration .................................................................7-10
Configuring Privileges for a User .................................................................................7-11
Setting Up SNMP Access for a User Account ..............................................................7-12
SNMP Access Without Authentication/Encryption ...............................................7-12
SNMP Access With Authentication/Encryption ....................................................7-13
Removing SNMP Access From a User ..................................................................7-13
Setting Up End-User Profiles ........................................................................................7-14
Creating End-User Profiles ....................................................................................7-15
Setting Up Port Ranges in a Profile .......................................................................7-15
Setting Up VLAN Ranges in a Profile ...................................................................7-15
Associating a Profile With a User ..........................................................................7-16
Removing a Profile From the Configuration ..........................................................7-16
Verifying the User Configuration .................................................................................7-16
Chapter 8 Managing Switch Security ........................................................................................8-1
In This Chapter ................................................................................................................8-1
Switch Security Specifications ........................................................................................8-2
Switch Security Defaults .................................................................................................8-2
Switch Security Overview ...............................................................................................8-3
Authenticated Switch Access ..........................................................................................8-4
AAA Servers—RADIUS or LDAP ..........................................................................8-4
Authentication-only—ACE/Server ..........................................................................8-4
Interaction With the User Database .........................................................................8-5
ASA and Authenticated VLANs ..............................................................................8-5
Configuring Authenticated Switch Access .....................................................................8-6
Quick Steps for Setting Up ASA ....................................................................................8-7
Setting Up Management Interfaces for ASA ..................................................................8-9
Enabling Switch Access .........................................................................................8-10
Configuring the Default Setting .............................................................................8-10
Using Secure Shell .................................................................................................8-11
Configuring Accounting for ASA .................................................................................8-12
Verifying the ASA Configuration .................................................................................8-13