
Avaya Inc. –External Distribution
Table of Contents
Conventions................................................................................................................................... 4
1. Overview................................................................................................................................. 5
2. Management IP Address....................................................................................................... 6
3. Local password protection................................................................................................... 7
3.1 CLI/WEB Password Protection........................................................................................ 7
3.2 Password Security........................................................................................................... 8
3.3 Telnet Password Protection using Local Authentication ............................................... 10
3.4 Telnet Access Configuration Examples using Local Users with Password Security
disabled ..................................................................................................................................... 11
3.4.1 Local Password Configuration - Password Security Disabled..................................................11
3.4.2 Verify Operations .....................................................................................................................12
3.4.3 Local Password Configuration - Password Security Enabled...................................................13
4. IP Manager............................................................................................................................ 14
4.1 IP Manager Configuration Example............................................................................... 15
5. Telnet Password Protection using RADIUS Authentication ........................................... 16
5.1 Password Fallback......................................................................................................... 17
5.2 Use Management IP...................................................................................................... 18
5.3 RADIUS Password Configuration Example................................................................... 19
5.3.1 Ethernet Routing Switch Configuration ....................................................................................19
5.3.2 IDE RADIUS Configuration ......................................................................................................20
6. TACACS+.............................................................................................................................. 26
6.1 TACACS+ Configuration Example ................................................................................ 27
6.1.1 Ethernet Routing Switch Configuration ....................................................................................27
6.1.1.1 Ethernet Routing Switch Verify Operations.................................................................................. 27
6.1.2 IDE TACACS+ Configuration...................................................................................................28
7. SSHv2 ................................................................................................................................... 33
7.1 SSH Configuration Examples........................................................................................ 34
7.1.1 SSH using Password Authentication........................................................................................34
7.1.2 Verify Operations .....................................................................................................................37
7.1.3 SSH using Public Key Authentication.......................................................................................38
7.1.4 Verify Operations .....................................................................................................................43
8. WEB Access –Enterprise Device Manager ...................................................................... 44
9. Secure Socket Layer Protocol –SSL................................................................................. 45
10. Simple Network Management Protocol - SNMP ........................................................... 47
10.1 SNMP Basic Operations................................................................................................ 47
10.2 SNMPv1 Community Strings......................................................................................... 47
10.3 SNMP MIB View............................................................................................................ 48
10.4 SNMP Trap Receivers................................................................................................... 49
10.5 SNMP System Name, Contact, and Location ............................................................... 50
10.6 Disable SNMPv1 and SNMPv2 ..................................................................................... 50
10.7 SNMPv3......................................................................................................................... 51
10.8 Enabling Secure SNMP................................................................................................. 52