Configuring Asg Authentication - Avaya G450 Manual

Administration
Hide thumbs Also See for G450:
Table of Contents

Advertisement

Accessing the Avaya G450 Media Gateway

Configuring ASG authentication

You can perform the following ASG configurations:
Block Avaya Services login access, using no login authentication
services-logins. This deactivates all Avaya Services logins, including local craft
password-based authenticated login. To reactivate, use login authentication
services-logins.
Set the time the gateway waits for user response to authentication requests before timing
out a connection, using login authentication response-time time, where time
is the time, in seconds, after which the gateway aborts the connection if no response is
received.
For example, to timeout connections if no response arrives within 180 seconds after an
authentication request:
G450-001(super)# login authentication response-time 180
Use no login authentication response-time to return the response time value
to the factory default of 120 seconds. The time value you enter is used for both:
The response time interval between the username prompt and the username entry
The response time interval between the challenge prompt and the challenge response
Deactivate password authentication and activate ASG authentication of Avaya Services
local connections to the Console port and Services port. To do this, use no login
authentication local-craft-password. To enable password authentication of
Avaya Services local connections to the Console port and Services port, use login
authentication local-craft-password (default).
Set a policy for locking out access to the gateway after successive failed login attempts. To
do this, use login authentication lockout time attempt count, where time
is the interval of time for which lockout is enforced and count is a number of failed
attempts after which lockout is enforced. Use no login authentication lockout to
return the lockout time and lockout attempt threshold to their default values (180 and 3).
For example, to lockout Avaya Services access to the device for 360 seconds following
five failed login attempts:
G450-001(super)# login authentication lockout 360 attempt 5
This lockout affects all users locally stored in the gateway, including locally defined user
accounts and Avaya Services logins defined in the ASG authentication file. Remote users
maintained centrally in a Radius server are not subject to the lockout sanction.
58 Administration for the Avaya G450 Media Gateway

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents