Ssh Protocol Support - Avaya G350 Administration

Hide thumbs Also See for G350:
Table of Contents

Advertisement

If your network has a RADIUS server, you can use RADIUS authentication instead of a username and
password. A RADIUS server provides centralized authentication service for many devices on a network.
For more information, see
Privilege level
When you start to use Avaya G350 Manager or the CLI, you must enter a username. The username that
you enter sets your privilege level. The commands that are available to you during the session depend on
your privilege level. If you use RADIUS authentication, the RADIUS server sets your privilege level.
The G350 provides the following three privilege levels:
Read-only — You can use Read-only privilege level to view configuration parameters.
Read-write — You can use Read-write privilege level to view and change all configuration
parameters except those related to security. For example, you cannot change a password with
Read-write privilege level.
Admin — You can use Admin privilege level to view and change all configuration parameters,
including parameters related to security. Use Admin privilege level only when you need to change
configuration that is related to security, such as adding new user accounts and setting the device
policy manager source.
The default username has Admin privilege level. For security reasons, the network administrator usually
changes the password of the default username. For more information about privilege levels, see Avaya™
G350 Media Gateway CLI Reference, 555-245-202.
Configuring usernames
To create a username, use the
command. To change the password or the privilege level for a username, remove the username and add it
again. You need an Admin privilege level to use the
When you create a new user, you must define the user's password and privilege level. The following
example creates a user named John with the password johnny and a Read-write privilege level:
G350-001> username john password johnny access-type read-write

SSH protocol support

SSH (Secure Shell) protocol is a security protocol that enables you to establish a remote session over a
secured tunnel, also called a remote shell. SSH accomplishes this by creating a transparent, encrypted
channel between the local and remote devices. In addition to the remote shell, SSH provides secure file
transfer between the local and remote devices. SSH is used for telnet file transfers. The G350 supports
two concurrent SSH users.
There are two ways to establish an SSH session:
RSA authentication
Password authentication
Administration of the Avaya G350 Media Gateway
June 2004
RADIUS authentication
on page 35.
command. To remove a username, use the
username
username
Accessing the Avaya G350 Media Gateway
Managing login permissions
no username
and
commands.
no username
33

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents