Table of Contents
Conventions ................................................................................................................................... 4
1.
Overview ................................................................................................................................. 5
2.
Management IP Address ....................................................................................................... 6
3.
Local password protection ................................................................................................... 7
3.1
3.2
Password Security ........................................................................................................... 8
3.3
3.4
disabled ..................................................................................................................................... 11
3.4.1
3.4.2
Verify Operations .....................................................................................................................12
3.4.3
4.
IP Manager ............................................................................................................................ 14
4.1
5.
5.1
Password Fallback ......................................................................................................... 17
5.2
Use Management IP ...................................................................................................... 18
5.3
5.3.1
5.3.2
IDE RADIUS Configuration ......................................................................................................20
6.
TACACS+ .............................................................................................................................. 26
6.1
6.1.1
6.1.1.1
6.1.2
IDE TACACS+ Configuration ...................................................................................................28
7.
SSHv2 ................................................................................................................................... 33
7.1
7.1.1
7.1.2
Verify Operations .....................................................................................................................37
7.1.3
7.1.4
Verify Operations .....................................................................................................................43
8.
9.
10.
10.1
SNMP Basic Operations ................................................................................................ 47
10.2
10.3
SNMP MIB View ............................................................................................................ 48
10.4
SNMP Trap Receivers ................................................................................................... 49
10.5
10.6
10.7
SNMPv3 ......................................................................................................................... 51
10.8
Enabling Secure SNMP ................................................................................................. 52
Avaya Inc. - External Distribution
avaya.com
2