Avaya G430 Manual page 42

Administering branch gateway
Hide thumbs Also See for G430:
Table of Contents

Advertisement

Accessing the Branch Gateway
authenticated login. To reactivate, use login authentication services-
logins.
• Set the time the gateway waits for user response to authentication requests before timing
out a connection, using login authentication response-time time, where
time is the time, in seconds, after which the gateway aborts the connection if no response
is received.
For example, to timeout connections if no response arrives within 180 seconds after an
authentication request:
Gxxx-001(super)# login authentication response-time 180
Use no login authentication response-time to return the response time value
to the factory default of 120 seconds. The time value you enter is used for both:
- The response time interval between the username prompt and the username entry
- The response time interval between the challenge prompt and the challenge
response
• Deactivate password authentication and activate ASG authentication of Avaya Services
local connections to the Services port. To do this, use no login authentication
local-craft-password. To enable password authentication of Avaya Services local
connections to the Services port, use login authentication local-craft-
password (default).
• Set a policy for locking out access to the gateway after successive failed login attempts.
To do this, use login authentication lockout time attempt count, where time
is the interval of time for which lockout is enforced and count is a number of failed
attempts after which lockout is enforced. Use no login authentication
lockout to return the lockout time and lockout attempt threshold to their default values
(180 and 3).
For example, to lockout Avaya Services access to the device for 360 seconds following
five failed login attempts:
Gxxx-001(super)# login authentication lockout 360 attempt 5
This lockout affects all users locally stored in the gateway, including locally defined user
accounts and Avaya Services logins defined in the ASG authentication file. Remote users
maintained centrally in a Radius server are not subject to the lockout sanction.
• Switch between modem operation modes, including rasaccess and ppp modes, using
ppp authentication {pap|chap|none|ras}. ASG authentication is enabled
when ras is selected. For example:
Gxxx-001(super)# ppp authentication ras
42
Administering Avaya G430 Branch Gateway
Comments? infodev@avaya.com
October 2013

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents