Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X Configuration Manual page 19

System basics configuration guide software for e series broadband services routers
Table of Contents

Advertisement

Commands and Guidelines ...................................................................419
Setting and Erasing Passwords ....................................................................421
Privilege Levels .....................................................................................421
Accessing Privilege Levels ..............................................................422
Setting Enable Passwords .....................................................................422
Erasing Enable Passwords ....................................................................422
Setting a Console Password ..................................................................424
Erasing the Console Password ..............................................................425
Monitoring Passwords ...........................................................................426
Vty Line Authentication and Authorization ..................................................427
Configuring Simple Authentication .......................................................427
Virtual Terminal Access Lists .......................................................................434
Secure System Administration with SSH .....................................................435
Transport ..............................................................................................436
User Authentication ..............................................................................437
Connection ...........................................................................................437
Key Management ..................................................................................437
User Key Management ...................................................................437
Host Key Management ...................................................................437
Performance .........................................................................................438
Security Concerns .................................................................................438
Before You Configure SSH ....................................................................439
SSH Configuration Tasks .......................................................................439
Configuring Encryption ..................................................................439
Configuring User Authentication .....................................................440
Configuring Message Authentication ..............................................442
Enabling and Disabling SSH ...........................................................443
Displaying SSH Status .....................................................................444
Terminating an SSH Session ...........................................................445
Restricting User Access ...............................................................................446
Restricting Access to Commands with RADIUS .....................................446
Per-User Enable Authentication ............................................................447
Restricting Access to Virtual Routers .....................................................447
VSA Configuration Examples ..........................................................448
Commands Available to Users ........................................................449
Denial of Service (DoS) Protection ...............................................................450
Suspicious Control Flow Detection ........................................................451
Suspicious Control Flow Monitoring ......................................................452
Configurable Options ............................................................................453
Display Options ....................................................................................453
Traps and Logs .....................................................................................453
Suspicious Control Flow Commands .....................................................454
Monitoring Suspicious Control Flow ......................................................456
Denial-of-Service Protection Groups ......................................................461
Group Parameters .................................................................................461
Attaching Groups ..................................................................................462
Protocol Mapping ..................................................................................462
DoS Protection Group Configuration Example ......................................465
DoS Protection Group Commands ........................................................466
Monitoring DoS Protection Groups ........................................................472
Table of Contents
xix
Table of Contents

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.1

Table of Contents