Introduction And Configuration - Allied Telesis SwitchBlade x908 Series Software Reference Manual

Switchblade x908/x900 series alliedware plus operating system software reference for version 5.3.1
Hide thumbs Also See for SwitchBlade x908 Series:
Table of Contents

Advertisement

Chapter 55. Authentication Commands ..........................................................................55.1
Chapter 56. AAA Introduction and Configuration..........................................................56.1
AAA Introduction......................................................................................................................................................................................56.2
Available functions and server types ............................................................................................................................56.2
Server Groups and Method Lists ...................................................................................................................................56.2
Configuring AAA Login Authentication........................................................................................................................................56.4
AAA Configuration Tasks...................................................................................................................................................56.4
Chapter 57. AAA Commands............................................................................................57.1
Chapter 58. RADIUS Commands......................................................................................58.1
Local RADIUS Server Introduction................................................................................................................................................59.2
Enable the Local RADIUS Server...................................................................................................................................59.2
Add the Local RADIUS Server as a RADIUS Server..........................................................................................59.3
Add authenticators to the list of authenticators....................................................................................................59.3
Configure the Local RADIUS Server User Database .........................................................................................59.3
Authenticating login sessions.............................................................................................................................................59.4
Creating certificates for single users and all users.................................................................................................59.6
Defined RADIUS attributes list........................................................................................................................................59.6
Chapter 60. Local RADIUS Server Commands..............................................................60.1
Chapter 61. Secure Shell (SSH) Introduction..................................................................61.1
Introduction...................................................................................................................................................................................................61.2
Configuring the SSH Server .................................................................................................................................................................61.3
Creating a Host Key...............................................................................................................................................................61.3
Enabling the Server.................................................................................................................................................................61.4
Modifying the Server..............................................................................................................................................................61.4
Validating the Server Configuration ..............................................................................................................................61.5
Adding SSH Users...................................................................................................................................................................61.5
Authenticating SSH Users...................................................................................................................................................61.6
Adding a Login Banner .........................................................................................................................................................61.6
Monitoring the Server and Managing Sessions .......................................................................................................61.7
Debugging the Server............................................................................................................................................................61.7
Configuring the SSH Client ..................................................................................................................................................................61.8
Modifying the Client...............................................................................................................................................................61.8
Adding SSH Servers ...............................................................................................................................................................61.9
Authenticating with a Server.............................................................................................................................................61.9
Connecting to a Server and Running Commands................................................................................................61.9
Copying files to and from the Server........................................................................................................................61.10
Debugging the Client..........................................................................................................................................................61.10
Chapter 62. Secure Shell Configuration ...........................................................................62.1
Configuring the SSH Server ................................................................................................................................................................62.2
C613-50007-01 REV B
TM
Software Reference for SwitchBlade® x908 and x900 Series Switches
TM
AlliedWare Plus
Operating System - Software Version 5.3.1
OS.............................................................................................................61.2
xiii

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents