Privilege Level; Configuring Usernames; Ssh Protocol Support - Avaya G250 Administration

Media gateways
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Privilege level

When you start to use Avaya G350 Manager or the CLI, you must enter a username. The
username that you enter sets your privilege level. The commands that are available to you
during the session depend on your privilege level. If you use RADIUS authentication, the
RADIUS server sets your privilege level.
The G250/G350 provides the following three privilege levels:
Read-only — You can use Read-only privilege level to view configuration parameters.
Read-write — You can use Read-write privilege level to view and change all configuration
parameters except those related to security. For example, you cannot change a password
with Read-write privilege level.
Admin — You can use Admin privilege level to view and change all configuration
parameters, including parameters related to security. Use Admin privilege level only when
you need to change configuration that is related to security, such as adding new user
accounts and setting the device policy manager source.
The default username has Admin privilege level. For security reasons, the network
administrator usually changes the password of the default username. For more information
about privilege levels, see Avaya G250 and Avaya G350 CLI Reference, 03-300437.

Configuring usernames

To create a username, use the username command. To remove a username, use the no
username command. To change the password or the privilege level for a username, remove
the username and add it again. You need an Admin privilege level to use the username and no
username commands.
When you create a new user, you must define the user's password and privilege level. The
following example creates a user named John with the password johnny69 and a Read-write
privilege level:
G350-001(super)#
read-write

SSH protocol support

Secure Shell (SSH) protocol is a security protocol that enables you to establish a remote
session over a secured tunnel, also called a remote shell. SSH accomplishes this by creating a
transparent, encrypted channel between the local and remote devices. In addition to the remote
shell, SSH provides secure file transfer between the local and remote devices. SSH is used for
telnet file transfers. The G250/G350 supports two concurrent SSH users.
username john password johnny69 access-type
Managing login permissions
Issue 3 February 2007
45

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents