Motorola WiNG 4.4 Reference Manual page 11

Table of Contents

Advertisement

6.6.3 Viewing SA Statistics ......................................................................................................................................................................6-69
6.7 Configuring IPSec VPN ...............................................................................................................................................................................6-71
6.7.1 Defining the IPSec Configuration ....................................................................................................................................................6-72
6.7.2 Defining the IPSec VPN Remote Configuration ..............................................................................................................................6-76
6.7.3 Configuring IPSEC VPN Authentication ...........................................................................................................................................6-78
6.7.4 Configuring Crypto Maps ................................................................................................................................................................6-80
6.7.5 Viewing IPSec Security Associations ..............................................................................................................................................6-88
6.8 Configuring the Radius Server ....................................................................................................................................................................6-90
6.8.1 Radius Overview ..............................................................................................................................................................................6-90
6.8.2 Using the Switch's Radius Server Versus an External Radius ........................................................................................................6-92
6.8.3 Defining the Radius Configuration ..................................................................................................................................................6-92
6.8.4 Configuring Radius Authentication and Accounting .......................................................................................................................6-95
6.8.5 Configuring Radius Users ................................................................................................................................................................6-98
6.8.6 Configuring Radius User Groups ...................................................................................................................................................6-100
6.8.7 Viewing Radius Accounting Logs ..................................................................................................................................................6-103
6.9 Creating Server Certificates .....................................................................................................................................................................6-105
6.9.1 Using Trustpoints to Configure Certificates ..................................................................................................................................6-105
6.9.2 Configuring Trustpoint Associated Keys .......................................................................................................................................6-115
6.10 Configuring Enhanced Beacons and Probes ...........................................................................................................................................6-118
6.10.1 Configuring the Beacon Table .....................................................................................................................................................6-118
6.10.2 Configuring the Probe Table ........................................................................................................................................................6-120
6.10.3 Reviewing Found Beacons ..........................................................................................................................................................6-121
6.10.4 Reviewing Found Probes .............................................................................................................................................................6-122
7.1 Displaying the Management Access Interface ............................................................................................................................................7-2
7.2 Configuring Access Control ..........................................................................................................................................................................7-3
7.3 Configuring SNMP Access ...........................................................................................................................................................................7-5
7.3.1 Configuring SNMP v1/v2 Access ......................................................................................................................................................7-5
7.3.2 Configuring SNMP v3 Access ...........................................................................................................................................................7-7
7.3.3 Accessing SNMP v2/v3 Statistics .....................................................................................................................................................7-9
7.3.4 Message Parameters ......................................................................................................................................................................7-10
7.4 Configuring SNMP Traps ............................................................................................................................................................................7-11
7.4.1 Enabling Trap Configuration ............................................................................................................................................................7-11
7.4.2 Configuring Trap Thresholds ...........................................................................................................................................................7-14
7.5 Configuring SNMP Trap Receivers .............................................................................................................................................................7-17
7.5.1 Editing SNMP Trap Receivers .........................................................................................................................................................7-18
7.5.2 Adding SNMP Trap Receivers .........................................................................................................................................................7-18
7.6 Creating and Managing Users ....................................................................................................................................................................7-20
7.6.1 Configuring Local Users ..................................................................................................................................................................7-20
7.6.2 Configuring Switch Authentication .................................................................................................................................................7-25
8.1 Displaying the Main Diagnostic Interface ....................................................................................................................................................8-2
8.1.1 Switch Environment ..........................................................................................................................................................................8-2
8.1.2 CPU Performance ...............................................................................................................................................................................8-3
8.1.3 Switch Memory Allocation ................................................................................................................................................................8-4
8.1.4 Switch Disk Allocation ......................................................................................................................................................................8-5
8.1.5 Switch Memory Processes ................................................................................................................................................................8-5
8.1.6 Other Switch Resources ....................................................................................................................................................................8-6
8.2 Configuring System Logging .........................................................................................................................................................................8-8
8.2.1 Log Options ........................................................................................................................................................................................8-8
Table of Contents
ix

Advertisement

Table of Contents
loading

Table of Contents