User guide
Configure Security Features
Chapter 1 Command Line Configuration Tasks 35
Configure Security Features
From the command line, you can configure several security-related
features to do the following:
• Control access to the configuration.
• Control access to inbound ports.
• Control access to outbound ports.
• Restrict access to outbound ports.
• Use CHAP authentication for PPP users.
• Control user access to the command line.
• Use RADIUS to authenticate users.
• Issue user passwords.
• Configure SSH Version 2 for secure communication.
Control Access to the Configuration
User access to Digi device configuration settings can be controlled by
either of the following methods:
• Through user attributes configured by various “set user” command
options.
• Through network settings configured by the set user” “network” option.
Controlling access of the device server restricts access to the configuration
by defining the following types of users:
• The “root” user, who has unlimited access to device server commands.
This “root” user can view any configuration table and change any
configuration option. The root is identified by the user name “root” and
must supply a password to be authenticated. The default root password
is “dbps.” You should change this password immediately.
• Regular users, who have much more restricted access to device server
commands. Regular users can view some configuration tables and can
change some configuration options related to their own sessions and
passwords. For information on the limitations placed on regular users
for each command see "set user" on page 230.