Design Reference

Table Of Contents
If you must access the switch, Avaya recommends that you use the console port. The switch is
always reachable, even if an issue occurs with the in-band network management interface.
Management access control
The following table shows management access levels. For more information, see Security for Avaya
Virtual Services Platform 4000 Series, NN46251-601.
Note:
If you enable enhanced secure mode, the following access levels do not apply. If enhanced
secure mode is enabled, the system supports role-based access levels. For more information
on enhanced secure mode, see Administration for Avaya Virtual Services Platform 4000 Series,
NN46251-600. Enhanced secure mode is disabled by default.
Table 19: Management access levels
Access level Description
Read only Use this level to view the device configuration. You cannot
change the configuration.
Layer 1 Read Write Use this level to view switch configuration and status
information and change only physical port parameters.
Layer 2 Read Write Use this level to view and edit device configuration related to
Layer 2 (bridging) functionality. The Layer 3 configuration, for
example, OSPF and DHCP, are not accessible. You cannot
change the security and password configuration.
Layer 3 Read Write Use this level to view and edit device configuration related to
Layer 2 (bridging) and Layer 3 (routing). You cannot change the
security and password configuration.
Read Write Use this level to view and edit most device configuration. You
cannot change the security and password configuration.
Read Write All Use this level to do everything. You have all the privileges of
read-write access and the ability to change the security
configuration. The security configuration includes access
passwords and the web-based management user names and
passwords.
Read-Write-All (RWA) is the only level from which you can
modify usernames, passwords, and SNMP community strings,
with the exception of the RWA community string, which cannot
be changed.
High Secure mode
Use High Secure to disable all unsecured applications and daemons, for example, FTP, TFTP, and
rlogin. Avaya strongly recommends that you do not use unsecured protocols. See also
High Secure
mode on page 151.
Use Secure File Transfer Protocol (SFTP) rather than FTP or TFTP.
System and network stability and security
156 Network Design Reference for Avaya VSP 4000 Series June 2015
Comments on this document? infodev@avaya.com