Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this document
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Enabling or disabling the USB port
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Secure Shell fundamentals
- Secure Shell configuration using ACLI
- Downloading the software
- Enabling the SSHv2 server
- Changing the SSH server authentication mode
- Setting SSH configuration parameters
- Verifying and displaying SSH configuration information
- Connecting to a remote host using the SSH client
- Generating user key files
- Managing an SSL certificate
- Disabling SFTP without disabling SSH
- Enabling SSH rekey
- Configuring SSH rekey data-limit
- Configuring SSH rekey time-interval
- Displaying SSH rekey information
- Downgrading or upgrading from releases that support different key sizes
- Secure Shell configuration using Enterprise Device Manager
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
Managing the system using different VRF contexts
You can use the Enterprise Device Manager (EDM) to manage the system using different Virtual
Router Forwarding (VRF) contexts.
• Using the GlobalRouter (VRF 0), you can manage the entire system. GlobalRouter is the
default view at log in
• Using a VRF context other than the GlobalRouter (VRF 0), you have limited functionality to
manage the system. For instance you can only manage the ports assigned to the specified
VRF instance
Specify the VRF instance name on the EDM screen when you launch a VRF context view. You can
use the context names (SNMPv3) and community strings (SNMPv1/v2) to assign different VRFs to
manage selected components, such as ports and VLANs. For more information about context
names and community strings, see Configuring Security on Avaya Virtual Services Platform 7200
Series and 8000 Series, NN47227-601.
ACLI passwords
The switch ships with default passwords set for access to ACLI through a console or Telnet session.
If you possess read-write-all access authority, and you use SNMPv3, then you can change
passwords in encrypted format. If you use Enterprise Device Manager (EDM), then you can also
specify the number of allowed Telnet sessions and rlogin sessions.
Important:
Be aware that the default passwords and community strings are documented and well known.
Avaya strongly recommends that you change the default passwords and community strings
immediately after the first logon.
For security, if you fail to log on correctly on the device in three consecutive instances, then the
device locks for 60 seconds.
The switch stores passwords in encrypted format and not in the configuration file.
Subscriber or administrative interaction
As a network administrator, you can configure the RADIUS server for user authentication to override
user access to commands. You must still provide access based on the existing access levels in the
switch, but you can customize user access by allowing and denying specific commands.
You must configure the following three returnable attributes for each user:
• Access priority (single instance)–the access levels currently available on the switch (ro, l1, l2,
l3, rw, rwa)
• Command access (single instance)–indicates whether the user has access to the commands
on the RADIUS server
• ACLI commands (multiple instances)–the list of commands that the user can or cannot use
System access fundamentals
January 2017 Administering Avaya VSP 7200 Series and 8000 Series 181
Comments on this document? infodev@avaya.com










