Admin Guide

Table Of Contents
Chapter 11: Network Time Protocol.................................................................................... 133
NTP fundamentals............................................................................................................... 133
Overview......................................................................................................................  133
NTP system implementation model................................................................................. 134
Time distribution within a subnet..................................................................................... 135
Synchronization............................................................................................................  135
NTP modes of operation................................................................................................  135
NTP authentication........................................................................................................ 136
NTP configuration using ACLI..............................................................................................  137
Enabling NTP globally...................................................................................................  139
Adding an NTP server...................................................................................................  140
Configuring authentication keys...................................................................................... 141
NTP configuration using EDM..............................................................................................  142
Enabling NTP globally...................................................................................................  144
Adding an NTP server...................................................................................................  144
Configuring authentication keys...................................................................................... 145
Chapter 12: Secure Shell...................................................................................................... 147
Secure Shell fundamentals................................................................................................... 147
SSH rekeying................................................................................................................ 158
Secure Shell configuration using ACLI..................................................................................  158
Downloading the software.............................................................................................. 159
Enabling the SSHv2 server............................................................................................  159
Changing the SSH server authentication mode................................................................ 160
Setting SSH configuration parameters............................................................................. 161
Verifying and displaying SSH configuration information....................................................  166
Connecting to a remote host using the SSH client............................................................ 167
Generating user key files...............................................................................................  168
Managing an SSL certificate........................................................................................... 169
Disabling SFTP without disabling SSH............................................................................  170
Enabling SSH rekey......................................................................................................  170
Configuring SSH rekey data-limit....................................................................................  171
Configuring SSH rekey time-interval................................................................................ 172
Displaying SSH rekey information................................................................................... 172
Downgrading or upgrading from releases that support different key sizes..........................  173
Secure Shell configuration using Enterprise Device Manager.................................................. 174
Downloading the software.............................................................................................. 174
Changing Secure Shell parameters................................................................................. 175
Chapter 13: System access.................................................................................................  178
System access fundamentals...............................................................................................  178
Logging on to the system...............................................................................................  178
Managing the system using different VRF contexts..........................................................  181
ACLI passwords............................................................................................................ 181
Access policies for services............................................................................................ 182
Contents
January 2017 Administering Avaya VSP 7200 Series and 8000 Series 7
Comments on this document? infodev@avaya.com