Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements using ACLI
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
change interval, length, complexity, no consecutive repeating characters
or history requirements of the domain.
Password change interval rule
The system enforces a minimum password change interval, which defines the minimum amount of
time before you can change to a new password. By default, the minimum change interval is 24
hours between changing from one password to a new password. If you want to change your
password, and attempt to do so, the system checks the timestamp for your password to determine if
enough time has passed to allow you to change the password.
If you attempt to change the password and not enough time has passed, the system rejects the
request, and the system informs you that the password was recently changed. Any password
change outside of the enforced interval requires the Administrator to approve the change.
If you try to change the password before the change interval allows, the system displays the
following message:
Password change aborted. The new password does not meet the minimum
complexity requirement. Please select another password that meets the
change interval, length, complexity, no consecutive repeating characters
or history requirements of the domain.
Password reuse rule
After you enable enhanced secure mode, the administrator access level can define the number of
old passwords that cannot be reused. The password reuse rule ensures that recently used
passwords are not reused immediately, which reduces the risk of someone unlawfully gaining
access to the system. The default number of prohibited recently used passwords is 3, but you can
define up to 99.
The system saves the password history and stores the history in an encrypted format, along with the
user name, and date of change. If a particular user attempts to change a password, the system
looks up the password history list, and checks it against the stored passwords the user has
previously used. If the password is on the list of previously used passwords, the system rejects the
password change, and displays the following message:
Old password not allowed.
Password maximum age rule
The system enforces automatic password renewal and password lockout after the expiration period
because long-term usage of the same password can cause the system to be vulnerable to hacking.
You can configure the password expiration period to a range of 1 to 365 days. The default password
expiration period is 90 days.
Password max-session
The password max-sessions value indicates the maximum number of times a particular type of role-
based user can log in to the switch through the SSH session at the same time. The max-sessions
value applies only for SSH sessions, and only with enhanced secure mode enabled.
After the maximum session number is reached that particular type of user cannot login. For
example, if the max-sessions for an auditor user is configured as 5, then the auditor user can log in
to only five SSH sessions at the same time. The default is 3.
System access
October 2015 Administering Avaya VSP 7200 Series and 8000 Series 170
Comments on this document? infodev@avaya.com










