Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements using ACLI
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
Name Description
length. If the type is IPv6, you must enter an IPv6 address and
prefix length. You do not need to provide this information if you
select the NetInetAddrType of any.
TrustedHostInetAddr Indicates the trusted Inet address of a host performing a remote
login to the device. You do not need to provide this information
if you select the NetInetAddrType of any. TrustedHostInetAddr
applies only to rlogin and rsh.
Important:
You cannot use wildcard entries in the
TrustedHostInetAddr field.
If the type is IPv4, you must enter an IPv4 address and mask
length. If the type is IPv6, you must enter an IPv6 address and
prefix length.
TrustedHostUserName Specifies the user name assigned to the trusted host. The
trusted host name applies only to rlogin and rsh. Ensure that the
trusted host user name is the same as your network logon user
name; do not use the switch user name, for example, rwa.
Important:
You cannot use wildcard entries. The user must already be
logged in with the user name to be assigned to the trusted
host. For example, using "rlogin -l newusername
xx.xx.xx.xx" does not work from a UNIX workstation.
AccessLevel Specifies the access level of the trusted host as one of the
following:
• readOnly
• readWrite
• readWriteAll
The default is readOnly.
Usage Counts the number of times this access policy applies.
AccessStrict Activates or disables strict access criteria for remote users.
If selected, a user must use an access level identical to the one
you selected in the dialog box to use this service.
• selected: remote login users can use only the currently
configured access level
• cleared: remote users can use all access levels
Important:
If you do not select true or false, user access is governed
by criteria specified in the policy table. For example, a user
Table continues…
System access configuration using EDM
October 2015 Administering Avaya VSP 7200 Series and 8000 Series 199
Comments on this document? infodev@avaya.com










