Admin Guide

Table Of Contents
NTP fundamentals............................................................................................................... 127
Overview......................................................................................................................  127
NTP system implementation model................................................................................. 128
Time distribution within a subnet..................................................................................... 129
Synchronization............................................................................................................  129
NTP modes of operation................................................................................................  129
NTP authentication........................................................................................................ 130
NTP configuration using ACLI..............................................................................................  131
Enabling NTP globally...................................................................................................  132
Adding an NTP server...................................................................................................  133
Configuring authentication keys...................................................................................... 134
NTP configuration using EDM..............................................................................................  135
Enabling NTP globally...................................................................................................  137
Adding an NTP server...................................................................................................  137
Configuring authentication keys...................................................................................... 138
Chapter 12: Secure Shell...................................................................................................... 140
Secure Shell fundamentals................................................................................................... 140
Secure Shell configuration using ACLI..................................................................................  150
Downloading the software.............................................................................................. 151
Enabling the SSHv2 server............................................................................................  151
Setting SSH configuration parameters............................................................................. 152
Verifying and displaying SSH configuration information....................................................  155
Connecting to a remote host using the SSH client............................................................ 156
Generating user key files...............................................................................................  156
Managing an SSL certificate........................................................................................... 158
Disabling SFTP without disabling SSH............................................................................  159
Secure Shell configuration using Enterprise Device Manager.................................................. 159
Downloading the software.............................................................................................. 159
Changing Secure Shell parameters................................................................................. 160
Chapter 13: System access.................................................................................................  163
System access fundamentals...............................................................................................  163
Logging on to the system...............................................................................................  163
Managing the system using different VRF contexts..........................................................  165
ACLI passwords............................................................................................................ 166
Access policies for services............................................................................................ 166
Web interface passwords............................................................................................... 167
Enhanced secure mode authentication access levels.......................................................  167
Password requirements.................................................................................................  169
System access configuration using ACLI............................................................................... 171
Enabling ACLI access levels..........................................................................................  171
Changing passwords.....................................................................................................  172
Configuring an access policy.......................................................................................... 175
Specifying a name for an access policy........................................................................... 178
Contents
October 2015 Administering Avaya VSP 7200 Series and 8000 Series 7
Comments on this document? infodev@avaya.com