Admin Guide
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Basic administration
- Chapter 4: System startup fundamentals
- Chapter 5: Boot parameter configuration using ACLI
- Chapter 6: Run-time process management using ACLI
- Chapter 7: Chassis operations
- Chassis operations fundamentals
- Chassis operations configuration using ACLI
- Enabling jumbo frames
- Configuring port lock
- Configuring SONMP
- Viewing the topology message status
- Associating a port to a VRF instance
- Configuring an IP address for the management port
- Configuring Ethernet ports with Autonegotiation
- Enabling channelization
- Configuring serial management port dropping
- Controlling slot power
- Chassis operations configuration using EDM
- Editing system information
- Editing chassis information
- Configuring system flags
- Configuring channelization
- Configuring basic port parameters
- Viewing the boot configuration
- Configuring boot flags
- Enabling Jumbo frames
- Configuring the date and time
- Associating a port to a VRF instance
- Configuring CP Limit
- Configuring an IP address for the management port
- Editing the management port parameters
- Configuring the management port IPv6 interface parameters
- Configuring management port IPv6 addresses
- Auto reactivating the port of the SLPP shutdown
- Editing serial port parameters
- Enabling port lock
- Locking a port
- Viewing power information
- Viewing power status on VSP 8400
- Viewing fan information
- Viewing topology status information
- Viewing the topology message status
- Configuring a forced message control pattern
- Chapter 8: Hardware status using EDM
- Chapter 9: Domain Name Service
- Chapter 10: Licensing
- Chapter 11: Network Time Protocol
- Chapter 12: Secure Shell
- Chapter 13: System access
- System access fundamentals
- System access configuration using ACLI
- Enabling ACLI access levels
- Changing passwords
- Configuring an access policy
- Specifying a name for an access policy
- Allowing a network access to the switch
- Configuring access policies by MAC address
- System access security enhancements using ACLI
- Displaying the boot config flags status
- Enabling enhanced secure mode
- Creating accounts for different access levels
- Deleting accounts in enhanced secure mode
- Configuring a password for a specific user
- Returning the system to the factory defaults
- Configuring the password complexity rule
- Configuring the password length rule
- Configuring the change interval rule
- Configuring the reuse rule
- Configuring the maximum number of sessions
- Configuring the maximum age rule
- Configuring the pre- and post-notification rule
- System access configuration using EDM
- Chapter 14: ACLI show command reference
- Access, logon names, and passwords
- Basic switch configuration
- Current switch configuration
- CLI settings
- Ftp-access sessions
- Hardware information
- NTP server statistics
- Power summary
- Power information for power supplies
- System information
- System status (detailed)
- Telnet-access sessions
- Users logged on
- Port egress COS queue statistics
- CPU queue statistics
- Chapter 15: Port numbering and MAC address assignment reference
- Chapter 16: Supported standards, RFCs, and MIBs
- Glossary
NTP fundamentals............................................................................................................... 127
Overview...................................................................................................................... 127
NTP system implementation model................................................................................. 128
Time distribution within a subnet..................................................................................... 129
Synchronization............................................................................................................ 129
NTP modes of operation................................................................................................ 129
NTP authentication........................................................................................................ 130
NTP configuration using ACLI.............................................................................................. 131
Enabling NTP globally................................................................................................... 132
Adding an NTP server................................................................................................... 133
Configuring authentication keys...................................................................................... 134
NTP configuration using EDM.............................................................................................. 135
Enabling NTP globally................................................................................................... 137
Adding an NTP server................................................................................................... 137
Configuring authentication keys...................................................................................... 138
Chapter 12: Secure Shell...................................................................................................... 140
Secure Shell fundamentals................................................................................................... 140
Secure Shell configuration using ACLI.................................................................................. 150
Downloading the software.............................................................................................. 151
Enabling the SSHv2 server............................................................................................ 151
Setting SSH configuration parameters............................................................................. 152
Verifying and displaying SSH configuration information.................................................... 155
Connecting to a remote host using the SSH client............................................................ 156
Generating user key files............................................................................................... 156
Managing an SSL certificate........................................................................................... 158
Disabling SFTP without disabling SSH............................................................................ 159
Secure Shell configuration using Enterprise Device Manager.................................................. 159
Downloading the software.............................................................................................. 159
Changing Secure Shell parameters................................................................................. 160
Chapter 13: System access................................................................................................. 163
System access fundamentals............................................................................................... 163
Logging on to the system............................................................................................... 163
Managing the system using different VRF contexts.......................................................... 165
ACLI passwords............................................................................................................ 166
Access policies for services............................................................................................ 166
Web interface passwords............................................................................................... 167
Enhanced secure mode authentication access levels....................................................... 167
Password requirements................................................................................................. 169
System access configuration using ACLI............................................................................... 171
Enabling ACLI access levels.......................................................................................... 171
Changing passwords..................................................................................................... 172
Configuring an access policy.......................................................................................... 175
Specifying a name for an access policy........................................................................... 178
Contents
October 2015 Administering Avaya VSP 7200 Series and 8000 Series 7
Comments on this document? infodev@avaya.com










