Specifications
Management Guide CLI
TigerAccess™ EE
SMC7824M/VSW 5
4.1.10.2 Auto System Rebooting .................................................................................46
4.2 System Authentication .......................................................................... 47
4.2.1 Authentication Method ................................................................................47
4.2.2 Authentication Interface ..............................................................................47
4.2.3 Primary Authentication Method...................................................................47
4.2.4 RADIUS Server...........................................................................................48
4.2.4.1 RADIUS Server for System Authentication ....................................................48
4.2.4.2 RADIUS Server Priority..................................................................................48
4.2.4.3 Timeout of Authentication Request ................................................................48
4.2.4.4 Frequency of Retransmit................................................................................48
4.2.5 TACACS+ Server ........................................................................................49
4.2.5.1 TACACS+ Server for System Authentication..................................................49
4.2.5.2 TACACS+ Server Priority ...............................................................................49
4.2.5.3 Timeout of Authentication Request ................................................................49
4.2.5.4 Additional TACACS+ Configuration................................................................49
4.2.6 Accounting Mode ........................................................................................50
4.2.7 Displaying System Authentication...............................................................50
4.3 Configuring Interface............................................................................. 51
4.3.1 Enabling Interface .......................................................................................51
4.3.2 Assigning IP Address to Network Interface.................................................52
4.3.3 Static Route and Default Gateway..............................................................52
4.3.4 Interface Description ...................................................................................53
4.3.5 Displaying Interface ....................................................................................54
4.4 Secure Shell (SSH)............................................................................... 55
4.4.1 SSH Server .................................................................................................55
4.4.1.1 Enabling SSH Server .....................................................................................55
4.4.1.2 Displaying On-line SSH Client........................................................................55
4.4.1.3 Disconnecting SSH Client ..............................................................................55
4.4.1.4 Assigning Specific Authentication Key............................................................56
4.4.1.5 Displaying Connection History of SSH Client.................................................56
4.4.2 SSH Client...................................................................................................56
4.4.2.1 Login to SSH Server ......................................................................................56
4.4.2.2 File Copy........................................................................................................56
4.4.2.3 Authentication Key .........................................................................................57
4.5 802.1x Authentication............................................................................ 58
4.5.1 802.1x Authentication..................................................................................59
4.5.1.1 Enabling 802.1x .............................................................................................59
4.5.1.2 RADIUS Server ..............................................................................................59
4.5.1.3 Authentication Mode ......................................................................................60
4.5.1.4 Authentication Port.........................................................................................61
4.5.1.5 Force Authorization ........................................................................................61
4.5.1.6 Interval for Retransmitting Request/Identity Packet .......................................61
4.5.1.7 Number of Requests to RADIUS Server ........................................................61
4.5.1.8 Interval of Request to RADIUS Server ...........................................................62
4.5.2 802.1x Re-Authentication............................................................................62
4.5.2.1 Enabling 802.1x Re-Authentication ................................................................62
4.5.2.2 Interval of Re-Authentication ..........................................................................63
4.5.2.3 Interval of Requesting Re-Authentication.......................................................63
4.5.2.4 802.1x Re-Authentication...............................................................................63
4.5.3 Initializing Authentication Status..................................................................64