Allied Telesis AT-S63 User Manual
Page 13

AT-S63 Management Software Menus Interface User’s Guide
13
Viewing or Configuring the Number of Certificates in the Database .............................................................. 816
Configuring SSL ............................................................................................................................................. 817
Chapter 35: Secure Shell (SSH) ................................................................................................................. 819
SSH Overview ................................................................................................................................................ 820
Support for SSH ....................................................................................................................................... 820
SSH Server .............................................................................................................................................. 821
SSH Clients.............................................................................................................................................. 821
SSH and Enhanced Stacking................................................................................................................... 821
SSH Configuration Guidelines ................................................................................................................. 822
General Steps for Configuring SSH ......................................................................................................... 823
Configuring SSH............................................................................................................................................. 824
Displaying SSH Information............................................................................................................................ 827
Chapter 36: TACACS+ and RADIUS Protocols ......................................................................................... 829
TACACS+ and RADIUS Overview ................................................................................................................. 830
Enabling Server-based Management Authentication............................................................................... 834
Disabling Server-based Management Authentication .............................................................................. 836
Configuring TACACS+.................................................................................................................................... 837
Displaying the TACACS+ Settings ................................................................................................................. 839
Configuring RADIUS....................................................................................................................................... 840
Displaying RADIUS Status and Settings ........................................................................................................ 842
Chapter 37: Management Access Control List ......................................................................................... 845
Management ACL Security Overview............................................................................................................. 846
Parts of a Management ACE ................................................................................................................... 846
Management ACL Guidelines .................................................................................................................. 847
Examples ................................................................................................................................................. 848
Enabling or Disabling the Management ACL.................................................................................................. 850
Creating an ACE............................................................................................................................................. 852
Modifying an ACE........................................................................................................................................... 854
Deleting an ACE ............................................................................................................................................. 856
Displaying the ACEs....................................................................................................................................... 857
Appendix A: AT-S63 Management Software Default Settings ................................................................ 859
Boot Configuration File Default Setting .......................................................................................................... 861
Class of Service.............................................................................................................................................. 862
Denial of Service Prevention Default Settings................................................................................................ 863
802.1x Port-Based Network Access Control Default Settings ........................................................................ 864
Enhanced Stacking Default Setting ................................................................................................................ 865
Event Log Default Settings ............................................................................................................................. 866
GVRP Default Settings ................................................................................................................................... 867
IGMP Snooping Default Settings.................................................................................................................... 868
IP Default Settings.......................................................................................................................................... 869
MAC Address-based Port Security Default Settings ...................................................................................... 870
MAC Address Table Default Setting............................................................................................................... 871
Management Access Control List Default Setting .......................................................................................... 872
Manager and Operator Account Default Settings........................................................................................... 873
MLD Snooping Default Settings ..................................................................................................................... 874
Networking Stack Default Setting ................................................................................................................... 875
PKI Default Settings ....................................................................................................................................... 876
Port Configuration Default Settings ................................................................................................................ 877
RJ-45 Serial Terminal Port Default Settings................................................................................................... 878
RRP Snooping Default Setting ....................................................................................................................... 879