![Allied Telesis AT-9400 User Manual Download Page 327](http://html.mh-extra.com/html/allied-telesis/at-9400/at-9400_user-manual_2902755327.webp)
AT-S63 Management Software Menus User’s Guide
Section IV: SNMPv3
327
4. To change the authentication protocol and password, type
1
to select
Set Authentication Protocol & Password.
The following prompt is displayed:
Enter User Name:
5. Enter the User Name of the User Table you want to modify.
The following prompt is displayed:
Enter Authentication Protocol [M-MD5, S-SHA, N-None]:
6. Enter one of the following:
M-MD5
This value represents the MD5 authentication protocol. With this
selection, users (SNMP entities) are authenticated with the MD5
authentication protocol after a message is received. This algorithm
generates the message digest. The user is authenticated when the
authentication protocol checks the message digest. With the MD5
selection, you can configure a Privacy Protocol.
S-SHA
This value represents the SHA authentication protocol. With this
selection, users are authenticated with the SHA authentication protocol
after a message is received. This algorithm generates the message
digest. The user is authenticated when the authentication protocol
checks the message digest. With the SHA selection, you can configure
a Privacy Protocol.
N-None
This value represents no authentication protocol. When messages are
received, users are not authenticated. With the None selection, you
cannot configure a Privacy Protocol.
If you select None, go to step 9.
If you select MD5 or SHA, the following prompt is displayed:
Enter Authentication Password:
7. Enter an authentication password of up to 32 alphanumeric characters.
The following prompt is displayed:
Re-enter Authentication password:
8. Re-enter the password.
The following message is displayed:
Authentication protocol algorithm has been changed.
Summary of Contents for AT-9400
Page 16: ...Figures 16 ...
Page 18: ...Tables 18 ...
Page 28: ...Preface 28 ...
Page 30: ...30 Section I Basic Operations ...
Page 60: ...Chapter 1 Basic Switch Parameters 60 Section I Basic Operations ...
Page 64: ...Chapter 2 Port Parameters 64 Section I Basic Operations Port Type The port type ...
Page 84: ...Chapter 2 Port Parameters 84 Section I Basic Operations ...
Page 124: ...Chapter 6 Static Port Trunks 124 Section I Basic Operations ...
Page 144: ...144 Section II Advanced Operations ...
Page 196: ...Chapter 10 File Downloads and Uploads 196 Section II Advanced Operations ...
Page 218: ...Chapter 11 Event Logs and the Syslog Client 218 Section II Advanced Operations ...
Page 242: ...Chapter 13 Access Control Lists 242 Section II Advanced Operations ...
Page 294: ...294 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Page 314: ...Chapter 19 MLD Snooping 314 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Page 318: ...318 Section IV SNMPv3 ...
Page 416: ...Chapter 21 SNMPv3 416 Section IV SNMPv3 ...
Page 418: ...418 Section V Spanning Tree Protocols ...
Page 470: ...470 Section VI Virtual LANs ...
Page 520: ...Chapter 26 Multiple VLAN Modes 520 Section VI Virtual LANs ...
Page 532: ...Chapter 27 Protected Ports VLANs 532 Section VI Virtual LANs ...
Page 546: ...546 Section VII Internet Protocol Routing ...
Page 560: ...560 Section VIII Port Security ...
Page 568: ...Chapter 30 MAC Address based Port Security 568 Section VIII Port Security ...
Page 586: ...Chapter 31 802 1x Port based Network Access Control 586 Section VIII Port Security ...
Page 588: ...588 Section IX Management Security ...
Page 610: ...Chapter 33 Encryption Keys 610 Section IX Management Security ...
Page 650: ...Chapter 36 TACACS and RADIUS Protocols 650 Section IX Management Security ...
Page 660: ...Chapter 37 Management Access Control List 660 Section IX Management Security ...
Page 668: ...Index 668 ...