Chapter 3: System planning
Security planning
Page 3-63
Table 79 Default VACM view trees
Object
Entry 1
Entry 2
ViewName
internet
restricted
Subtree
1.3.6.1
1.3.6.1
Mask
“”
“”
Type
included
included
StorageType
nonVolatile
nonvolatile
Table 80 Default data fill for access table
Object
Entry 1
Entry 2
GroupName
initial
initial
ContextPrefix
“”
“”
SecurityLevel
authNoPriv
noAuthNoPriv
ContextMatch
exact
exact
ReadViewName
internet
restricted
WriteViewName internet
“”
NotifyViewName internet
restricted
StorageType
nonVolatile
nonVolatile
Planning for RADIUS operation
Configure RADIUS where remote authentication is required for users of the web-based
interface. Remote authentication has the following advantages:
•
Control of passwords can be centralized.
•
Management of user accounts can be more sophisticated. For example; users can be
prompted by a network manager to change passwords at regular intervals. As another
example, passwords can be checked for inclusion of dictionary words and phrases.
•
Passwords can be updated without reconfiguring multiple network elements.
•
User accounts can be disabled without reconfiguring multiple network elements.
Remote authentication has one significant disadvantage in a wireless link product such as PTP
670. If the wireless link is down, a unit on the remote side of the broken link may be prevented
from contacting a RADIUS Server, with the result that users are unable to access the web-
based interface.
One useful strategy would be to combine RADIUS authentication for normal operation with a
single locally-authenticated user account for emergency use.
PTP 670 provides a choice of the following authentication methods:
•
CHAP