20
Basic Network Configuration
1.2 Selecting A Security Profile
A security profile must be selected before proceeding further with configuration of ACS.
For detailed information on security profiles see ACS Installation, Administration, and
User Guide.
To Select a Security Profile
Select a pre-defined Security Profile, or define a Custom profile for specific services.
The available profiles are:
•
Secure:
Disables all protocols except SSHv2, HTTPS, and SSH to Serial Ports.
•
Moderate:
Enables SSHv1, SSHv2, HTTP, HTTPS, Telnet, SSH and Raw
connections to Serial Ports, ICMP, and HTTP redirection to HTTPS.
•
Open:
Enables all services, Telnet, SSHv1, SSHv2, HTTP, HTTPS, SNMP, RPC,
ICMP and Telnet, SSH and Raw connections to Serial Ports.
•
Default:
Sets the profile to the same configuration as Moderate profile.
•
Custom:
Configure individual protocols and services and configure access to
ports.
CLI Mode
Step 1 - Enter the CLI mode
[root@CAS etc]# CLI
Step 2 - At the prompt enter the following string.
cli > config security profile
The following commands are available under the “profile” prompt.
profile>
Step 3 - To configure a Default, Moderate, or Secured pre-defined security
profile, enter the following string.
profile>
<moderate>
or,
profile>
<secured>
or,
profile>
<default>
custom
info
open
return
show
default
moderate
quit
secured
Summary of Contents for AlterPath ACS
Page 16: ...xvi Table of Contents...
Page 29: ...13 This page has been left intentionally blank...
Page 30: ...14 Preface...
Page 68: ...52 Device Access...
Page 86: ...70 Authentication Step 5 Saving changes To save the configuration run the command saveconf...
Page 96: ...80 Authentication Save the configuration to flash 2 cli config savetoflash...
Page 114: ...98 Authentication...
Page 204: ...188 Administration To exit the CLI mode and return to ACS s shell issue the command cli quit...
Page 268: ...252 Power Management with AlterPath PM Integration...
Page 304: ...288 PCMCIA Cards Integration...
Page 338: ...322 Profile Configuration...
Page 364: ...348 Additional Features and Applications...
Page 376: ...360 Appendix A New User Background Information...
Page 406: ...390 Appendix C Cabling and Hardware Information This page has been left intentionally blank...
Page 418: ...402 List of Tables...
Page 420: ...404 List of Figures...