User Manual UMN:CLI
SURPASS hiD 6615 S223/S323 R1.5
A50010-Y3-C150-2-7619 5
4.2.2
Authentication Interface.....................................................................................50
4.2.3
Primary Authentication Method .........................................................................50
4.2.4
RADIUS Server .................................................................................................51
4.2.4.1
RADIUS Server for System Authentication .......................................................51
4.2.4.2
RADIUS Server Priority .....................................................................................51
4.2.4.3
Timeout of Authentication Request....................................................................51
4.2.4.4
Frequency of Retransmit ...................................................................................52
4.2.5
TACACS Server.................................................................................................52
4.2.5.1
TACACS Server for System Authentication.......................................................52
4.2.5.2
TACACS Server Priority ....................................................................................52
4.2.5.3
Timeout of Authentication Request....................................................................52
4.2.5.4
Additional Configuration...................................................................53
4.2.6
Accounting Mode...............................................................................................54
4.2.7
Displaying System Authentication .....................................................................54
4.2.8
Sample Configuration ........................................................................................55
4.3
Assigning IP Address.........................................................................................56
4.3.1
Enabling Interface..............................................................................................57
4.3.2
Disabling Interface.............................................................................................57
4.3.3
Assigning IP Address to Network Interface .......................................................58
4.3.4
Static Route and Default Gateway ....................................................................58
4.3.5
Displaying Forwarding Information Base(FIB) Table.........................................59
4.3.6
Forwarding Information Base(FIB) Retain.........................................................59
4.3.7
Displaying Interface ...........................................................................................60
4.3.8
Sample Configuration ........................................................................................60
4.4
SSH (Secure Shell) ...........................................................................................61
4.4.1
SSH Server........................................................................................................61
4.4.1.1
Enabling SSH Server.........................................................................................61
4.4.1.2
Displaying On-line SSH Client...........................................................................61
4.4.1.3
Disconnecting SSH Client .................................................................................61
4.4.1.4
Displaying Connection History of SSH Client....................................................61
4.4.1.5
Assigning Specific Authentication Key...............................................................62
4.4.2
SSH Client .........................................................................................................62
4.4.2.1
Login to SSH Server..........................................................................................62
4.4.2.2
File Copy ...........................................................................................................62
4.4.2.3
Configuring Authentication Key .........................................................................62
4.5
802.1x Authentication ........................................................................................64
4.5.1
802.1x Authentication ........................................................................................65
4.5.1.1
Enabling 802.1x.................................................................................................65
4.5.1.2
Configuring RADIUS Server..............................................................................65
4.5.1.3
Configuring Authentication Mode ......................................................................66
4.5.1.4
Authentication Port ............................................................................................67
4.5.1.5
Force Authorization............................................................................................67
4.5.1.6
Configuring Interval for Retransmitting Request/Identity Packet ......................67
4.5.1.7
Configuring Number of Request to RADIUS Server .........................................68
4.5.1.8
Configuring Interval of Request to RADIUS Server ..........................................68
4.5.2
802.1x Re-Authentication ..................................................................................68
4.5.2.1
Enabling 802.1x Re-Authentication ...................................................................68
4.5.2.2
Configuring the Interval of Re-Authentication ...................................................69
4.5.2.3
Configuring the Interval of Requesting Re-authentication.................................69
4.5.2.4
802.1x Re-authentication ..................................................................................69
4.5.3
Initializing Authentication Status ........................................................................70