C
ONFIGURING
THE
S
WITCH
3-42
User Authentication
You can restrict management access to this switch using the following
options:
•
User Accounts – Manually configure access rights on the switch for
specified users.
•
Authentication Settings – Use remote authentication to configure
access rights.
•
HTTPS Settings – Provide a secure web connection.
•
SSH Settings – Provide a secure shell (for secure Telnet access).
•
Port Security – Configure secure addresses for individual ports.
•
802.1x – Use IEEE 802.1x port authentication to control access to
specific ports.
•
IP Filter – Filters management access to the web, SNMP or Telnet
interface.
Configuring User Accounts
The guest only has read access for most configuration parameters.
However, the administrator has write access for all parameters governing
the onboard agent. You should therefore assign a new administrator
password as soon as possible, and store it in a safe place.
The default guest name is “guest” with the password “guest.” The default
administrator name is “admin” with the password “admin.”
Command Attributes
•
Account List
– Displays the current list of user accounts and
associated access levels. (Default: admin, and guest)
•
New Account
– Displays configuration settings for a new account.
-
User Name
– The name of the user.
- (Maximum length: 8 characters; maximum number of users: 16)
-
Access Level
– Specifies the user level.
- (Options: Normal and Privileged)
Summary of Contents for TigerSwitch 1000
Page 2: ......
Page 19: ...CONTENTS xv...
Page 23: ...TABLES xix...
Page 36: ...INTRODUCTION 1 10...
Page 155: ...PORT CONFIGURATION 3 107 Figure 3 50 Displaying Etherlike and RMON Statistics...
Page 222: ...CONFIGURING THE SWITCH 3 174...
Page 417: ...VLAN COMMANDS 4 195 This section describes commands used to configure private VLANs...
Page 466: ...TROUBLESHOOTING B 4...
Page 479: ......