ISG18GFP USER MANUAL, GENERAL, SECTION G
UM-G-iSG18GFP-4.5.06.1-EN.docx
58
© 2020 IS5 COMMUNICATIONS INC. ALL RIGHTS RESERVED
Login and Management
Configuring of the Login Authentication Method sets the authentication method.
Setting up specific authorized personnel to manage iSG18GFP is possible using filtering conditions such as IP
address (mandatory), vlan-id, and service type (SSH, Telnet, SNMP, etc.), etc.
Once the information about the authorized personnel has been configured in the system, no other entity can have
management privileges to the secure gateway over IP network. Serial console management remains available and
is not influenced by the authorized manager conditions.
If no authorized managers are configured (default state), then secure gateway management is possible on all
configured VLANs and associated ports via the respective IP interfaces assigned.
7.1 Login Authentication Hierarchy
GCE
+ root
-
lock
-
logout
-
show authorized-manager [ip-source < ip_addr >]
-
show system information
-
show logging
-
show users
-
show aliases
-
show line {
console | vty <line> }
-
listuser
-
show privilege
+ configure terminal
-
[no] authorized-manager ip-source <ip_addr> {<ip_mask> ,cpu0
<
CR | service
>
interface <type>, service <type>
,vlan <port_list> }
-
login authentication [{ radius | tacacs }] [local]
-
login authentication default { default | <list-name> }
-
login block-for <seconds (30-600) > attempts <tries (1-10) >
-
username <user-name> { confirm-password, [ 0 | 7 | LINE ], password [8-20 char], privilege <1-15> , status [enable
| disable] }
-
no username <user-name>