While reasonable efforts have been made to ensure that the information in this document is complete and accurate at the time of
printing, Avaya assumes no liability for any errors. Avaya reserves the right to make changes and corrections to the information in
this document without the obligation to notify any person or organization of such changes.
Documentation disclaimer
Avaya shall not be responsible for any modifications, additions, or deletions to the original published version of this documentation
unless such modifications, additions, or deletions were performed by Avaya. End User agree to indemnify and hold harmless Avaya,
Avaya’s agents, servants and employees against all claims, lawsuits, demands and judgments arising out of, or in connection with,
subsequent modifications, additions or deletions to this documentation, to the extent made by End User.
Link disclaimer
Avaya is not responsible for the contents or reliability of any linked Web sites referenced within this site or documentation(s)
provided by Avaya. Avaya is not responsible for the accuracy of any information, statement or content provided on these sites and
does not necessarily endorse the products, services, or information described or offered within them. Avaya does not guarantee that
these links will work all the time and has no control over the availability of the linked pages.
Warranty
Avaya provides a limited warranty on this product. Refer to your sales agreement to establish the terms of the limited warranty. In
addition, Avaya’s standard warranty language, as well as information regarding support for this product, while under warranty, is
available to Avaya customers and other parties through the Avaya Support Web site: http://www.avaya.com/support
Please note that if you acquired the product from an authorized reseller, the warranty is provided to you by said reseller and not by Avaya.
Licenses
THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA WEBSITE, HTTP://SUPPORT.AVAYA.COM/LICENSEINFO/
ARE APPLICABLE TO ANYONE WHO DOWNLOADS, USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED FROM
AVAYA INC., ANY AVAYA AFFILIATE, OR AN AUTHORIZED AVAYA RESELLER (AS APPLICABLE) UNDER A COMMERCIAL
AGREEMENT WITH AVAYA OR AN AUTHORIZED AVAYA RESELLER. UNLESS OTHERWISE AGREED TO BY AVAYA IN
WRITING, AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE WAS OBTAINED FROM ANYONE OTHER THAN
AVAYA, AN AVAYA AFFILIATE OR AN AVAYA AUTHORIZED RESELLER, AND AVAYA RESERVES THE RIGHT TO TAKE
LEGAL ACTION AGAINST YOU AND ANYONE ELSE USING OR SELLING THE SOFTWARE WITHOUT A LICENSE. BY
INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OF
YOURSELF AND THE ENTITY FOR WHOM YOU ARE INSTALLING, DOWNLOADING OR USING THE SOFTWARE
(HEREINAFTER REFERRED TO INTERCHANGEABLY AS "YOU" AND "END USER"), AGREE TO THESE TERMS AND
CONDITIONS AND CREATE A BINDING CONTRACT BETWEEN YOU AND AVAYA INC. OR THE APPLICABLE AVAYA
AFFILIATE ("AVAYA").
Copyright
Except where expressly stated otherwise, no use should be made of the Documentation(s) and Product(s) provided by Avaya. All
content in this documentation(s) and the product(s) provided by Avaya including the selection, arrangement and design of the
content is owned either by Avaya or its licensors and is protected by copyright and other intellectual property laws including the sui
generis rights relating to the protection of databases. You may not modify, copy, reproduce, republish, upload, post, transmit or
distribute in any way any content, in whole or in part, including any code and software. Unauthorized reproduction, transmission,
dissemination, storage, and or use without the express written consent of Avaya can be a criminal, as well as a civil offense under
the applicable law.
Third Party Components
Certain software programs or portions thereof included in the Product may contain software distributed under third party agreements
("Third Party Components"), which may contain terms that expand or limit rights to use certain portions of the Product ("Third Party
Terms"). Information regarding distributed Linux OS source code (for those Products that have distributed the Linux OS source
code), and identifying the copyright holders of the Third Party Components and the Third Party Terms that apply to them is available
on the Avaya Support Web site: http://support.avaya.com/Copyright.
Trademarks
The trademarks, logos and service marks ("Marks") displayed in this site, the documentation(s) and product(s) provided by Avaya
are the registered or unregistered Marks of Avaya, its affiliates, or other third parties. Users are not permitted to use such Marks
without prior written consent from Avaya or such third party which may own the Mark. Nothing contained in this site, the
documentation(s) and product(s) should be construed as granting, by implication, estoppel, or otherwise, any license or right in and
to the Marks without the express written permission of Avaya or the applicable third party. Avaya is a registered trademark of Avaya
Inc. All non-Avaya trademarks are the property of their respective owners.
Downloading documents
For the most current versions of documentation, see the Avaya Support. Web site: http://www.avaya.com/support
Contact Avaya Support
Avaya provides a telephone number for you to use to report problems or to ask questions about your product. The support
telephone number is 1-800-242-2121 in the United States. For additional support telephone numbers, see the Avaya Web site:
http:// www.avaya.com/support.
Avaya Inc. – External Distribution
3
avaya.com
March 2015
Version
Date
Revised By
Remarks
Draft 1
3/16/2015
John Vant Erve
Jeff Cox
Initial Draft
Draft 2
4/3/2015
Didier Ducarre
Review
Draft 3
4/9/2015
Ludovico Stevens
Review and reworked SSH and SNMP sections
Draft 4
4/13/2015
Rob Tyler
Update SSH section
Draft 5
4/13/2015
John Vant Erve
Jeff Cox
Final version
Draft 6
4/16/2015
Ludovico Stevens
Rob Tyler
Updates to SSH section 6 and 8.3
Abstract
This document provides examples on configuring various items related to accessing the VSP 4000 / 8000
/ 9000 securely for management purposes. This document covers accessing the switch using Telnet,
HTTP, SSL, SSH, and SNMP.
8.3 Blocking SNMPv1/2 only ........................................................................................................... 102
8.4 Community Strings .................................................................................................................... 103
8.4.1 Displaying the default Community Strings ............................................................................................ 104
8.5 Adding a new Community String ............................................................................................... 105
8.6 Deleting Community Strings ...................................................................................................... 105
8.7 Community Strings – Virtual Routers ........................................................................................ 106
8.8 Community String Configuration Example: Allowing only read-only access using the default
community strings ................................................................................................................................. 107
9.5 Access Policy Configuration Example – limit SNMPv3 to specific host and Telnet Access to a
specific network ..................................................................................................................................... 132
Table 13: Navigation tree folders ................................................................................................................ 98
Avaya Inc. – External Distribution
9
avaya.com
March 2015
Symbols
Tip – Highlights a configuration or technical tip.
Note – Highlights important information to the reader.
Warning – Highlights important information about an action that may result in equipment
damage, configuration or data loss.
Text
Bold text indicates emphasis.
Italic text in a Courier New font indicates text the user must enter or select in a menu item, button or
command:
ERS5520-48T# show running-config
Output examples from Avaya devices are displayed in a Lucida Console font:
ERS5520-48T# show sys-info
Operation Mode: Switch
MAC Address: 00-12-83-93-B0-00
PoE Module FW: 6370.4
Reset Count: 83
Last Reset Type: Management Factory Reset
Power Status: Primary Power
Autotopology: Enabled
Pluggable Port 45: None
Pluggable Port 46: None
Pluggable Port 47: None
Pluggable Port 48: None
Base Unit Selection: Non-base unit using rear-panel switch
sysDescr: Ethernet Routing Switch 5520-48T-PWR
HW:02 FW:6.0.0.10 SW:v6.2.0.009
Mfg Date:12042004 HW Dev:H/W rev.02
Conventions
This section describes the text, image, and command conventions used in this document.
Avaya Inc. – External Distribution
10
avaya.com
March 2015
1. Overview
This document provide a guide on how to configure various items related to access security for
management purposes on the Virtual Services Platform switch.
2. Enabling or Disabling Access Services via
Boot Configuration Flags
You can enable or disable access services by setting boot configuration flags from the Run-Time CLI.
To enable or disabled access services by setting the boot configuration flags, enter the following
To view the current boot configuration file settings, enter either of the following commands.
VSPswitch:1(config)#show boot config flags
VSPswitch:1#more /intflash/config.cfg
Avaya Inc. – External Distribution
11
avaya.com
March 2015
Access level
Description
Login location
Administrator
The administrator access level permits all readwrite access, and can change security settings.
The administrator access level can configure ACLI
and web-based management user names,
passwords, and the SNMP community strings.
The administrator access level can also view audit
logs.
SSH/Telnet (in band/mgmt)/
console
Privilege
The privilege access level has the same access
permission as the administrator; however, the
privilege access level cannot use RADIUS or
TACACS+ authentication. The system must
authenticate the privilege access level within the
VSP switch at a console level. The privilege
access level is also known as emergency-admin.
Console
Operator
The operator access level can view most switch
configurations and status information. The
operator access level can change physical port
settings at layer 2 and layer 3. The operator
SSH/Telnet (in band/mgmt)/
console/
2.1 Enhanced Secure Mode
The switch supports a configurable flag called enhanced secure. After you enable the new boot config
flags enhancedsecure-mode, enhanced secure mode allows the system to provide role-based access
levels, stronger password requirements, and stronger rules on password length, password complexity,
password change intervals, password reuse, and password maximum age use.
The VSP switch does not support the default SNMPv1 and SNMPv2 community strings, and default
SNMPv3 user name. The individual in the administrator access level role can configure a non-default
value for the community strings, and the VSP switch can continue to support SNMPv1 and SNMPv2. The
individual in the administrator access level role can also configure a non-default value for the SNMPv3
user name and the VSP switch can continue to support SNMPv3. If you disable enhanced secure mode,
the SNMPv1 and SNMPv2 support for community strings remains the same, and the default SNMPv3
user name remains the same.
After you enable enhanced secure mode, the switch supports role-based authentication levels. With
enhanced secure mode enabled, the switch supports the following authentication access levels for local
authentication, Remote Authentication Dial-In User Service (RADIUS), and Terminal Access Controller
Access Control System Plus (TACACS+) authentication:
Each username is associated with a certain role in the product and appropriate authorization rights for
viewing and executing commands are available for that role.
Table 1: Enhanced User Levels
Avaya Inc. – External Distribution
12
avaya.com
March 2015
access level cannot access audit logs or security
settings
Auditor
The auditor access level can view configuration
information, status information, and audit logs.
SSH/Telnet (in band/mgmt)/
console/
Security
The security access level can change security
settings only. The security access level also has
permission to view configuration and status
information.
SSH/Telnet (in band/mgmt)/
console/
Enable enhanced secure mode and reboot switch
After the switch reboots, login using the initial administrator user name and password of
admin/admin and then change user name and use a password made up of 15 characters total
using the requirements as outlined in section 2.1.1.
2.1.1 Enhanced Security Password Requirements
After enabling enhanced security mode on the switch, you will be able to login for the first time using a
user name and password of admin/admin and then will be prompted to change both the user name and
password. The password for the admin user must be 15 characters and made up of two of the following
characters:
Two uppercase character, from the range: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Two lowercase character, from the range: abcdefghijklmnopqrstuvwxyz
Two numeric character, from the range: 1234567890
Two special character, from the range: `~!@#$%^&*()_-+={[}]|\:;”’<,>.?/
Please note the above requirement applies only to the administrator user.
Warning: Please save configuration and reboot the switch
for this to take effect.
VSPswitch:1(config)#save config
VSPswitch:1(config)#reset –y
Copyright(c) 2010-2015 Avaya, Inc.
All Rights Reserved.
Virtual Services Platform 8200
VSP Operating System Software Build 4.2.0.0_B015 (PRIVATE)
Built: Thu Mar 12 18:18:49 EDT 2015
Avaya Inc. – External Distribution
13
avaya.com
March 2015
Please note the min-passwd-len and password-rule as shown above applies to all user except
for the administrator user
Unsupported Software, Internal Use Only
AVAYA COMMAND LINE INTERFACE
Login: admin
Password: admin
This is an initial attempt using the default user name and password.
Please change the user name and password to continue.
Enter the new name : rwa
Enter the New password : Admin@!Jvelab123
Re-enter the New password : Admin@!Jvelab123
8202:1>en
8202:1#show cli password
change-interval 24
min-passwd-len 8
password-history 3
password-rule 1 1 1 1
pre-expiry-notification-interval 1 7 30
post-expiry-notification-interval 1 7 30
access-level
ACCESS LOGIN AGING MAX-SESSIONS STATE
admin rwa 90 3 ena
privilege 90 3 dis
operator 90 3 dis
security 90 3 dis
auditor 90 3 dis
Default Lockout Time 60
Lockout-Time:
Avaya Inc. – External Distribution
14
avaya.com
March 2015
Adding a new temporary user name and password via the administrator access level.
Please note the privilege user can only be changed via the console port.
Password aging – default is 90 days
Password change interval – default is 24 hours. This is the minimum time before you can change
to a new password.
Password length – default is 15 total characters
Password maximum sessions – default is 3 per user name
Password history – default is 3 previous passwords remembered
A user in the administrator access role can configure a temporary user name and password. After this
user logs in for the first time with the temporary user name and password, the system will force the user
to change the temporary user name and password. After you change the temporary user name and
password, you cannot use them again in subsequent sessions.
## After user1 logs in, the user will be prompted to enter a new user name and
password. Note, you cannot use the same user name or password as that temporarily
configured.
Login: user1
Password: **********
This is an initial attempt using the default user name and password.
Please change the user name and password to continue.
Enter the new name : userabcd
Enter the New password : ************
Re-enter the New password : ************
VSPswitch:1(config)#password aging-time day <1-365> user <user name>
Password rule – change between 1 and 2 upper-case, lower-case, numeric-case, and special-case
characters. By default, 2 is used for each
Change default lockout time – default is 60 seconds. This is the length of time a user is locked out
if the incorrect user name and/or password is entered
Password pre-notification and post-notification interval rule
Factory setting – you can default any password setting by adding default prior to the password
setting. Once defaulted, you must save the configuration and reboot the switch
In enhanced security mode, the switch enforces password expiry. To ensure a user does not lose access,
the switch offers pre and post notification messages explaining when the password will expire. The
administrator can define the pre and post notification interfaces between 1 and 99 days. If you do not
change the password before the expiry date, the system locks the account. Once locked, only the
administrator can unlock the account. The administrator creates a temporary password that the user will
initially have to use to login with and then change the password.
Factory default – reset to factory default plus remove all enhanced user accounts
Only a user with the administrator access role can use this command to return the system back to the
factory default defaults and delete all the configured user accounts.
VSPswitch:1(config)#sys system-default
WARNING: Executing this command returns the system to factory defaults and deletes all
local configured user accounts.
This command needs system reset to take into effect
Do you want to continue (y/n) ? y
VSPswitch:1(config)# (config)#save config
VSPswitch:1(config)# (config)#reset
Avaya Inc. – External Distribution
17
avaya.com
March 2015
Access level
Description
Default
logon
Default
password
Read-only
Permits view-only configuration and status
information. Is equivalent to Simple Network
Management Protocol (SNMP) read-only community
access.
ro
ro
Layer 1 read/write
View most switch configuration and status
information and change physical port settings.
l1
l1
Layer 2 read/write
View and change configuration and status
information for Layer 2 (bridging and switching)
functions.
l2
l2
Layer 3 read/write
View and change configuration and status
information for Layer 2 and Layer 3 (routing)
functions.
l3
l3
Read/write
View and change configuration and status
information across the switch. You cannot change
security and password settings. This access level is
equivalent to SNMP read/write community access.
rw
rw
Read/write/all
Permits all the rights of Read/Write access and the
ability to change security settings, including the CLI
and Web-based management user names and
passwords and the SNMP community strings.
rwa
rwa
3. Local password protection
3.1 CLI Password Protection
The following table shows the default values for logon and password for both console and Telnet
sessions.
Table 2: Default User Names and Password
Avaya Inc. – External Distribution
18
avaya.com
March 2015
3.1.1 User Names and Passwords
The default user name and password can be changed by issuing the following command.
VSPswitch:1(config)#cli password <login user name> ?
layer1 Change layer1 read write login/password
layer2 Change layer2 read write login/password
layer3 Change layer3 read write login/password
read-only Change read only login/password
read-write Change read write login/password
read-write-all Change read write all login/password
For example, assuming you wish to change the read-write-all password, but, still leaving the default user
name as rwa, enter command shown below. After entering this command, you will be prompted to enter
the old password followed by the entering and verifying the new password
default-lockout-time Change the default lockout time after three invalid
attempts
min-passwd-len Set the minimum length of passwords in hsecure mode
password-history Number of previous passwords to remember
<cr>
Avaya Inc. – External Distribution
19
avaya.com
March 2015
The following command confirms the change.
VSPswitch:1#show cli password
access-level
aging 90
min-passwd-len 8
password-history 3
ACCESS LOGIN STATE
rwa rwa NA
rw rw ena
l3 l3 ena
l2 l2 ena
l1 l1 ena
ro ro dis
Default Lockout Time 60
Lockout-Time:
IP Time
Avaya Inc. – External Distribution
20
avaya.com
March 2015
Consider the following after you enable the hsecure flag:
You cannot enable the Web server for Enterprise Device Manager (EDM) access.
You cannot enable the Secure Shell (SSH) password authentication.
3.3 High Secure (hsecure) Mode
The switch supports a configurable flag called high secure (hsecure). High secure mode introduces a
protection mechanism to filter invalid source network broadcast IP addresses communicating with the
CPU, limitation of failed logon attempts, and two restrictions on passwords: 10-character enforcement
and aging time. An example of an invalid source would be an interface in subnet 192.168.168.0/24 where
source IP addresses of 192.168.168.0 and 192.168.168.255 are discarded.
After you enable the hsecure flag, the software enforces the 10-character rule for all passwords. This
password must contain a minimum of two uppercase characters, two lowercase characters, two numbers,
and two special characters.
After you enable hsecure, the system requires you to save the configuration file and reboot the system for
hsecure to take effect. If the existing password does not meet the minimum requirements for hsecure, the
system prompts you to change the password during the first login.
The default username is rwa and the default password is rwa. In hsecure, the system prompts you to
change these during first login because they do not meet the minimum requirements for hsecure.
When you enable hsecure, the system disables Simple Network Management Protocol (SNMP) v1,
SNMPv2 and SNMPv3. If you want to use SNMP, you must re-enable SNMP, using the command no
boot config flag block-snmp.
After you enable the hsecure flag, you can configure a duration after which you must change your
password. You configure the duration by using the aging parameter.
For SNMP and File Transfer Protocol (FTP), after a password expires, access is denied. Before you
access the system, you must change a community string to a new string consisting of more than eight
characters.
To enable hsecure mode, enter the following commands. You will be prompted with an error message if
telnet or rlogin is enabled.
VSPSwitch:1(config)#boot config flags hsecure
Warning: If your CLI session is running over Telnet or Rlogin -
you will be disconnected and will not be able to reconnect.
Are you sure you want to continue (y/n) ? y
3.3.1 Access Level Options – hsecure mode
If High Security (hsecure) is enabled, you can set the aging time, lockout time, mimimum password
length, and password history using the following command. By default, the aging time is set for 90
seconds, minimum password length is set for 10 characters, and the password history is set for 3
previous passwords.
VSPSwitch:1(config)#password ?
aging-time Set age-out time for passwords
default-lockout-time Change the default lockout time after three invalid
attempts
min-passwd-len Set the minimum length of passwords in hsecure mode
password-history Number of previous passwords to remember
Avaya Inc. – External Distribution
21
avaya.com
March 2015
3.4 CLI Logging
If you wish, you can enable CLI logging of ACLI commands executed. The ACLI commands are logged to
the system log file using the CLILOG module.
VSPswitch:1(config)#passwordprompt "Enter your password: "
Avaya Inc. – External Distribution
23
avaya.com
March 2015
Step 1 – Verify user names
Step 2 – Verify the login prompt
3.7.2 Verify Operations
VSPswitch:1(config)#show cli password
access-level
aging 90
min-passwd-len 10
password-history 3
ACCESS LOGIN STATE
rwa user1 NA
rw user2 ena
l3 l3 ena
l2 l2 ena
l1 l1 ena
ro ro ena
Default Lockout Time 60
Lockout-Time:
IP Time
VSPswitch:1(config)#show cli info
cli configuration
more : true
screen-lines : 23
telnet-sessions : 8
rlogin-sessions : 8
timeout : 900 seconds
monitor duration: 300 seconds
monitor interval: 5 seconds
use default login prompt : false
default login prompt : Login:
custom login prompt : Enter username:
use default password prompt : false
default password prompt : Password:
custom password prompt : Enter your password:
prompt : 9001
Avaya Inc. – External Distribution
24
avaya.com
March 2015
Feature
Description
Additional user names
You can use additional user names to access the device, in addition to
the six existing user names of ro, L1, L2, L3, rw, and rwa. The RADIUS
server authenticates the user name and assigns one of the existing
access priorities to that name. Unauthenticated user names are denied
access to the device. User names ro, L1, L2, L3, rw, and rwa must be
added to the RADIUS server if authentication is enabled. Users not
added to the server are denied access.
User configurable
Up to 10 RADIUS servers in each device for fault tolerance (each
server is assigned a priority and is contacted in that order).
A secret key for each server to authenticate the RADIUS client
The server UDP port
Maximum retries allowed
Time-out period for each attempt
Access Level
VSA Attribute 26 – Vendor Identifier 1584 Type 192 value
None-Access
0
Read-Only-Access
1
L1-Read-Write-Access
2
L2-Read-Write-Access
3
L3-Read-Write-Access
4
Read-Write-Access
5
Read-Write-All-Access
6
4. Password Protection using RADIUS
Authentication
Users who access the Avaya switch through Telnet, local console, rlogin, or SSHv2 (password
authentication), can be authenticated against a RADIUS server.
RADIUS supports both IPv4 and IPv6 with no differences in functionality or configuration in all but the
following case. When you add or update a RADIUS server in Enterprise Device Manager (EDM) you must
specify if the address type is an IPv4 or an IPv6 address.
The following table displays the various RADIUS features supported on the VSP switch.
Table 3: RADIUS Features
The following chart displays the outbound attribute values required by the VSP switch for each access
level for RADIUS vendor identifier 1584 (Bay Networks) attribute type 192.
Table 4: RADIUS Attributes
Avaya Inc. – External Distribution
25
avaya.com
March 2015
Access Level
VSA Attribute 26 – Vendor Identifier 1584 Type 192 value
None-Access
0
Auditor
1
Security
2
Operator
3
Privilege
N/A – Not allowed by RADIUS
Admin
6
If you plan to use RADIUS with enhanced secure mode, please enable RADIUS after the
enhanced mode is enabled. If RADIUS is enabled prior to enabling the enhanced secure mode,
the RADIUS shared key must be re-entered; one must delete the shared key and re-enter it
again.
Event
Accounting information logged at server
Accounting is turned on at
router
Accounting on request:NAS
IP address
Accounting is turned off at
router
Accounting off request: NAS IP address.
User logs in
Accounting start request:NAS IP address
Session Id
User Name
More than 40 CLI commands
are executed
Accounting Interim request:NAS IP address
Session Id
CLI commands
User Name
User logs off
Accounting Stop request:NAS IP Address
Session Id
Session duration
User Name
number of input octets for session
number of octets output for session
number of packets input for session
number of packets output for session
CLI commands
If enhanced security is enabled, the following chart displays the outbound attribute values required by the
VSP switch for each access level for RADIUS vendor identifier 1584 (Bay Networks) attribute type 192.
Table 5: Enhanced Security RADIUS Attributes
In addition, you can deny CLI commands for a user. This is done using RADIUS vendor identifier 1584
attribute types 194 and 195. Attribute type 194 needs to be set to a value of 0 while attribute 195 lists the
command you wish to deny to a user.
The following table displays the various event and logged information
Table 6: RADIUS Events Logged
Avaya Inc. – External Distribution
26
avaya.com
March 2015
4.1 Enabling RADIUS globally
To use RADIUS, it must be enabled globally using the following command.
VSPswitch:1(config)#radius enable
If you wish specify and use the source IP address for the RADIUS server configuration, you must also
enable the global parameter using the following command
VSPswitch:1(config)#radius sourceip-flag
4.2 Adding RADIUS server for authentication
To add a RADIUS server, enter the following command with the option of enabling accounting and
specifying the source IP address. If you do not specify the source IP, the VSP switch will use the source
IP address of the out-going interface. Depending on the number of out-going interfaces, you may have to
add two or more RADIUS authenticators on your RADIUS server unless you specify the source IP
address. The source IP address should be a circuitless/loopback IP address which is not tied down to a
physical interface.
VSPswitch:1(config)#radius server host <ip address> key <secret key> ?
acct-enable Server acct enabled
acct-port Server acct udp port
enable Server enabled
port Server udp port
priority Server priority
retry Max number of retries
source-ip Source ip address
timeout No answer timeout value
used-by Use for cli,eapol,snmp or web
<cr>
Avaya Inc. – External Distribution
27
avaya.com
March 2015
4.3 CLI Profile
If you wish to restrict CLI commands for a user, simply enable the RADIUS cli-profile setting as shown
below. On the RADIUS server, via vendor identifier code 1584 using attributes types 194 and 195, set
attribute type 194 to a value of 0 and add the CLI command using attribute 195.
VSPswitch:1(config)#radius cli-profile
If you wish to change the default CLI access attribute value to another value other than 194, enter the
following command.
You can also specify the number of CLI commands entered prior to the VSP switch sending a CLI
accounting record. The default setting is 40. If you wish to change the default value, enter the following
command.
VSPswitch:1(config)#radius cli-cmd-count <1-40>
Avaya Inc. – External Distribution
28
avaya.com
March 2015
Step 1 – Add RADIUS server, enable RADIUS, enable RADIUS accounting, and enable RADIUS
accounting to include CLI command with a command count of 5
Step 2 – Add IP loopback address
If you wish to restrict CLI commands for a user, simply enable the RADIUS cli-profile
setting as shown below. On the RADIUS server, via vendor identifier code 1584 using
attributes types 194 and 195, set attribute type 194 to a value of 0 and add the CLI
command using attribute 195.
4.6 RADIUS Password Configuration Example
For this configuration example, we will configure the VSP switch for RADIUS authentication using IPv4
addressing and using the loopback address as the source IP for CLI and EDM authentication. We will
also show the configuration steps required using Avaya’s Identity Engines Ignition Server.
4.6.1 Ethernet Routing Switch Configuration
Up to ten RADIUS servers are supported on the VSP switch where each server is assigned a priority and
is connected according to the assigned priority. For this configuration example we will simply configure
one RADIUS server using IPv4 addressing and use the IP loopback address as the source IP address.
Please note by default, CLI RADIUS authentication is selected by when adding a RADIUS server – no
additional configuration steps are required to enable CLI RADIUS authentication.
VSPswitch:1(config)#radius server host 10.12.120.120 key avaya priority 1 source-ip