Siemens S223 User Manual

Page 5

Advertising
background image

User Manual UMN:CLI
SURPASS hiD 6615 S223/S323 R1.5

A50010-Y3-C150-2-7619 5

4.2.2

Authentication Interface.....................................................................................50

4.2.3

Primary Authentication Method .........................................................................50

4.2.4

RADIUS Server .................................................................................................51

4.2.4.1 RADIUS Server for System Authentication .......................................................51
4.2.4.2 RADIUS Server Priority .....................................................................................51
4.2.4.3 Timeout of Authentication Request....................................................................51
4.2.4.4 Frequency of Retransmit ...................................................................................52
4.2.5

TACACS Server.................................................................................................52

4.2.5.1 TACACS Server for System Authentication.......................................................52
4.2.5.2 TACACS Server Priority ....................................................................................52
4.2.5.3 Timeout of Authentication Request....................................................................52
4.2.5.4 Additional TACACS+ Configuration...................................................................53
4.2.6

Accounting Mode...............................................................................................54

4.2.7

Displaying System Authentication .....................................................................54

4.2.8

Sample Configuration ........................................................................................55

4.3

Assigning IP Address.........................................................................................56

4.3.1

Enabling Interface..............................................................................................57

4.3.2

Disabling Interface.............................................................................................57

4.3.3

Assigning IP Address to Network Interface .......................................................58

4.3.4

Static Route and Default Gateway ....................................................................58

4.3.5

Displaying Forwarding Information Base(FIB) Table.........................................59

4.3.6

Forwarding Information Base(FIB) Retain.........................................................59

4.3.7

Displaying Interface ...........................................................................................60

4.3.8

Sample Configuration ........................................................................................60

4.4

SSH (Secure Shell) ...........................................................................................61

4.4.1

SSH Server........................................................................................................61

4.4.1.1 Enabling SSH Server.........................................................................................61
4.4.1.2 Displaying On-line SSH Client...........................................................................61
4.4.1.3 Disconnecting SSH Client .................................................................................61
4.4.1.4 Displaying Connection History of SSH Client....................................................61
4.4.1.5 Assigning Specific Authentication Key...............................................................62
4.4.2

SSH Client .........................................................................................................62

4.4.2.1 Login to SSH Server..........................................................................................62
4.4.2.2 File Copy ...........................................................................................................62
4.4.2.3 Configuring Authentication Key .........................................................................62
4.5

802.1x Authentication ........................................................................................64

4.5.1

802.1x Authentication ........................................................................................65

4.5.1.1 Enabling 802.1x.................................................................................................65
4.5.1.2 Configuring RADIUS Server..............................................................................65
4.5.1.3 Configuring Authentication Mode ......................................................................66
4.5.1.4 Authentication Port ............................................................................................67
4.5.1.5 Force Authorization............................................................................................67
4.5.1.6 Configuring Interval for Retransmitting Request/Identity Packet ......................67
4.5.1.7 Configuring Number of Request to RADIUS Server .........................................68
4.5.1.8 Configuring Interval of Request to RADIUS Server ..........................................68
4.5.2

802.1x Re-Authentication ..................................................................................68

4.5.2.1 Enabling 802.1x Re-Authentication ...................................................................68
4.5.2.2 Configuring the Interval of Re-Authentication ...................................................69
4.5.2.3 Configuring the Interval of Requesting Re-authentication.................................69
4.5.2.4 802.1x Re-authentication ..................................................................................69
4.5.3

Initializing Authentication Status ........................................................................70

Advertising
This manual is related to the following products: