
Contents
x OmniSwitch 6250/6450 Switch Management Guide May 2012
Quick Steps for Creating Customer Login User Accounts ......................................9-8
Default User Settings ...............................................................................................9-9
Account and Password Policy Settings ..................................................................9-10
How User Settings Are Saved ................................................................................9-11
Creating a User ..............................................................................................................9-12
Removing a User ....................................................................................................9-13
User-Configured Password ....................................................................................9-14
Configuring Password Policy Settings ..........................................................................9-16
Setting a Minimum Password Size .........................................................................9-17
Configuring the Username Password Exception ....................................................9-18
Configuring Password Character Requirements ....................................................9-19
Configuring Password Expiration ..........................................................................9-20
Default Password Expiration ...........................................................................9-20
Specific User Password Expiration .................................................................9-20
Configuring the Password History .........................................................................9-21
Configuring the Minimum Age for a Password .....................................................9-22
Configuring Global User Lockout Settings ...................................................................9-22
Configuring the User Lockout Window .................................................................9-23
Configuring the User Lockout Threshold Number ................................................9-24
Configuring the User Lockout Duration Time .......................................................9-25
Manually Locking and Unlocking User Accounts .................................................9-26
Configuring Privileges for a User .................................................................................9-27
Setting Up SNMP Access for a User Account ..............................................................9-28
SNMP Access Without Authentication/Encryption ...............................................9-29
SNMP Access With Authentication/Encryption ....................................................9-30
Removing SNMP Access From a User ..................................................................9-31
Setting Up End-User Profiles ........................................................................................9-32
Creating End-User Profiles ....................................................................................9-33
Setting Up Port Ranges in a Profile .......................................................................9-34
Setting Up VLAN Ranges in a Profile ...................................................................9-35
Associating a Profile With a User ..........................................................................9-36
Removing a Profile From the Configuration ..........................................................9-37
Verifying the User Configuration .................................................................................9-38
Chapter 10 Managing Switch Security ......................................................................................10-1
In This Chapter ..............................................................................................................10-1
Switch Security Specifications ......................................................................................10-2
Switch Security Defaults ...............................................................................................10-2
Switch Security Overview .............................................................................................10-3
Authenticated Switch Access ........................................................................................10-4
AAA Servers—RADIUS or LDAP ........................................................................10-4
Authentication-only—ACE/Server ........................................................................10-4
Interaction With the User Database .......................................................................10-5
ASA and Authenticated VLANs ............................................................................10-5
Configuring Authenticated Switch Access ...................................................................10-6
Comentarios a estos manuales