Cisco PIX 525 Specifiche Pagina 485

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
Vedere la pagina 484
CHAPTER
30-1
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
30
Managing System Access
This chapter describes how to access the security appliance for system management through Telnet,
SSH, and HTTPS. It also describes how to authenticate and authorize users and how to create login
banners.
This chapter includes the following sections:
Allowing Telnet Access, page 30-1
Allowing SSH Access, page 30-2
Configuring SSH Access, page 30-2
Using an SSH Client, page 30-3
Changing the Login Password, page 30-3
Allowing HTTPS Access for ASDM, page 30-4
Authenticating and Authorizing System Administrators, page 30-4
Configuring a Login Banner, page 30-16
Allowing Telnet Access
The security appliance allows Telnet connections to the security appliance for management purposes.
You cannot use Telnet to the lowest security interface unless you use Telnet inside an IPSec tunnel.
The security appliance allows a maximum of 5 concurrent Telnet connections per context, if available,
with a maximum of 100 connections divided between all contexts.
To configure Telnet access to the security appliance, follow these steps:
Step 1 To identify the IP addresses from which the security appliance accepts connections, enter the following
command for each address or subnet:
hostname(config)# telnet
source_IP_address
mask
source_interface
If there is only one interface, you can configure Telnet to access that interface as long as the interface
has a security level of 100.
Step 2 (Optional) To set the duration for how long a Telnet session can be idle before the security appliance
disconnects the session, enter the following command:
hostname(config)# telnet timeout
minutes
Vedere la pagina 484
1 2 ... 480 481 482 483 484 485 486 487 488 489 490 ... 603 604

Commenti su questo manuale

Nessun commento