
User Manual UMN:CLI
V5824G
5
4.1.8 System Rebooting.......................................................................................57
4.1.8.1 Manual System Rebooting.............................................................................57
4.1.8.2 System Rebooting Scheduler.........................................................................58
4.1.9 Auto Reset Configuration............................................................................58
4.1.9.1 CPU Load.......................................................................................................59
4.1.9.2 Memory..........................................................................................................59
4.2 System Authentication.........................................................................60
4.2.1 Authentication Method ................................................................................60
4.2.2 Authentication Interface ..............................................................................60
4.2.3 PrimaryAuthentication Method...................................................................61
4.2.4 RADIUS Server...........................................................................................61
4.2.4.1 RADIUS Server for System Authentication ....................................................61
4.2.4.2 RADIUS Server Priority..................................................................................61
4.2.4.3 Timeout of Authentication Request.................................................................62
4.2.4.4 Frequency of Retransmit................................................................................62
4.2.5 TACACS+ Server........................................................................................62
4.2.5.1 TACACS+ Server for System Authentication..................................................62
4.2.5.2 TACACS+ Server Priority...............................................................................62
4.2.5.3 Timeout of Authentication Request.................................................................63
4.2.5.4 Additional TACACS+ Configuration................................................................63
4.2.6 Accounting Mode ........................................................................................64
4.2.7 Displaying System Authentication...............................................................64
4.3 Configuring Interface ...........................................................................65
4.3.1 Enabling Interface.......................................................................................65
4.3.2 Assigning IP Address to Network Interface.................................................66
4.3.3 Static Route and Default Gateway..............................................................66
4.3.4 Interface Description...................................................................................67
4.3.5 Displaying Interface ....................................................................................68
4.3.6 Enabling Interface Overlapping ..................................................................68
4.4 Secure Shell (SSH)..............................................................................69
4.4.1 SSH Server.................................................................................................69
4.4.1.1 Enabling SSH Server.....................................................................................69
4.4.1.2 Displaying On-line SSH Client........................................................................69
4.4.1.3 Disconnecting SSH Client..............................................................................69
4.4.1.4 Assigning Specific Authentication Key............................................................70
4.4.1.5 Displaying Connection History of SSH Client.................................................70
4.4.2 SSH Client...................................................................................................70
4.4.2.1 Login to SSH Server ......................................................................................70
4.4.2.2 Secured File Copy..........................................................................................71
4.4.2.3 Authentication Key.........................................................................................71
4.5 802.1x Authentication ..........................................................................72
4.5.1 802.1x Authentication..................................................................................73
4.5.1.1 Enabling 802.1x .............................................................................................73
4.5.1.2 RADIUS Server..............................................................................................73
4.5.1.3 Authentication Mode ......................................................................................74
4.5.1.4 Authentication Port.........................................................................................75
4.5.1.5 Force Authorization ........................................................................................75
4.5.1.6 Interval for Retransmitting Request/Identity Packet .......................................75
4.5.1.7 Interval of Authentication................................................................................75
4.5.1.8 Number of Requests to RADIUS Server ........................................................76