Using VRRPv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Creating a Virtual Router to Back Up Another VRRP

Router Addresses Using VRRPv3 . . . . . . . . . . . . . . . . . . . . . 278 Monitoring the Firewall State. . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Setting a Virtual MAC Address for a Virtual Router. . . . . . . . . . 280 Changing the IP Address List of a Virtual Router in VRRPv3 . . 281 Removing a Virtual Router in VRRPv3 . . . . . . . . . . . . . . . . . . . 281 Creating a Virtual Router in Monitored Circuit Mode for IPv6 . . 282 Setting Interface Dependencies for a Monitored Circuit

Virtual Router for IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Changing the List of Addresses in a Monitored Circuit

Virtual Router for IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 Traffic Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 Security and Access Configuration . . . . . . . . . . . . . . . . . . . . . . . 285

8 Managing Security and Access . . . . . . . . . . . . . . . . . . . . . . . . 287

Managing Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Managing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Adding and Deleting Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Managing and Using S/Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Managing Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Role-Based Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Managing Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Assigning Roles and Access Mechanisms to Users . . . . . . . . . 295 Creating Cluster Administrator Users . . . . . . . . . . . . . . . . . . . . 296 Configuring Network Access and Services . . . . . . . . . . . . . . . . . 297 Configuring a Modem on COM2, COM3, or COM4. . . . . . . . . . 298 Configuring Nokia Network Voyager Access . . . . . . . . . . . . . . . . 300 Configuring Basic Nokia Network Voyager Options . . . . . . . . . 301 Generating and Installing SSL/TLS Certificates . . . . . . . . . . . . 302 Secure Shell (SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Initial SSH Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Configuring Advanced Options for SSH . . . . . . . . . . . . . . . . . . 306

12

Nokia Network Voyager IPSO 4.0 Reference Guide

Page 12
Image 12
Nokia IPSO 4.0 manual Managing Security and Access