ii CONTENTSChapter 5: Using the Command Line Interface with Secure Shelland Telnet..................................................................................... 69Secure Shell (SSH) Access .....................................................................................................69Interactive Session...................................................................................................................69Command Line Arguments Session: Syntax for initiating a Command Line Session .............78Port Sharing Using SSH ..................................................................................................................79Chapter 6: Authentication and Authorization .............................. 81Implementing LDAP Remote Authentication............................................................................81TACACS+ Server Configuration ..............................................................................................82Chapter 7: Logging ....................................................................... 85NFS Per Port Logging Configuration Usage ............................................................................85Name ...............................................................................................................................................85Description.......................................................................................................................................85NFS Server Setup ....................................................................................................................86Chapter 8: SNMP........................................................................... 87SNMP Trap Configuration ........................................................................................................87Name ...............................................................................................................................................87Description.......................................................................................................................................87Chapter 9: System Configuration ................................................. 89Local Port Access Configuration..............................................................................................89Name ...............................................................................................................................................89Description.......................................................................................................................................89Name ...............................................................................................................................................90Description.......................................................................................................................................90Service (Telnet and SSH) Configuration..................................................................................90Name ...............................................................................................................................................90Description.......................................................................................................................................90Appendix A: Specifications .......................................................... 93Dominion SX Connectivity and Serial Pin-Out Guides ............................................................94Connectivity Table....................................................................................................................94Dominion SX Serial Pinouts.....................................................................................................95Appendix B: System Defaults ....................................................... 97Appendix C: Certificates .............................................................. 99Certificate .................................................................................................................................99Certificate Contents .........................................................................................................................99Certificate Authority .......................................................................................................................100Installing Dominion SX CA-Root Certificate to a Browser .....................................................101Installing CA Root for IE Browsers.........................................................................................102Accept a Certificate (Session-Based) ............................................................................................102Install the Raritan Root Certificate .................................................................................................102Remove an Accepted Certificate ...................................................................................................105Install CA Root for Netscape Navigator .................................................................................106Accept a Certificate (Session-Based) ............................................................................................106Install the Dominion SX Root Certificate........................................................................................107Remove an Accepted Certificate ...................................................................................................109Install a Third-Party Root Certificate ......................................................................................110Appendix D: RADIUS Server ....................................................... 113Overview ................................................................................................................................113Install and Configure the RADIUS Server for Windows 2000................................................114Appendix E: Configuring Cisco ACS RADIUS Server.................. 121Appendix F: RSA ACE/Server Configuration............................... 125Lightweight Directory Access Protocol (LDAP)......................................................................130