authenticated login. To reactivate, use
login authentication services-
logins
.
• Set the time the gateway waits for user response to authentication requests before timing
out a connection, using
login authentication response-time
time
, where
time
is the time, in seconds, after which the gateway aborts the connection if no response
is received.
For example, to timeout connections if no response arrives within 180 seconds after an
authentication request:
Gxxx-001(super)# login authentication response-time 180
Use
no login authentication response-time
to return the response time value
to the factory default of 120 seconds. The time value you enter is used for both:
- The response time interval between the username prompt and the username entry
- The response time interval between the challenge prompt and the challenge
response
• Deactivate password authentication and activate ASG authentication of Avaya Services
local connections to the Services port. To do this, use
no login authentication
local-craft-password
. To enable password authentication of Avaya Services local
connections to the Services port, use
login authentication local-craft-
password
(default).
• Set a policy for locking out access to the gateway after successive failed login attempts.
To do this, use
login authentication
lockout
time
attempt
count
, where
time
is the interval of time for which lockout is enforced and
count
is a number of failed
attempts after which lockout is enforced. Use
no login authentication
lockout
to return the lockout time and lockout attempt threshold to their default values
(180 and 3).
For example, to lockout Avaya Services access to the device for 360 seconds following
five failed login attempts:
Gxxx-001(super)# login authentication lockout 360 attempt 5
This lockout affects all users locally stored in the gateway, including locally defined user
accounts and Avaya Services logins defined in the ASG authentication file. Remote users
maintained centrally in a Radius server are not subject to the lockout sanction.
• Switch between modem operation modes, including rasaccess and ppp modes, using
ppp authentication {pap|chap|none|ras}
. ASG authentication is enabled
when
ras
is selected. For example:
Gxxx-001(super)# ppp authentication ras
Accessing the Branch Gateway
42 Administering Avaya G430 Branch Gateway
October 2013
Summary of Contents for G430
Page 1: ...Administering Avaya G430 Branch Gateway Release 6 3 03 603228 Issue 5 October 2013 ...
Page 12: ...12 Administering Avaya G430 Branch Gateway October 2013 ...
Page 246: ...VoIP QoS 246 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...
Page 556: ...IPSec VPN 556 Administering Avaya G430 Branch Gateway October 2013 Comments infodev avaya com ...