Chapter15SystemSecurityConguration
ZXAN(config)#aaagroup-serverradius-authen1
ZXAN(config-authgrp-1)#
5.ConguretheRADIUSserver.
ZXAN(config-authgrp-1)#server12.2.2.3keyzteRad
6.(Optional)Conguretheroute.
ZXAN(config-authgrp-1)#ipmng
ZXAN(config-authgrp-1)#exit
Note:
WhentheZXA10C300isconnectedtotheRADIUSserverthroughthein-bandNM
channel,youcanskipthisstep.
7.Conguretheauthenticationgroup.
ZXAN(config)#aaaauthenticationlogindefaultrds-group1
8.Conguretheauthorizationgroup.
ZXAN(config)#aaaauthorizationexecdefaultrds-group1
–EndofSteps–
15.4ConguringManagementACL
AfteryoucongurethemanagementACL,accessingtheZXA10C300inTelnet/SNMP
modecanberestricted.
Context
ThemanagementACLisastandardACL,whichcontrolsthesourceIPaddressofthe
receivedIPpackets.ThemanagementACLrestrictsusers'accesstotheZXA10C300
NMmodule.
Steps
1.CreateastandardACL.
ZXAN(config)#aclstandardnumber10
ZXAN(config-std-acl)#
2.ConguretheACLrules.
ZXAN(config-std-acl)#rule1deny1.1.1.100.0.0.0
ZXAN(config-std-acl)#rule2permit1.1.1.00.0.0.255
ZXAN(config-std-acl)#exit
3.ApplytheACL.
15-5
SJ-20130520164529-007|2013-06-30(R1.0)ZTEProprietaryandCondential