Tripp Lite B093-004-2E4U-V 4-Port Console Server with 4G LTE Cellular Gateway, Dual GbE NIC, 4Gb Flash and Dual SIM

Owner's Manual - Page 218

For B093-004-2E4U-V. Also, The document are for others Tripp Lite models: B093-00X-2E4U-X, B097-016/048, B098-016/048, B098-016-V

PDF File Manual, 285 pages, Read Online | Download pdf file

B093-004-2E4U-V photo
Loading ...
Loading ...
Loading ...
218
14. Configuration from the Command Line
To allow another group named ‘Group8’ access to the same host:
# config -s config.sdt.hosts.host5.groups.group2=Group8
# config -s config.sdt.hosts.host5.groups.total=2 (total number of users having access to host)
To delete the Group7, use the following command:
# rmuser Group7
Attention: The rmuser script is a generic script to remove any config element from config.xml correctly. However,
any dependencies or references to this group will not be affected. Only the group details are deleted. The
administrator is responsible for reviewing config.xml and removing group dependencies and references manually,
specifically if the group had access to a host or RPC device.
The following command will synchronize the live system with the new configuration:
# config -a
14.1.4 Authentication
To change the type of authentication for the console server:
# config -s config.auth.type=’authtype’
‘authtype’ can be:
Local
LocalTACACS
TACACS
TACACSLocal
TACACSDownLocal
LocalRADIUS
RADIUS
RADIUSLocal
RADIUSDownLocal
LocalLDAP
LDAP
LDAPLocal
LDAPDownLocal
To configure TACACS authentication:
# config -s config.auth.tacacs.auth_server=’comma separated list’ (list of remote authentication and authorization servers.)
# config -s config.auth.tacacs.acct_server=’comma separated list’ (list of remote accounting servers. If unset, Authentication and
Authorization Server Address will be used.)
# config -s config.auth.tacacs.password=’password’
To configure RADIUS authentication:
# config -s config.auth.radius.auth_server=’comma separated list’ (list of remote authentication and authorization servers.)
# config -s config.auth.radius.acct_server=’comma separated list’ (list of remote accounting servers. If unset, Authentication and
Authorization Server Address will be used.)
# config -s config.auth.radius.password=’password’
To configure LDAP authentication:
# config -s config.auth.ldap.server=’comma separated list’ (list of remote servers.)
# config -s config.auth.ldap.basedn=’name’ (The distinguished name of the search base. For example: dc=my-company,dc=com)
# config -s config.auth.ldap.binddn=’name’ (The distinguished name to bind to the server with. The default is to bind anonymously.)
# config -s config.auth.radius.password=’password’
The following command will synchronize the live system with the new configuration:
# config -r auth
Loading ...
Loading ...
Loading ...