User Guide

9. Fill in the form according to your local setup of the Kerberos server.
10. Click apply changes.
To configure a NIS authentication server:
Perform the following procedure to configure a NIS authentication server when the console
server or any of its ports are configured to use NIS authentication method or any of its
variations (Local/NIS, NIS/Local or NISDownLocal).
1. Go to Security - Authentication - NIS in Expert mode.
2. Fill in the form according to your configuration of the NIS server.
3. Click apply changes.
NOTE: NIS does not work if the Security Profile is set to Moderate or Secured. It only works if the Security Profile is
Open.
Security Profiles
A Security Profile consists of a set of parameters that can be configured in order to have more
control over the services that are active at any time.
Pre-defined security profiles
There are three pre-defined security profiles:
Secure - The Secure profile disables all protocols except sshv2, HTTPS and SSH to serial
ports. Authentication to access serial ports is required and SSH root access is not allowed.
NOTE: SSH root access is enabled when the security profile is set to Moderate or Open. If a Secured security
profile is selected, you need to switch to a Custom security profile and enable the allow root access option.
Moderate - The Moderate profile is the recommended security level. This profile enables
sshv1, sshv2, HTTP, HTTPS, Telnet, SSH and Raw connections to the Serial Ports. In
addition, ICMP and HTTP redirection to HTTPS are enabled. Authentication to access the
serial ports is not required.
Open - The Open profile enables all services such as Telnet, sshv1, sshv2, HTTP, HTTPS,
SNMP, RPC, ICMP and Telnet, SSH and Raw connections to the serial ports.
Authentication to access serial ports is not required.
Default security profile
The Default Security Profile uses the same parameters as the Moderate profile. See the
following tables for the list of enabled services when the Default security profile is used.
98 Cyclades
®
ACS5000 Installation/Administration/User Guide