Lantronix SCS1620 Podręcznik Użytkownika Strona 113

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 141
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 112
SCSxx05/SCSxx20 User Guide 9: Port Access
9-9
Bypassing Authentication
Note: The ability to bypass the authentication mechanisms, as described
below, may not be deployed on your particular console server. If it has
been deployed on your console server and you have specified that
authentication should not take place on certain serial ports, beware!
Enable this feature only if the console server is located within a fully
protected internal network, and all of the users can be trusted.
The console server requires each user of a serial port to be authenticated by the
console server itself. The console server also requires each user who accesses
the serial ports to have the proper direct, listen, and/or clear port permissions on
a per port basis. This is the default operation. The authentication within the Linux
login program is done using the Pluggable Authentication Module (PAM). This
authentication module supports a wide variety of authentication types, for
example, local password files, NIS, NIS+, LDAP, and Kerberos. The SCS
supports the use of local password files, NIS, and LDAP.
On some console server systems, you can allow a Telnet connection directly to a
serial port to bypass the authentication mechanism on the console server. This
allows a client to connect directly to a serial port from anywhere on your network
(segment). Of course, this can introduce security concerns. As a minimum, the
device that is connected to the other end of the serial port should use some type
of authentication method. Some sites may have their console servers on a
dedicated internal network that only a system administrator (or a console
management software application) can access. This additional step of
authentication becomes either a nuisance or causes problems with the console
management software application. In this case, you can indicate, on a port-by-
port basis, that authentication not be done by the console server.
When you designate a serial port to have the console server authentication
scheme bypassed, the appropriate sections of the login program are bypassed.
Although the system never prompts the user for a username or password, the
user automatically defaults to “nobody” on the console server.
To disable the authentication mechanism for directly connected serial ports,
make two sets of changes.
1. Set a flag in the /lci/lwip_serial.conf file based on the specific serial
port/IP/port number entry. The login process checks this file. A one (1) in the
authentication column indicates that authentication must be done. A zero
(0) indicates that authentication will not be done for this serial port/IP/port
number entry.
Note: The authentication flag is specific to each serial port/IP/port
number entry You can allow direct access to a serial port by an IP
port number or by an assigned IP address. You may require
authentication for serial ports accessed by assigned IP addresses
and not require authentication for serial ports accessed by the IP port
numbers. You can configure this; however, you can make only one
direct connection to a serial port at a time.
Przeglądanie stron 112
1 2 ... 108 109 110 111 112 113 114 115 116 117 118 ... 140 141

Komentarze do niniejszej Instrukcji

Brak uwag