Administering the Bridge
This chapter describes how to administer your bridge. This chapter contains these sections:
Preventing Unauthorized Access to Your Bridge, page 5-2
•
Protecting Access to Privileged EXEC Commands, page 5-2
•
Controlling Bridge Access with RADIUS, page 5-7
•
Controlling Bridge Access with TACACS+, page 5-12
•
Configuring the Bridge for Local Authentication and Authorization, page 5-15
•
Configuring the Bridge for Secure Shell, page 5-16
•
Managing the System Time and Date, page 5-17
•
Configuring a System Name and Prompt, page 5-31
•
Creating a Banner, page 5-33
•
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
C H A P T E R
5
5-1