600
C
HAPTER
14: B
ULK
C
ONFIGURATION
There is a security risk associated with configuring RADIUS secrets on the
devices over the network because the SNMP protocol that 3Com
Network Director uses to configure the devices is unencrypted. It is
possible that a user of the network could deliberately intercept the
packets sent out during the bulk configuration operation and determine
from them the RADIUS secret used. This risk can be reduced by
scheduling bulk configuration of RADIUS secrets to take place out of
office hours, or eliminate the risk by configuring the devices individually
using a console connection.
The
RADIUS Servers
feature places restrictions on the values that can be
set for the following parameters:
Table 92
RADIUS servers feature restrictions
Configuring System Information
The
System Information
feature allows the configuration of the basic
device summary information that the devices make available to network
management applications.
Parameter
Restriction
IP Address
The IP address of a RADIUS server. The same address
cannot be entered for both a primary and a backup
authentication or accounting server. However, the same
address can be used as both an authentication and
accounting server if desired.
Port
The port on which the RADIUS service is available. The port
must be in the range 1-65535.
Secret
The shared secret has a maximum length of 30 characters
and a minimum length of 8 characters.
Timeout
The timeout for RADIUS authentication and accounting
requests. The timeout must be in the range 1-10 seconds.
Retries
The number of retries for RADIUS authentication and
accounting requests. The number of retries must be in the
range 0-5.
Summary of Contents for 3C15500 - Network Director - PC
Page 4: ......
Page 34: ......
Page 38: ...34 ABOUT THIS GUIDE ...
Page 50: ...46 CHAPTER 1 GETTING STARTED ...
Page 64: ...60 CHAPTER 2 PRODUCT ACTIVATION ...
Page 213: ...Components 209 Figure 75 Export to Visio Dialog Box ...
Page 220: ...216 CHAPTER 5 WORKING WITH THE MAP Figure 84 Double Clicking on a Router in the Tree ...
Page 264: ...260 CHAPTER 6 VIEWING DEVICE DETAILS Figure 117 Security Tab for a Device ...
Page 276: ...272 CHAPTER 6 VIEWING DEVICE DETAILS ...
Page 322: ...318 CHAPTER 7 MONITORING THE NETWORK ...
Page 385: ...Examples 381 Figure 189 Attach Alerts Dialog Box ...
Page 406: ...402 CHAPTER 9 PERFORMANCE REPORTING ...
Page 431: ...Components 427 History View dialog box Figure 210 History View Dialog Box ...
Page 440: ...436 CHAPTER 10 RMON Host View dialog box Figure 219 Host View Dialog Box ...
Page 476: ...472 CHAPTER 11 CREATING REPORTS ...
Page 502: ...498 CHAPTER 12 CONFIGURING SINGLE DEVICES ...
Page 526: ...522 CHAPTER 13 VLAN MANAGEMENT Figure 272 Options Dialog Box VLANs Tab ...
Page 567: ...Components 563 Figure 305 Selecting the Link to the End Station on the Map ...
Page 626: ...622 CHAPTER 14 BULK CONFIGURATION ...
Page 684: ...680 CHAPTER 16 UPGRADING DEVICE SOFTWARE ...
Page 814: ...810 CHAPTER 19 BACKING UP DEVICE CONFIGURATIONS ...
Page 838: ...834 CHAPTER 20 LIVE UPDATE ...
Page 894: ...890 APPENDIX G ADDING MAC ADDRESS VENDOR TRANSLATIONS ...