The following steps illustrate how a RADIUS server is configured. Assume that the NetDefendOS
object will have the name
rs_users
and the IPv4 address
radius_ip
which is already defined in the
address book.
The connecting port will be
1812
(the default) and a shared secret of
mysecretcode
will be used
for security.
A retry timeout value of 2 means that NetDefendOS will resend the authentication request to the
sever if there is no response after 2 seconds. There will be a maximum of 3 retries.
Command-Line Interface
gw-world:/> add RadiusServer rs_users
IPAddress=radius_ip
SharedSecret=mysecretcode
Port=1812
RetryTimeout=2
Web Interface
1.
Go to: Policies > User Authentication > RADIUS > Add > RADIUS Server
2.
Now enter:
•
Name: rs_users
•
IP Address: radius_ip
•
Port: 1812
•
Retry Timeout: 2
•
Shared Secret: mysecretcode
•
Confirm Secret: mysecretcode
3.
Click OK
8.2.4. External LDAP Servers
Lightweight Directory Access Protocol
(LDAP) servers can also be used with NetDefendOS as an
authentication source. This is implemented by the NetDefend Firewall acting as a client to one or
more LDAP servers. Multiple servers can be configured to provide redundancy if any servers
become unreachable.
Setting Up LDAP Authentication
There are two steps for setting up user authentication with LDAP servers:
•
Define one or more user authentication LDAP server objects in NetDefendOS.
•
Specify one or a list of these LDAP server objects in a user authentication rule.
One or more LDAP servers can be associated as a list within a user authentication rule. The
ordering of the list determines the order in which server access is attempted.
Chapter 8: User Authentication
616
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...