Table 289: Configuration Fields
Field
Description
Key String
Specifies the authentication and encryption key for communications
between the device and the server. The key must match the key
configured on the server.
Connection Timeout
The maximum number of seconds allowed to establish a TCP connection
between the device and the server.
Click
Refresh
to update the page with the most current information.
If you make any changes to the page, click
Submit
to apply the changes to the system.
Server Summary
Use the Server Summary page to view and configure information about the
server(s).
To access this page, click
Security
>
>
Server Summary
in the navigation menu.
Use the buttons to perform the following tasks:
•
To add a Server to the list of servers the client can contact, click
Add
. If
maximum number of server is added, the button will be disabled
•
To edit a configured server from the list, select the entry and click
Edit
.
•
To remove a configured server from the list, select the entry to delete and click
Remove
.
You must confirm the action before the entry is deleted.
Table 290: Server Summary Fields
Field
Description
Server
Specifies the Server IP address or Hostname.
Priority
Specifies the order in which the servers are used.
Port
Specifies the authentication port.
Key String
Specifies the authentication and encryption key for communications
between the device and the server. The key must match the
encryption used on the server.
Connection Timeout
The amount of time that passes before the connection between the device and
the server time out.
Click
Refresh
to update the page with the most current information.
Server Configuration
Use the Server Configuration page to view and configure information about the
server(s).
To access this page, click
Security
>
>
Server Configuration
in the navigation menu.
Managing Device Security
ExtremeSwitching 200 Series: Administration Guide
290