Bridge GUI Guide: Security Configuration
133
matches the DN:
C=US, ST=Florida, O="Fortress Technologies” OU=Engineering
but does not match the DNs:
C=US, ST=Florida, OU=Engineering
C=US, ST=Florida, L=Oldsmar, O="Fortress Technologies”
Priority
- establishes the order in which the ACL entry will
be applied, from
1
to
100
, relative to other configured ACL
entries.
Priority
values must be unique. Entries with lower
Priority
numbers take precedence over those with higher
Priority
numbers.
Access
- determines whether the Bridge will
Allow
(the
default) or
Deny
access to IPsec peers whose X.509
certificate DNs match the DN pattern of the entry.
To add an IPsec ACL entry:
1
Log on to the Bridge GUI through an
Administrator
-level
account and select
Configure
->
IPsec
from the menu on the
left.
2
In the
IPsec Settings
screen’s
IPsec ACLs
frame, click
ADD
ACL
and, on the resulting screen, enter values for the
settings described above.
3
Click
APPLY
in the upper right of the screen (or
CANCEL
the
addition).
The ACL entries you add are listed in the
IPsec ACLs
frame.
To delete IPsec ACL entries:
1
Log on to the Bridge GUI through an
Administrator
-level
account and select
Configure
->
IPsec
from the menu on the
left.
2
In the
IPsec Settings
screen’s
IPsec ACLs
frame:
If you want to delete a single ACL entry or selected
entries, click to place a checkmark in the box(es)
beside the entry(-ies) you want to eliminate.
NOTE:
Deleting all
ACL entries dis-
ables the Bridge’s IPsec
ACL function.
or
If you want to delete all ACL entries, click
ALL
at the top
of the
IPsec ACLs
list to check all entries.
Click the
IPsec ACLs
frame’s
DELETE
ACL
button.
Deleted ACL entries are removed from the
IPsec ACLs
list.
4.3 Authentication Services
The Bridge is equipped with an internal, or local, RADIUS
(Remote Authentication Dial In User Service) server (Section
4.3.2). It can also be configured to use external authentication
servers, both 3rd-party RADIUS servers and those of other
Fortress Bridges to which the current Bridge is connected
(Section 4.3.1).