Remote authentication:
Use the TACACS page to configure settings for the protocol.
The (Terminal Access Controller Access Control System Plus) protocol provides access control
(separate authentication, authorization, and accounting services) for 10G Network Active Bypass unit
from one or more servers.
The following settings are used for configuring remote authentication:
Table 20. settings
Field
Description
Default
Allows protocol for access
control
Disabled
Server
IP address of the server providing
access services
0.0.0.0
Protocol
Protocol used for the connection to
the server
tcp
Connection Timeout
Timeout for the connection to the
server (in seconds).
30
Encrypt
Encrypts the body of the
packets for more secure
communications
Disabled
Secret
Shared secret value for encryption
that is known to both the client and
the daemon
None
Service
Services that are requesting
authentication
All
26
10G Network Active Bypass V3.4: User Guide
Summary of Contents for 10G Network Active Bypass
Page 1: ...IBM Security 10G Network Active Bypass User Guide V ersion 3 4...
Page 4: ...iv 10G Network Active Bypass V3 4 User Guide...
Page 6: ...vi 10G Network Active Bypass V3 4 User Guide...
Page 16: ...xvi 10G Network Active Bypass V3 4 User Guide...
Page 40: ...22 10G Network Active Bypass V3 4 User Guide...
Page 46: ...28 10G Network Active Bypass V3 4 User Guide...
Page 50: ...32 10G Network Active Bypass V3 4 User Guide...
Page 54: ...36 10G Network Active Bypass V3 4 User Guide...
Page 55: ......
Page 56: ...Printed in USA...