A SecurID ACE server can store L2TP, XAuth, and device administrator user accounts for
authentication purposes; but it cannot assign L2TP, XAuth remote settings, or device
administrator privileges.
Configuring an LDAP Authentication Server
Lightweight Directory Access Protocol (LDAP) a protocol for organizing and accessing
information in a hierarchical structure resembling a branching tree. LDAP is used to locate
resources, such as organizations, individuals, and files on a network, and helps
authenticate users attempting to connect to networks controlled by directory servers.
To create an LDAP authentication server object, configure the following:
•
LDAP Server Port: The port number on the LDAP server to which the security device
sends authentication requests. The default port number is 389.
•
Common Name Identifier: The identifier used by the LDAP server to identify the
individual entered in a LDAP server. For example, an entry of “uid” means “ user ID” and
“cn” for “ common name.”
•
Distinguished Name (dn): The path used by the LDAP server before using the common
name identifier to search for a specific entry. (For example, c=us;o=juniper, where “c”
stands for “country,” and “o” for “organization.”)
Supported Users
An LDAP server supports the following types of users and authentication features:
•
Auth users
•
L2TP users (user authentication; L2TP user receives default L2TP settings from the
security device)
•
XAuth users (user authentication; no support for remote setting assignments)
•
Admin users (user authentication; administrator user receives default privilege
assignment of read-only)
LDAP servers cannot assign L2TP or XAuth remote settings.
Configuring a TACACS Authentication Server
Terminal Access Controller Access Control System (TACACS) is a security application.
As of Release 2007.3, you can configure TACACS to authenticate administrator users.
To configure the TACACS server:
1.
In the NSM main navigation tree, click
Object Manager
>
Authentication Servers
.
2.
Select the TACACS server type from the Authentication Server dialog box.
3.
Configure the following parameters and click
OK
.
Copyright © 2010, Juniper Networks, Inc.
398
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...