Table 42: Secure Access LDAP Server Instance Configuration
Details
(continued)
Your Action
Function
Option
Enter the IP address of the backup LDAP
server1.
NOTE: We do not recommend entering
hostname as it may accelerate failover
processing by eliminating the need to
resolve the hostname to an IP address.
Specifies the parameters for backup
LDAP server1 (optional).
NOTE: The device uses this type of
server for failover processing. Also,
backup LDAP server must be the
same version as the primary LDAP
server.
Backup LDAP
Server1
Enter the port number for the backup
LDAP port1.
Specifies the parameters for backup
LDAP port1.
Backup LDAP
Port1
Enter the IP address of the backup LDAP
server2.
Specifies the parameters for backup
LDAP server2 (optional).
Backup LDAP
Server2
Enter the port number for the backup
LDAP port2.
Specifies the parameters for backup
LDAP port2.
Backup LDAP
Port2
Select the type of LDAP server from the
drop-down list.
Specifies the type of LDAP server
that you want to authenticate users
against.
LDAP Server
Type
Select the type of connection from the
drop-down list.
Specifies whether or not the
connection between the Secure
Access device and LDAP Directory
Service should be unencrypted, use
SSL (LDAPs), or should use TLS.
Connection
Set the time required for the connection
to time out.
Specifies how long you want the
Secure Access device to wait for a
connection to the primary LDAP
server first, and then each backup
LDAP server in turn.
Connection
Timeout
(seconds)
Set the time required for the search to
time out.
Specifies how long you want the
Secure Access device to wait for
search results from a connected
LDAP server.
Search
Timeout
(seconds)
LDAP Settings > Authentication tab
Select
LDAP Settings
>
Authentication
>
Authentication required to search
LDAP
to enable this option.
Specifies if the device needs to
authenticate against the LDAP
Directory Service to perform a
search or to change passwords
using the password management
feature.
Authentication
required to
search LDAP
Enter the admin DN name.
Performs an anonymous search on
the LDAP server with an
authentication.
Admin DN
Copyright © 2010, Juniper Networks, Inc.
168
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...