5.
In the Auth Server Name list, specify a name for the RADIUS Server.
6.
Select
Radius Server
from the Auth Server Type list.
7.
Configure the server using the settings described in Table 43 on page 172.
8.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 43: RADIUS Server Configuration Details
Your Action
Function
Option
Primary Server tab
Enter the name or IP address.
Specifies a unique name or IP
address for the RADIUS server.
Radius Server
Enter the name.
Identifies the Secure Access device
network access server client that
communicates with the RADIUS
server.
NAS-Identifier
Enter the port value.
NOTE: Typically this port is
1812, but some legacy servers
might use 1645.
Specifies the authentication port
value for the RADIUS server.
Authentication Port
Enter a string for the shared
secret.
Specifies a string for the shared
secret.
Shared Secret
Enter the port value.
NOTE: Typically this port is
1813, but some legacy servers
might use 1646.
Specifies the accounting port value
for the RADIUS server.
Accounting Port
Enter the NAS IP address.
Controls the NAS IP address value
passed to RADIUS requests.
NAS-IP-Address
Enter the time.
Specifies the time interval for the
Secure Access device to wait for a
response from the RADIUS server
before timing out the connection.
Timeout (minutes)
Enter the number of retries.
Allows Secure Access device to try
to make a connection after the first
attempt fails.
Retries
Select
Users authenticate
using tokens or one-time
passwords
check box.
Allows you not to submit the
password entered by the user to
other SSO enabled applications.
Users authenticate
using tokens or
one-time passwords
Backup Server tab
Copyright © 2010, Juniper Networks, Inc.
172
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...