
9: Device Settings
Active
Directory
. If a Generic LDAP Server is selected, edit the
LDAP scheme.
User search subfilter
Restrict the search for users.
Active Directory
Domain
This option represents the active directory domain that is
configured in the Microsoft Active Directory server. This option is
only valid if Microsoft Active Directory is the LDAP server type.
RADIUS
When RADIUS is selected, the Spider communicates with a RADIUS server for user
authentication. To access a Spider set up for RADIUS, log in with a name and password.
The Spider contacts the RADIUS server for authentication and, if approved, the Spider
uses the locally stored user profile. If there is no such profile access via RADIUS will be
refused. The RADIUS implementation also has a timeout whereby if there is no activity
for half an hour the connection to the Spider will be terminated.
Server
Enter the name or IP address of the RADIUS server, reachable
over the network by the Spider, containing the user database.
Configure a DNS server if a name rather than an address is
used.
Shared Secret
A shared secret is a text string that serves as a password
between the RADIUS client and RADIUS server. In this case the
Spider acts as a RADIUS client. A shared secret is used to verify
that RADIUS messages are sent by a RADIUS-enabled device
that is configured with the same shared secret and to verify that
the RADIUS message has not been modified in transit (message
integrity).
Enter a maximum of 128 alpha-numeric characters and symbols
such as an exclamation point (“!”) or an asterisk (“*”).
Authentication Port
The port the RADIUS server listens for authentication requests.
The default value is
1812
.
Accounting Port
The port the RADIUS server listens for accounting requests. The
default value is
1813
.
Timeout
Sets the request time-to-live in seconds. The time-to-live is the
time to wait for the completion of the authentication request. If
the request job is not completed within this interval of time it is
cancelled. The default value is
1
second.
Retries
Sets the number of retries if a request could not be completed.
The default value is
3
times.
3. Click
Apply
to save settings. Click
Reset to Def
to restore system defaults.
Event Log
The Event Log maintains a list of significant events locally. Alternatively it can use an
NFS log file, SMTP email, or SNMP to distribute event information on the network. The
Spider monitors five classes of events with the logging of each enabled or disabled.
To configure event log settings:
1. Select
Device Settings
Æ
Event Log
from the Main Menu. The
Event Log
window
displays.
SecureLinx Spider User Guide
48