S
ECURITY
M
ANAGEMENT
P
ACKET
L
IGHT
N
ETWORKS
PL-1000RO
3.3
I
NSTALLATION AND
C
ONFIGURATION
M
ANUAL
C
ONFIDENTIAL AND
P
ROPRIETARY
I
NFORMATION
.
A
LL RIGHTS RESERVED
.
P
AGE
39
4.2.2.2
Shared Secret
The Radius protocol does not transmit passwords in clear text between the Radius
client and server. Rather, a shared secret is used along with the MD5 hashing
algorithm to encrypt passwords. The shared secret string is not sent over the
network; therefore that same key should be independently configured to the
Radius clients and server.
4.2.2.3
Server Redundancy
For improved redundancy, the PL-1000RO can use one or two Radius servers:
Server #1 and Server #2.
N
OTE
:
There is no precedence between the Radius servers; therefore, the
authentication response is taken from the first server to answer.
4.2.2.4
Setting Up Radius
Before using Radius, the network administration should set up the Radius servers
and enable Radius authentication.
To set up Radius:
1.
Launch one or two Radius servers on Windows/Unix systems that are
accessible to the nodes via the IP network.
2.
Configure the Radius servers with
Shared Secret
string that will be used by
the Radius servers and clients.
3.
Enter the user name, password, and permission of all users to the Radius
servers.
4.
Configure the access information to the Radius servers for the Radius clients
of the nodes.
5.
Enable Radius authentication for all nodes.
4.2.2.5
Configuring the Radius Server
N
OTE
:
The server configuration process may look different on different Radius
server packages.
An Administrator can configure the Radius server.
To configure the Radius server:
1.
Configure the
Authentication Port
(default port is 1812).
N
OTE
:
If a firewall exists between the nodes to the Radius servers, make sure
that it does not block the chosen port.
2.
Configure the
Shared Secret
.
3.
For each user, configure the following attributes:
User-Name
Only alphanumeric characters without spaces are allowed.
User-Password
Only alphanumeric characters without spaces are allowed.