
Configuring the Firewall to use a RADIUS Server
133
does not respond within the specified number of retries, the VPN
connection will be dropped. This field may range between 0 and 30. A
value of 3 is recommended for a typical network.
RADIUS Server Timeout in Seconds
The
RADIUS Server Timeout in Seconds
field determines the length of
time that will elapse before the Firewall attempts to contact the RADIUS
server again after a failure. The RADIUS server timeout may range from 0
to 60 seconds. A value of 5 seconds is recommended for a typical
network.
Changing RADIUS
Server Details
The primary RADIUS server is defined in the RADIUS server section. An
optional secondary RADIUS server may be defined if a backup RADIUS
server exists on the network.
The process for configuring a primary RADIUS server is described below. If
you have a backup or secondary RADIUS server on your network then
repeat the process for the
Secondary Server
fields.
Name or IP Address
Enter the DNS name or IP address of your RADIUS server in the
Name or
IP Address
field. Using the name of the server allows you to change its
address without reconfiguring the Firewall.
Click the
Update
button to save your changes.
Port Number
Enter the UDP port number that your RADIUS server listens on in the
Port
Number
field. This information can be found in the documentation that
came with your RADIUS server.
The
Steel-Belted RADIUS Server
, for example, is set to listen on port 1645
by default.
Click the
Update
button to save your changes.
Shared Secret
The shared secret of a RADIUS server is a case sensitive alphanumeric
string of up to 30 characters that is used to authenticate the Firewall and
the RADIUS server. Your RADIUS server may use its administrative
password as a shared secret.
DUA1611-0AAA02.book Page 133 Thursday, August 2, 2001 4:01 PM
Содержание SUPERSTACK 3CR16110-95
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM...