
Authentication / Authorization and Users Options
67
Media Flow Controller Administrator’s Guide
Media Flow Controller Configuration Tasks (CLI)
4.
Configure the IP address for the bonded interface.
test-vos (config) #
interface 0 <IP_address>
5.
Optionally, configure static routes and ensure a static host mapping for the defined
hostname. The ip route command only works on devices that already have an IP address
assigned. Use show ip route to verify.
ip route <network_prefix> {<netmask> | <mask_length>} {next_hop_IP_address
| interface_name>}
ip map-hostname
Example:
test-vos (config) #
ip route 123.45.10.0 /24 eth0
6.
Since delivery changes have been made, restart the delivery service.
service restart mod-delivery
Note!
Bonded interfaces show Speed and Duplex as UNKNOWN in show interfaces output;
this is not an error condition.
Related Topics
•
“Load Balancing (LB) Direct Server Return (DSR) Guidelines” on page 65
Authentication / Authorization and Users Options
Several configurations or tasks can use an already configured authentication / authorization
scheme (AAA, namespace pre-staging, users, file transfers, and so forth.). Authentication
schemes can be complex to configure—this section does not attempt to guide you through the
configuration steps for setting authentication or AAA options, but provides references to the
CLI commands. Before configuring any authentication / authorization schemes, you must have
this information: the hostname or IP address of the authenticating server, and a shared secret
for authentication.
•
“About MD5, SHA1, AES-128, and DES” on page 67
•
“User Account Defaults and States” on page 68
About MD5, SHA1, AES-128, and DES
The first two, md5 and sha1 are cryptographic hash algorithms.
•
md5—Message-Digest algorithm 5. Considered somewhat faster but less secure than
sha1, but still supported for legacy systems. Generates a 128-bit (16 byte) hash.
•
sha1—Secure Hash algorithm 1. Considered more secure than md5 but still vulnerable to
collision attacks. Generates a 160-bit (20 byte) hash.
The second two, AES-128 and DES are encryption standards used to encrypt and un-encyrpt
data.
•
AES-128—Advanced Encryption Standard; 128 is a specific “block cipher.” AES is a
newer standard than DES and considered much more secure. Generates a 128 bit
encryption key. AES is an asymmetric encryption algorithm which means the sender uses
Содержание MEDIA FLOW CONTROLLER 2.0.4 -
Страница 6: ...Media Flow Controller Administrator s Guide VI Copyright 2010 Juniper Networks Inc...
Страница 24: ...LIST OF FIGURES XXIV Copyright 2010 Juniper Networks Inc...
Страница 37: ...Copyright 2010 Juniper Networks Inc 37 PART 1 Media Flow Controller Administration...
Страница 38: ...Media Flow Controller Administrator s Guide 38 Copyright 2010 Juniper Networks Inc...
Страница 285: ...Copyright 2010 Juniper Networks Inc 285 PART 2 Media Flow Controller Command and MIB Reference...
Страница 286: ...Media Flow Controller Administrator s Guide 286 Copyright 2010 Juniper Networks Inc...