•
Secret - The secret (password) shared between the security device and the TACACS
server. The device uses this secret to encrypt the user's password that it sends to the
TACACS server.
•
Port - The port number on the TACACS server to which the security device sends an
authentication request. The default port number is 49.
Configuring User Objects
User objects represent the users of your managed devices. You can include user objects
or groups in security policies or VPNs to permit or deny access to individuals or groups.
NSM supports two types of user objects:
•
Local Users—Users with accounts that are managed by your security devices. You can
create local user groups that include multiple users simplify user administration and
make policies and VPNs easier to create.
•
External Users and External User Groups—Users with accounts that are managed by
external devices, such as RADIUS servers. You can use external users and groups to
create group expressions (for details, see “Configuring Group Expressions” on page 404).
Configuring Local Users
Local user objects represent the user account on your security devices. To add a local
user object:
1.
In the navigation tree, double-click the
Object Manager
, select
User Objects
, then
select
Local Users
. In the main display area, click the Add icon and select
New >
User
to display the New Local User dialog box.
2.
Enter a name, color, and comment for the local group.
3.
Select
Enable
to enable authentication for this user, then configure the authentication
methods for the user:
•
XAuth. Enables XAuth authentication for this user. If you select this option, you must
also enter an XAuth password for the user.
NOTE:
All passwords handled by NSM are case-sensitive.
•
IKE. Enables IKE authentication using one of the IKE proposals defined in the IKE
proposal objects. If you select this option, you must also configure the IKE Share limit
and authentication token.
•
Auth. Enables local authentication against a username and password stored in a
security device's local database. If you select this option, you must also enter an Auth
password for the user.
•
L2TP. Enables authentication in the L2TP tunnel that the user uses to connect to the
device. If you select this option, you must also enter an L2TP password for the user.
399
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...