•
XAuth. Enables XAuth authentication for this user. If you select this option, you must
also enter an XAuth password for the user.
NOTE:
All passwords handled by NSM are case-sensitive.
•
IKE. Enables IKE authentication using one of the IKE proposals defined in the IKE
proposal objects. If you select this option, you must also configure the IKE Share limit
and authentication token.
•
Auth. Enables local authentication against a username and password stored in a
security device's local database. If you select this option, you must also enter an Auth
password for the user.
•
L2TP. Enables authentication in the L2TP tunnel that the user uses to connect to the
device. If you select this option, you must also enter an L2TP password for the user.
•
Click
OK
to save the user object.
Configuring Local User Groups
Organize local users in groups to add multiple users at one time to a security policy, and
to manage the members without changing the policy. To add a local user group object:
1.
In the navigation tree, double-click the
Object Manager
, select
User Objects
, then
select
Local Users
. In the main display area, click the Add icon and select
New > Group
to display the New Local User Group dialog box.
2.
Enter a name, color, and comment for the local user group.
3.
Configure the members of the group:
•
To add members, select users from the Non-members list and click
Add
. Use
Ctrl-click to select multiple users, or click
Add All
to add all users in Non-members
list to the group.
•
To remove members, select users in the Members list and click
Remove
. Use
Ctrl-click to select multiple users, or click
Remove All
to remove all users in Members
list from the group.
4.
Click
OK
to save the local user group.
Configuring External Users
External user objects represent users whose accounts are maintained and authenticated
on devices that are not managed by NSM, such as an external RADIUS or SecureID server.
When an external user is included in a security policy (under Authentication rule options),
the security device uses the external server to authenticate that user.
To configure an external user:
405
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...