Alteon Application Switch Operating System Application Guide
Securing Alteon
62
Document
ID:
RDWR-ALOS-V2900_AG1302
In this example, the following source IP addresses are granted or not granted access to Alteon:
•
A host with a source IP address of 192.192.192.21 falls within the defined range and is granted
access to Alteon.
•
A host with a source IP address of 192.192.192.192 falls outside the defined range and is not
granted access.
To ensure that the source IP address is valid, you would need to shift the host to an IP address
within the valid range specified by the address and mask, or modify the address to be
192.192.192.128 and the mask to be 255.255.255.128. This would put the 192.192.192.192 host
within the valid range allowed by the address and mask (192.192.192.128-255).
RADIUS Authentication and Authorization
Alteon supports the Remote Authentication Dial-in User Service (RADIUS) method to authenticate
and authorize remote administrators for managing Alteon. This method is based on a client/server
model. The Remote Access Server (RAS) (Alteon) is a client to the back-end database server. A
remote user (the remote administrator) interacts only with the RAS, not the back-end server and
database.
RADIUS authentication consists of the following components:
•
A protocol with a frame format that uses UDP over IP (based on RFC 2138 and RFC 2866)
•
A centralized server that stores all the user authorization information
•
A client, in this case, Alteon
RADIUS Authentication Features
Alteon supports the following RADIUS authentication features:
•
Supports RADIUS client in Alteon, based on the protocol definitions in RFC 2138 and RFC 2866.
•
Allows RADIUS secret passwords up to 32 bytes and less than 16 octets.
•
Supports a secondary authentication server so that when the primary authentication server
is unreachable, Alteon can send client authentication requests to the secondary authentication
server. Use the
/cfg/sys/radius/cur
command to show the currently active RADIUS
authentication server.
•
Supports the following user-configurable RADIUS server retry and time-out values:
—
Time-out value: 1 to 10 seconds
—
Retries: 1 to 3
Alteon times out if it does not receive a response from the RADIUS server within 1 to 3 retries.
Alteon also retries connecting to the RADIUS server before it declares the server down.
•
Supports a user-configurable RADIUS application port.
The default is 1812/UDP, based on RFC 2138.
•
Allows the network administrator to define privileges for one or more specific users to access
Alteon at the RADIUS user database.
•
Supports SecurID if the RADIUS server can do an ACE/Server client proxy. The password is the
PIN number, plus the token code of the SecurID card.
Содержание Alteon
Страница 2: ...Alteon Application Switch Operating System Application Guide 2 Document ID RDWR ALOS V2900_AG1302 ...
Страница 42: ...Alteon Application Switch Operating System Application Guide Preface 42 Document ID RDWR ALOS V2900_AG1302 ...
Страница 582: ...Alteon Application Switch Operating System Application Guide High Availability 582 Document ID RDWR ALOS V2900_AG1302 ...