Configuring The Authentication Order (Nsm Procedure); Configuring The Authorization Order (Nsm Procedure); Table 15: Accounting Order Configuration Details; Table 16: Authentication Order Configuration Details - Juniper NETWORK AND SECURITY MANAGER 2010.4 - M-SERIES AND MX-SERIES DEVICES GUIDE REV 1 Manual

Network and security manager
Table of Contents

Advertisement

Configuring the Authentication Order (NSM Procedure)

Configuring the Authorization Order (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.

Table 15: Accounting Order Configuration Details

Task
Configure the accounting
order.
You can configure the order in which the JUNOS Software tries different authentication
methods when authenticating peers. For each access attempt, the software tries the
authentication methods in order, from first to last.
To configure authentication order in NSM:
In the NSM navigation tree, select Device Manager > Devices.
1.
Click the Device Tree tab, and then double-click the device to select it.
2.
Click the Configuration tab. In the configuration tree, expand Access.
3.
Select Profile.
4.
Add or modify settings as specified in Table 16 on page 59.
5.
Click one:
6.
OK—Saves the changes.
Cancel—Cancels the modifications.

Table 16: Authentication Order Configuration Details

Task
Configure the authentication
order.
To configure authorization order in NSM:
In the NSM navigation tree, select Device Manager > Devices.
1.
Click the Device Tree tab, and then double-click the device to select it.
2.
Click the Configuration tab. In the configuration tree, expand Access.
3.
Select Profile.
4.
Your Action
1.
Click Add new entry next to Profile.
2. Click Accounting Order next to Profile.
3. Click Add new entry next to Accounting Order.
4. In the New accounting-order window, select radius to use
RADIUS accounting method.
Your Action
1.
Click Add new entry next to Profile.
2. Click Authentication Order next to Profile.
3. Click Add new entry next to Accounting Order.
4. In the New authentication-order window, select the order in
which the JUNOS Software tries different authentication
methods when verifying that a client can access the router.
Chapter 7: Configuring Access
59

Advertisement

Table of Contents
loading

This manual is also suitable for:

M-seriesMx-series

Table of Contents