Authentication - Sierra Wireless AirLink ES440 User Manual

Aleos 4.4.0 software configuration
Hide thumbs Also See for AirLink ES440:
Table of Contents

Advertisement

ALEOS 4.4.0 Software Configuration User Guide
Field
Enable time update
SNTP Server Address
190
Description
Enables daily SNTP update of the system time.
Default: Disable
SNTP Server IP address, or fully qualified domain name, to use if *SNTP=1. If blank,
time.nist.gov is used.
d.d.d.d=IP address
name=domain name

Authentication

ALEOS supports ACEmanager login using secure LDAP, RADIUS, and TACACS+
authentication schemes. This enables enterprise IT managers to centrally
manage access to AirLink devices and produce an audit trail showing which users
logged into specific devices and when.
Note the following:
You can configure any or all of these schemes at the same time. When more
than one scheme is configured, the authentication is successful if at least one
of the schemes authenticates the user.
Successful authentication can take time. For example, if you have all three
authentication schemes enabled, ALEOS first attempts to reach the LDAP
server. If it is unable to reach the LDAP server in the configured timeout
period, it abandons the attempt and tries to reach the RADIUS server. If that
server is unreachable after the timeout period, it then tries to reach the
TACACS+ server. If none of the servers are reachable in the configured
timeout periods, ALEOS falls back to ACEmanager user name and password
authentication.
LDAP, RADIUS, and TACACS+ provide authentication (checks the user's
credentials) but do not check authorization (account expiration date, user
rights, etc.) All users authenticated using the LDAP, RADIUS, and TACACS+
servers have administrative rights (i.e. a user account, not a viewer account)
and can modify the AirLink device settings. Ensure that LDAP, RADIUS, and
TACACS+ users are authorized to modify device settings.
LDAP, RADIUS, and TACACS+ are supported for ACEmanager logins, but are
not supported by other AirLink device services such as Telnet, SSH, PPPoE,
etc.
For instructions on configuring these authentication schemes, see:
LDAP Authentication
RADIUS Authentication
TACACS+ Authentication
on page 191
on page 192
on page 193
4116359

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents