Authentication / Authorization And Users Options; About Md5, Sha1, Aes-128, And Des - Juniper MEDIA FLOW CONTROLLER 2.0.4 - ADMINISTRATOR S GUIDE AND CLI Administrator's Manual

Administrator’s guide and cli command reference
Table of Contents

Advertisement

Media Flow Controller Administrator's Guide
4. Configure the IP address for the bonded interface.
test-vos (config) # interface 0 <IP_address>
5. Optionally, configure static routes and ensure a static host mapping for the defined
hostname. The ip route command only works on devices that already have an IP address
assigned. Use show ip route to verify.
ip route <network_prefix> {<netmask> | <mask_length>} {next_hop_IP_address
| interface_name>}
ip map-hostname
Example:
test-vos (config) # ip route 123.45.10.0 /24 eth0
6. Since delivery changes have been made, restart the delivery service.
service restart mod-delivery
Note!
Bonded interfaces show Speed and Duplex as UNKNOWN in show interfaces output;
this is not an error condition.
Related Topics
"Load Balancing (LB) Direct Server Return (DSR) Guidelines" on page 65

Authentication / Authorization and Users Options

Several configurations or tasks can use an already configured authentication / authorization
scheme (AAA, namespace pre-staging, users, file transfers, and so forth.). Authentication
schemes can be complex to configure—this section does not attempt to guide you through the
configuration steps for setting authentication or AAA options, but provides references to the
CLI commands. Before configuring any authentication / authorization schemes, you must have
this information: the hostname or IP address of the authenticating server, and a shared secret
for authentication.
"About MD5, SHA1, AES-128, and DES" on page 67
"User Account Defaults and States" on page 68

About MD5, SHA1, AES-128, and DES

The first two, md5 and sha1 are cryptographic hash algorithms.
md5—Message-Digest algorithm 5. Considered somewhat faster but less secure than
sha1, but still supported for legacy systems. Generates a 128-bit (16 byte) hash.
sha1—Secure Hash algorithm 1. Considered more secure than md5 but still vulnerable to
collision attacks. Generates a 160-bit (20 byte) hash.
The second two, AES-128 and DES are encryption standards used to encrypt and un-encyrpt
data.
AES-128—Advanced Encryption Standard; 128 is a specific "block cipher." AES is a
newer standard than DES and considered much more secure. Generates a 128 bit
encryption key. AES is an asymmetric encryption algorithm which means the sender uses
Media Flow Controller Configuration Tasks (CLI)
Authentication / Authorization and Users Options
67

Advertisement

Table of Contents
loading

This manual is also suitable for:

Media flow controller 2.0.4

Table of Contents