Configuring Tacacs+ Authentication (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3 Configuration Manual

Nsm configuration guide for ex series devices
Table of Contents

Advertisement

Related
Documentation

Configuring TACACS+ Authentication (NSM Procedure)

4
Table 5: RADIUS Authentication Configuration Details
Option
Function
Name
Specifies the IP address of the RADIUS server.
Secret
Specifies the shared secret (password) of the
RADIUS server. The secret is stored as an
encrypted value in the configuration database.
Source
Specifies the source address to be included in
Address
the RADIUS server requests by the device. In
most cases, you can use the loopback address
of the device.
Configuring TACACS+ Authentication (NSM Procedure) on page 4
Configuring Authentication Order (NSM Procedure) on page 5
Configuring User Access (NSM Procedure) on page 6
To use TACACS+ authentication, you must configure at least one TACACS+ server.
Configuring TACACS+ authentication involves identifying the TACACS+ server, specifying
the secret (password) of the TACACS+ server, and setting the source address of the
device's TACACS+ requests to the loopback address of the device.
To configure TACACS+ authentication:
In the NSM navigation tree, select Device Manager > Devices.
1.
Click the Device Tree tab and then double-click the device for which you want to
2.
configure TACACS+ authentication.
Click the Configuration tab. In the configuration tree, select System > TACACS+
3.
Server.
Add or modify TACACS+ settings as specified in Table 6 on page 4.
4.
Click one:
5.
New—Adds a new TACACS+ server.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 6: TACACS+ Authentication Configuration Details
Option
Function
Name
Specifies the IP address of the TACACS+ server.
Your Action
Enter the IP address of the
RADIUS server.
Enter the shared secret of the
RADIUS server.
Enter the loopback address of
the device.
Your Action
Enter the IP address of the
TACACS+ server.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents