Configuring Authentication Order (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3 Configuration Manual

Nsm configuration guide for ex series devices
Table of Contents

Advertisement

Related
Documentation

Configuring Authentication Order (NSM Procedure)

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Table 6: TACACS+ Authentication Configuration Details (continued)
Option
Function
Secret
Specifies the shared secret (password) of the
TACACS+ server. The secret is stored as an
encrypted value in the configuration database.
Source
Specifies the source address to be included in
Address
the TACACS+ server requests by the device. In
most cases, you can use the loopback address
of the device.
Configuring RADIUS Authentication (NSM Procedure) on page 3
Configuring Authentication Order (NSM Procedure) on page 5
Configuring User Access (NSM Procedure) on page 6
You can configure the device so that user authentication occurs with the local password
first, then with the RADIUS server, and finally with the TACACS+ server.
To configure authentication order:
In the NSM navigation tree, select Device Manager > Devices.
1.
Click the Device Tree tab and then double-click the device for which you want to
2.
configure authentication order.
Click the Configuration tab. In the configuration tree, select System > Authentication
3.
Order.
In the Authentication Order workspace, click the New button. The New
4.
authentication-order list appears.
To add RADIUS authentication to the authentication order, select radius from the
5.
New authentication-order list.
To add TACACS+ authentication to the authentication order, select tacplus from the
6.
New authentication-order list.
To add Password authentication to the authentication order, select password from
7.
the New authentication-order list.
OK—Saves the changes.
Cancel—Cancels the modifications.
Configuring RADIUS Authentication (NSM Procedure) on page 3
Configuring TACACS+ Authentication (NSM Procedure) on page 4
Configuring User Access (NSM Procedure) on page 6
Chapter 1: Configuring User Access and Authentication
Your Action
Enter the shared secret of the
TACACS+ server.
Enter the loopback address of
the device.
5

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents