Configuring Local User Groups; Configuring External Users - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Configuring Local User Groups

Configuring External Users

Copyright © 2010, Juniper Networks, Inc.
XAuth. Enables XAuth authentication for this user. If you select this option, you must
also enter an XAuth password for the user.
NOTE: All passwords handled by NSM are case-sensitive.
IKE. Enables IKE authentication using one of the IKE proposals defined in the IKE
proposal objects. If you select this option, you must also configure the IKE Share limit
and authentication token.
Auth. Enables local authentication against a username and password stored in a
security device's local database. If you select this option, you must also enter an Auth
password for the user.
L2TP. Enables authentication in the L2TP tunnel that the user uses to connect to the
device. If you select this option, you must also enter an L2TP password for the user.
Click OK to save the user object.
Organize local users in groups to add multiple users at one time to a security policy, and
to manage the members without changing the policy. To add a local user group object:
In the navigation tree, double-click the Object Manager, select User Objects, then
1.
select Local Users. In the main display area, click the Add icon and select New > Group
to display the New Local User Group dialog box.
Enter a name, color, and comment for the local user group.
2.
Configure the members of the group:
3.
To add members, select users from the Non-members list and click Add. Use
Ctrl-click to select multiple users, or click Add All to add all users in Non-members
list to the group.
To remove members, select users in the Members list and click Remove. Use
Ctrl-click to select multiple users, or click Remove All to remove all users in Members
list from the group.
Click OK to save the local user group.
4.
External user objects represent users whose accounts are maintained and authenticated
on devices that are not managed by NSM, such as an external RADIUS or SecureID server.
When an external user is included in a security policy (under Authentication rule options),
the security device uses the external server to authenticate that user.
To configure an external user:
Chapter 8: Configuring Objects
405

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents