Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 648

Table of Contents

Advertisement

Network and Security Manager Administration Guide
598
members. This IKE ID is used to authenticate the users during the Phase 2 IKE
negotiations.
Additionally, you must add the security device and create an Address object to represent
the FTP server, as well as a protected resource. After you have assembled all the VPN
components, you are ready to create the VPN.
Configure the RADIUS Server. On the RADIUS server, load the Juniper Networks
1.
dictionary file and define Xauth user accounts. Use the Juniper Networks user group
VSA to create the user group xa_grp2 and apply it to the auth user accounts that you
want to add to that group.
NOTE: For instructions on loading the dictionary file onto a RADIUS server,
refer to the RADIUS server documentation. If you are using a Microsoft
IAS RADIUS server, there is no dictionary file to load. Instead, define the
correct vendor-specific attributes (VSAs) on the server.
Add the authentication server object. In the main navigation tree, select Object
2.
Manager > Authentication Servers and click the Add icon. Configure the following,
then click OK:
a. For name, enter radius1. Select a color and add a comment, if desired.
b. For Main Server, enter the IP 10.20.1.100; for Primary Backup Server, enter IP 10.20.1.110;
for Secondary Backup Server, enter IP 10.20.1.120.
c. For timeout, enter 30.
d. Enable For XAuth Users.
e. For Server Type, select RADIUS.
Configure the RADIUS server:
1.
For server port, select 4500 (default is 1645).
For secret, enter A56hYY97kl.
For retry timeout, enter 4.
Add an External User Group (in NSM). In the Object Manager, select User Objects >
2.
External User Groups. Click the Add icon to display the New External User Group
dialog box. Configure the following, then click OK.
For Name, enter xa-grp2.
For Color, select yellow.
For Comment, enter Reseller Group RADIUS.
Enable XAuth.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents