Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 193

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Click the Configuration tab and select Authentication > Auth Servers. The
3.
corresponding workspace appears.
NOTE: If you want to update an existing server instance, click the
appropriate link in the Auth Server Name box, and perform the Steps 5
through 10.
Click the New button. The New dialog box appears.
4.
In the Auth Server Name list, specify a name to identify the server instance.
5.
Select SiteMinder Server from the Auth Server Type list.
6.
Configure the server using the settings described in Table 44 on page 175.
7.
Click one:
8.
OK—Saves the changes.
Cancel—Cancels the modifications.
Set advanced SiteMinder configuration options (optional) using the settings described
9.
in Table 45 on page 182.
Table 44: Secure Access eTrust SiteMinder Configuration Details
Option
Siteminder Settings > Basic Settings tab
Policy Server
Backup Server(s)
Failover Mode?
Agent Name
Secret
Chapter 11: Configuring Authentication and Directory Servers
Function
Specifies the name or IP
address of the SiteMinder
policy server.
Specifies a list of backup
policy servers (optional).
Allows the Secure Access
device to use the main policy
server unless it fails.
Specifies the SiteMinder agent
name.
Specifies the shared secret.
Your Action
Enter a name or IP address.
Enter a comma-delimited list
of backup policy servers
(optional).
Select Yes — Secure Access
device uses the main policy
server unless it fails.
Select No— Secure Access
device load balances
among all the specified
policy servers.
Enter an agent name.
NOTE: Shared secret and
agent name are case-sensitive.
Enter a shared secret name.
NOTE: Shared secret and
agent name are case-sensitive.
175

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents