Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual page 22

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

16
M
U
ANAGING
SERS
Step 3
Step 4
From the Authentication Module drop-down list box, select the authentication type
you wish to configure.
Configure the selected authentication type:
If you selected System Authentication, go to
a
If you selected RADIUS Authentication, enter values for the following
b
parameters:
Table 2-3 RADIUS Parameters
Parameter
Description
RADIUS Server
Specify the hostname or IP address of the RADIUS server.
RADIUS Port
Specify the port of the RADIUS server.
Authentication
Specify the type of authentication you wish to perform. The
Type
options are:
Shared Secret
Specify the shared secret that STRM Log Management uses to
encrypt RADIUS passwords for transmission to the RADIUS
server.
If you selected TACACS Authentication, enter values for the following
c
parameters:
Table 2-4 TACACS Parameters
Parameter
Description
TACACS Server
Specify the hostname or IP address of the TACACS server.
TACACS Port
Specify the port of the TACACS server.
STRM Log Management Administration Guide
CHAP (Challenge Handshake Authentication Protocol) -
Establishes a Point-to-Point Protocol (PPP) connection
between the user and the server.
MSCHAP (Microsoft Challenge Handshake Authentication
Protocol) - Authenticates remote Windows workstations.
ARAP (Apple Remote Access Protocol) - Establishes
authentication for AppleTalk network traffic.
ASCII
PAP (Password Authentication Protocol) - Sends clear text
between the user and the server.
Step 5

Advertisement

Table of Contents
loading

Table of Contents