Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual page 23

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

Table 2-4 TACACS Parameters (continued)
Parameter
Authentication
Type
Shared Secret
If you selected LDAP/ Active Directory, enter values for the following
d
parameters:
Table 2-5 LDAP/ Active Directory Parameters
Parameter
Server URL
LDAP Context
LDAP Domain
Click Save.
Step 5
STRM Log Management Administration Guide
Description
Specify the type of authentication you wish to perform. The
options are:
PAP (Password Authentication Protocol) - Sends clear text
between the user and the server.
CHAP (Challenge Handshake Authentication Protocol) -
Establishes a PPP connection between the user and the
server.
MSCHAP (Microsoft Challenge Handshake Authentication
Protocol) - Authenticates remote Windows workstations.
MSCHAP2 - (Microsoft Challenge Handshake Authentication
Protocol version 2)- Authenticates remote Windows
workstations using mutual authentication.
EAPMD5 (Extensible Authentication Protocol using MD5
Protocol) - Uses MD5 to establish a PPP connection.
Specify the shared secret that STRM Log Management uses to
encrypt TACACS passwords for transmission to the TACACS
server.
Description
Specify the URL used to connect to the LDAP server. For
example, ldap://<host>:<port>
Specify the LDAP context you wish to use, for example,
DC=Q1LABS,DC=INC.
Specify the domain you wish to use, for example q1labs.inc
Authenticating Users
17

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 and is the answer not in the manual?

Table of Contents