Specifications
xxiii
Contents
Chapter 23 Managing Access Server Security
Overview......................................................................................................................23-1
Introduction..........................................................................................................23-1
In This Chapter.....................................................................................................23-1
Security Type Descriptions........................................................................................23-2
Introduction..........................................................................................................23-2
Kerberos................................................................................................................23-2
RADIUS.................................................................................................................23-2
SecurID..................................................................................................................23-3
User Accounts.......................................................................................................23-3
Common Terminology Across Security Realms.....................................................23-4
Introduction..........................................................................................................23-4
Accounting Host..................................................................................................23-4
Authentication Host............................................................................................23-4
Default Realm.......................................................................................................23-4
Login Retries and Timeouts................................................................................23-4
Secrets....................................................................................................................23-4
Security Server .....................................................................................................23-5
RADIUS Accounting ...........................................................................................23-5
UDP Ports..............................................................................................................23-5
Managing Kerberos.....................................................................................................23-6
Introduction..........................................................................................................23-6
Configuration Prerequisites ...............................................................................23-6
Configuration of User Authentication..............................................................23-7
User Authentication Procedure .........................................................................23-9
Changing a User Name and Password...........................................................23-10
User Authentication Counters .........................................................................23-10
Managing RADIUS...................................................................................................23-12
Introduction........................................................................................................23-12
Minimal Setup for RADIUS..............................................................................23-12
Optional Setup for RADIUS.............................................................................23-13
RADIUS User Authorizations..........................................................................23-15
User Access to the Access Server.....................................................................23-15
Setting User Permissions..................................................................................23-16
Additional RADIUS Attributes........................................................................23-16
Optional RADIUS User Attributes..................................................................23-22
Managing SecurID....................................................................................................23-23
Introduction........................................................................................................23-23
Minimal Setup for SecurID...............................................................................23-24
Optional Setup for SecurID..............................................................................23-24
SecurID User Authorizations...........................................................................23-25
Setting User Permissions..................................................................................23-26
Managing Local Access Server Security................................................................23-27
Introduction........................................................................................................23-27
Defining the Realm............................................................................................23-27
Determining Security Configuration......................................................................23-28
Displaying RADIUS, SECURID, and KERBEROS Characteristics.............23-28
Displaying Security Summary.........................................................................23-30
Showing the Authentication Counters ...........................................................23-31










