User's Manual

Horizon Compact Release 1.01.01 Wireless Ethernet Product User Manual Volume 1
11.0 Advanced Configuration Features
DragonWave Horizon Compact has a number of optional advanced configuration features that may be
applied if desired. It is recommended that they only be applied once the Horizon Compact is satisfactorily
aligned and successfully carrying traffic. The following lists the features available:
Radius Server User Authentication Threshold Alarms
VLAN Tagging Rapid Link Shutdown (RLS)
802.1P Priority Tagging
Simple Network Timing Protocol
(SNTP)
Horizon Throughput Speed Adaptive Modulation
Adaptive Transmit Power Control
(ATPC)
Radio Redundancy
Modem Authentication
Each feature is described in this manual, but detailed configuration information for each can be found in
the Horizon Product Manual Volume 2 - Advanced Features.
11.1 RADIUS Server User Authentication
The DragonWave Remote Authentication Dial In User Service (RADIUS) server option enables users to
be centrally authenticated before being allowed access to a Horizon Compact unit. This adds another
layer of security by removing user access control away from individual units and moving it to a central
server. However, all Horizon Compact units must have all approved users entered in the user
authentication list before the system will grant access at the appropriate user levels (admin, NOC, Super).
Up to five (5) RADIUS servers can be configured.
When one, or more, RADIUS server is configured, the username and password authentication system on
the Horizon Compact is bypassed, in favour of the RADIUS system. Access levels are still retained in the
local Horizon Compact memory, so once a user is verif ied by the RADIUS server the access level is
assigned by the Horizon Compact (provided that that user is a valid user on that unit). Any user that is
validated by the RADIUS server, but is not found in the Horizon Compact user authentication list, can
gain access to the unit but only at an admin user level.
If, on attempting to log in, a user does not receive a response from a configured RADIUS server, the user
will not be allowed to log in.
Only the Super User can issue any of the RADIUS “set” commands and view any of the security related
entries returned with “get” commands (passwords, shared key etc..)