Server User Manual
Table Of Contents
- SDS/SCS/STS/MDC User’s Guide
- Table of Contents
- Preface
- Introduction
- Hardware and Connectivity
- Configuration Methods
- Getting Started
- Using DeviceManager and WebManager
- Network Settings
- Configuring Serial Ports
- Introduction
- Serial Ports
- Serial Port Profiles
- Common Tabs
- Console Management Profile
- TruePort Profile
- TCP Sockets Profile
- UDP Sockets Profile
- Terminal Profile
- User Service Settings
- Printer Profile
- Serial Tunneling Profile
- Virtual Modem Profile
- Control Signal I/O Profile
- Modbus Gateway Profile
- Power Management Profile
- Remote Access (PPP) Profile
- Remote Access (SLIP) Profile
- Custom Application Profile
- Port Buffering
- Advanced
- Configuring Users
- Configuring Security
- Configuring I/O Interfaces
- Configuring Clustering
- Configuring the Option Card
- Configuring the System
- Controlling the RPS, I/O Channels, and IPsec Tunnels
- System Administration
- Introduction
- Managing Configuration Files
- Downloading IOLAN Firmware
- Calibrating I/O
- Setting the IOLAN’s Date and Time
- Rebooting the IOLAN
- Resetting the IOLAN to Factory Defaults
- Resetting the SecurID Node Secret
- Language Support
- Downloading Terminal Definitions
- Resetting Configuration Parameters
- Lost Admin Password
- Applications
- RADIUS and TACACS+
- SSL/TLS Ciphers
- Virtual Modem AT Commands
- Pinouts and Cabling Diagrams
- Setting Jumpers
- I/O Wiring Diagrams
- Utilities
- Accessories
- Troubleshooting
- Introduction
- Hardware Troubleshooting
- Communication Issues
- DeviceManager Problems
- Host Problems
- RADIUS Authentication Problems
- Login Problems
- Problems with Terminals
- Unknown IP Address
- DHCP/BOOTP Problems
- Callback Problems
- Language Problems
- Modem Problems
- PPP Problems
- Printing Problems
- Long Reboot Cycle
- SSL/TLS
- I/O Models
- IPv6 Issues
- Contacting Technical Support
- Glossary
- Index

IOLAN SDS/SCS/STS/MDC User’s Guide, Version 4.0 213
Configuring Security Chapter 9
9
Introduction
The Security group includes the following configuration options:
z Authentication—When a serial port is configured for the
Console Management or TCP Sockets profile, the user can be
authenticated either locally in the IOLAN user profile or
externally. This option configures the external authentication
server. See
Authentication on page 213 for more information.
z SSH—This configuration window configures the SSH server in
the IOLAN. See
SSH on page 223 for more information.
z SSL/TLS—This configuration window configures global
SSL/TLS settings, which can be overridden on the serial port
level. See
SSL/TLS on page 226 for more information.
z VPN—This configuration window configures the Virtual Personal Network (VPN) IPsec and
L2TP/IPsec tunnel parameters. See
VPN on page 231 for more information.
z Services—This configuration window is used to enable/disabled client and daemon services that
run in the IOLAN. See
Services on page 240 for more information.
Authentication
Authentication can be handled by the IOLAN or through an external authentication server.
Authentication is different from authorization, which can restrict a user’s access to the network
(although this can be done through the concept of creating sessions for a user, see
Sessions Tab on
page 209 for more information). Authentication ensures that the user is defined within the
authentication database—with the exception of using the Guest authentication option under Local
Authentication
, which can accept any user ID as long as the user knows the configured password.
For external authentication, the IOLAN supports RADIUS, Kerberos, LDAP, TACACS+, SecurID,
and NIS. You can specify a primary authentication method and a secondary authentication method. If
the primary authentication method fails (cannot connect to the server or authentication fails), the
secondary authentication method is tried (unless you enable the
Only Use as backup option, in
which case the secondary authentication method will be tried only when the IOLAN cannot
communicate with the primary authentication host). This allows you to specify two different
authentication methods. If you do specify two different authentication methods, the user will be
prompted for his/her username once, but will be prompted for a password for each authentication
method tried. For example, user Alfred’s user ID is maintained in the secondary authentication
database, therefore, he will be prompted for his password twice, because he is not in the primary
authentication database.
Unlike the other external authentication methods, RADIUS and TACACS+ can also send back Serial
Port
and User parameters that are used for the duration of the connection. Therefore, any parameters
configured by RADIUS or TACACS+ will override the same parameters configured in the IOLAN.
See
Appendix A, RADIUS and TACACS+ on page 347 for more information.










