Belkin F1DE101H User Manual - Page 68

User Search Sub-Filter, Active Directory Domain, Remote Authentication Dial In User Service RADIUS,

Page 68 highlights

4-5 Device Settings Menu Options 1f. User Search Sub-Filter Here you can refine the search for users that should be known to the RIPM. 1g. Active Directory Domain This option represents the active directory domain that is configured in the Microsoft Active Directory server. This option is only valid if you have chosen a Microsoft Active Directory as the LDAP server type. 2. Remote Authentication Dial In User Service (RADIUS) RADIUS is a protocol specified by the Internet Engineering Task Force (IETF) working group. There are two specifications that make up the RADIUS protocol suite: authentication and accounting. These specifications aim to centralize authentication, configuration, and accounting for dial-in services to an independent server. The RADIUS protocol exists in several implementations such as free RADIUS, open-RADIUS, or RADIUS on UNIX systems. The RADIUS protocol is well specified and tested. We can give a recommendation for all products listed above, especially for the free RADIUS implementation. Note: Currently, we do not support challenge/response. An "Access Challenge" response is seen and evaluated as an "Access Reject". To access a remote device using the RADIUS protocol, you must log in. You will be asked to specify your username and password. The RADIUS server will read your input data (Authentication), and the RIPM will look for your profile (Authorization). The profile defines (or limits) your actions and may differ depending on your specific situation. If there is no such profile, your access via RADIUS will be refused. In terms of the remote-activity mechanism, the login via RADIUS works like the Remote Console. If there is no activity for half an hour, your connection to the RIPM will be interrupted and closed. 2a. Server Enter either the IP address or the host name of the RADIUS server to be connected. If you are using the host name, DNS must be configured and enabled. 2b. Shared Secret A shared secret is a text string that serves as a password between the RADIUS client and RADIUS server. The RIPM serves as a RADIUS client. A shared secret is used to verify that RADIUS messages are sent by a RADIUS-enabled device that is configured with the same shared secret and to verify that the RADIUS message has not been modified in transit (i.e., to verify message integrity). For the shared secret, you can use any standard alphanumeric and special characters. A shared secret may consist of up to 128 characters and may contain both lowercase and uppercase letters (A-Z, a-z), numerals (0-9), and other symbols (characters not defined as letters or numerals), such as exclamation points (" ! ") or asterisks (" * "). 2c. Authentication Port The port the RADIUS server listens to for authentication requests. The default value is #1812. 65

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

65
4-5 Device Settings
Menu Options
1f.
User Search Sub-Filter
Here you can refine the search for users that should be known to
the RIPM.
1g.
Active Directory Domain
This option represents the active directory domain that is configured in
the Microsoft Active Directory server. This option is only valid if you have
chosen a Microsoft Active Directory as the LDAP server type.
2.
Remote Authentication Dial In User Service (RADIUS)
RADIUS is a protocol specified by the Internet Engineering Task Force (IETF)
working group. There are two specifications that make up the RADIUS
protocol suite: authentication and accounting. These specifications aim to
centralize authentication, configuration, and accounting for dial-in services to
an independent server. The RADIUS protocol exists in several implementations
such as free RADIUS, open-RADIUS, or RADIUS on UNIX systems. The
RADIUS protocol is well specified and tested. We can give a recommendation
for all products listed above, especially for the free RADIUS implementation.
Note:
Currently, we do not support challenge/response. An “Access
Challenge” response is seen and evaluated as an “Access Reject”.
To access a remote device using the RADIUS protocol, you must log in. You
will be asked to specify your username and password. The RADIUS server
will read your input data (Authentication), and the RIPM will look for your
profile (Authorization). The profile defines (or limits) your actions and may differ
depending on your specific situation. If there is no such profile, your access via
RADIUS will be refused. In terms of the remote-activity mechanism, the login
via RADIUS works like the Remote Console. If there is no activity for half an
hour, your connection to the RIPM will be interrupted and closed.
2a.
Server
Enter either the IP address or the host name of the RADIUS server to be
connected. If you are using the host name, DNS must be configured
and enabled.
2b.
Shared Secret
A shared secret is a text string that serves as a password between the
RADIUS client and RADIUS server. The RIPM serves as a RADIUS client.
A shared secret is used to verify that RADIUS messages are sent by a
RADIUS-enabled device that is configured with the same shared secret and
to verify that the RADIUS message has not been modified in transit (i.e., to
verify message integrity). For the shared secret, you can use any standard
alphanumeric and special characters. A shared secret may consist of up
to 128 characters and may contain both lowercase and uppercase letters
(A–Z, a–z), numerals (0–9), and other symbols (characters not defined as
letters or numerals), such as exclamation points (“ ! ”) or asterisks (“ * ”).
2c.
Authentication Port
The port the RADIUS server listens to for authentication requests. The
default value is #1812.