8e6 authenticator configuration priority – 8e6 Technologies Enterprise Filter Authentication R3000 User Manual
Page 232
A
PPENDIX
A: A
UTHENTICATION
O
PERATIONS
8
E
6 A
UTHENTICATOR
218
8
E
6 T
ECHNOLOGIES
, R3000 I
NTERNET
F
ILTER
A
UTHENTICATION
U
SER
G
UIDE
8e6 Authenticator configuration priority
The source and order in which parameters are received and
override one another are described below.
NOTE: Any parameter set at the end of the list will override any
parameter that was previously set.
1. Compiled Defaults: Given no parameters at all, the
client will try to execute using the default compilation.
2. Configuration File (optional): The default location of the
configuration file is the same path/name as the authen-
ticat.exe client, but with a “.cfg” extension instead of
“.exe”. The full path/name can be specified on the
command line with the CF[] parameter. Review the ++
comment following Table 1 for more information.
3. Command Line (optional): Options on the command line
will override compiled defaults and the configuration file.
The command line can be left blank.
4. R3000 Configuration Packet (optional): The R3000
may send a configuration packet that will override all
other settings, including the command line. If the R3000
changes the IP address or port used by authenticat.exe,
then when authenticat.exe reconnects, authenticat.exe
will use the new IP address and port.
NOTE: The R3000 can force authenticat.exe to reconnect with a
re-logon event packet.