beautypg.com

Adding a tacacs+ server for authentication – Juniper Networks J-Series User Manual

Page 31

background image

To cancel your entries and return to the Users Quick Configuration page,
click Cancel.

Table 8: Users Quick Configuration for RADIUS Servers Summary

Your Action

Function

Field

RADIUS Server

Type the RADIUS server’s 32-bit IP address, in
dotted decimal notation.

Identifies the IP address of the RADIUS
server.

RADIUS Server Address
(required)

Type the secret (password) of the RADIUS server.
Secrets can contain spaces. The secret used must
match that used by the RADIUS server.

The secret (password) of the RADIUS
server.

RADIUS Server Secret (required)

Retype the secret of the RADIUS server.

Verifies the secret (password) of the
RADIUS server is entered correctly.

Verify RADIUS Server Secret
(required)

Adding a TACACS+ Server for Authentication

You can use the Users Quick Configuration page for TACACS+ servers to configure
a TACACS+ server for system authentication. This Quick Configuration page allows
you to specify the IP address and secret of the TACACS+ server.

Figure 2 on page 9 shows the Users Quick Configuration page for TACACS+ servers.

Figure 2: Users Quick Configuration Page for TACACS+ Servers

ERROR: Unresolved graphic fileref="s020242.gif" not found in

"\\teamsite1\default\main\TechPubsWorkInProgress\STAGING\images\".

To configure a TACACS+ server with Quick Configuration:

1.

In the J-Web interface, select Configuration>Quick Configuration>Users.

2.

Under TACACS+ servers, click Add to configure a TACACS+ server.

3.

Enter information into the Users Quick Configuration page for TACACS+ servers,
as described in Table 9 on page 10.

4.

Click one of the following buttons on the Users Quick Configuration page for
TACACS+ servers:

To apply the configuration and return to the Users Quick Configuration page,
click OK.

To cancel your entries and return to the Users Quick Configuration page,
click Cancel.

Managing User Authentication with Quick Configuration

9

Chapter 1: Managing User Authentication and Access