Radius authentication service – Panasonic NN46110-600 User Manual
Page 51
Attention! The text in this document has been recognized automatically. To view the original document, you can use the "Original mode".
Chapter 2 Configuring servers
41
Once the primary external LDAP server is initialized, the VPN Router issues an
ICMP echo request to all secondary server IP addresses and follows the previous
procedure for each secondary server.
Because the VPN Router assumes only read/write access to the primary external
LDAP server, it does not configure any secondary server directories for VPN
Router directory storage. Instead, the VPN Router relies on the LDAP replication
agreements between the primary LDAP server and secondary LDAP servers to
populate the secondary servers with the appropriate directory information.
During normal operations, the VPN Router utilizes the primary external LDAP
server. In the event of primary LDAP server failure, the VPN Router fails-over to
the next secondary LDAP server in succession. Only the servers marked up are
attempted. Once the VPN Router detects the return of the primary server, it returns
to normal operations and utilizes the primary server exclusively.
RADIUS authentication service
RADIUS is a distributed security system that verifies connection attributes and
authenticates connections. It is available on both public and private interfaces. You
enable RADIUS on the Services > RADIUS window. Packet flow is from external
clients to the VPN Router interface IP and port. You configure the port on the
Services > RADIUS window. To configure filters, go to the the Services >
Available window and in the Authentication Protocol section, click public or
private for RADIUS.
When you enable RADIUS client authentication, VPN Router acts as a RADIUS
authentication client to external RADIUS authentication servers. You enable
client authentication on the Servers > RADIUS Auth window. External
authentication servers are located on either public or private networks. You
determine the packet flow from the IP address/port that you configured on the
Servers > RADIUS auth > RADIUS Servers > interface window to external
servers and back. You control the filters from the Servers > RADIUS Auth >
Enable Access to RADIUS Authentication window. When you enable RADIUS,
public and private filters are put in place.
Nortel VPN Router Security — Servers, Authentication, and Certificates