8e6 authenticator configuration priority – 8e6 Technologies Enterprise Filter Authentication R3000 User Manual

Page 232

Advertising
background image

A

PPENDIX

A: A

UTHENTICATION

O

PERATIONS

8

E

6 A

UTHENTICATOR

218

8

E

6 T

ECHNOLOGIES

, R3000 I

NTERNET

F

ILTER

A

UTHENTICATION

U

SER

G

UIDE

8e6 Authenticator configuration priority

The source and order in which parameters are received and
override one another are described below.

NOTE: Any parameter set at the end of the list will override any
parameter that was previously set.

1. Compiled Defaults: Given no parameters at all, the

client will try to execute using the default compilation.

2. Configuration File (optional): The default location of the

configuration file is the same path/name as the authen-
ticat.exe client, but with a “.cfg” extension instead of
“.exe”. The full path/name can be specified on the
command line with the CF[] parameter. Review the ++
comment following Table 1 for more information.

3. Command Line (optional): Options on the command line

will override compiled defaults and the configuration file.
The command line can be left blank.

4. R3000 Configuration Packet (optional): The R3000

may send a configuration packet that will override all
other settings, including the command line. If the R3000
changes the IP address or port used by authenticat.exe,
then when authenticat.exe reconnects, authenticat.exe
will use the new IP address and port.

NOTE: The R3000 can force authenticat.exe to reconnect with a
re-logon event packet.

Advertising