Setting up radius server authentication – HP StorageWorks Enterprise File Services WAN Accelerator User Manual

Page 126

Advertising
background image

126

5 - M

ANAGING

HP EFS WAN A

CCELERATOR

M

ANAGER

S

ETTINGS

3. Use the controls to complete the configuration, as described in the following table.

4. Click Apply to apply the setting to the running configuration.

When you apply page settings, the values are applied to the running configuration
but not saved permanently. The Save Configuration icon displays a flashing
orange arrow to remind you to save your configuration.

5. To save the settings permanently, click Save.

To revert to the running configuration, click Reset.

Setting Up
RADIUS Server
Authentication

You set up RADIUS server authentication for the HP EFS WAN Accelerator Manager
in the Authentication - RADIUS Servers page.

Enabling this feature is optional.

RADIUS is an access control protocol that uses a challenge and response method for
authenticating users. Setting up RADIUS server authentication is optional.

For detailed information about setting up RADIUS and TACACS+ servers, see the HP
StorageWorks Enterprise File Services WAN Accelerator Deployment Guide
.

Control

Description

Login Page

Default Login ID. Type a default login identification number (ID) in the text box.

Authentication Methods

Method 1. Select Local, RADIUS, or TACACS+ from the drop-down list.

Note: Make sure you put the authentication methods in the order in which you want them
to occur. If authorization fails on the first method, the next method is attempted, and so
forth, until all the methods have been attempted.

Method 2. Select None, Local, RADIUS, or TACACS+ from the drop-down list.

Method 3. Select None, Local, RADIUS, or TACACS+ from the drop-down list.

Advanced Authorization

Authorization Policy. Optional. Select Remote First, Remote Only, or Local Only
from the drop-down list:

Remote-First. If a local-user mapping attribute is returned and it is a valid local user

name, map the authenticated user to the local user specified in the attribute. If the
attribute is not present or not valid locally, use the user name specified by the default-
user command. (This is the default behavior.)

Remote-Only. Map only to a remote authenticated user if the authentication server

sends a local-user mapping attribute. If the attribute does not specify a valid local user,
no further mapping is attempted.

Local-Only. All remote users are mapped to the user specified. Any vendor attributes

received by an authentication server are ignored.

Default User. Optional. Select Admin or Monitor from the drop-down list.

Advertising