13
Table of Contents
Chapter 9 Configuring Security .....................................213
Introduction .............................................................................. 213
Authentication.......................................................................... 213
Authentication ...................................................................................... 214
Local ...................................................................................................... 215
Overview .......................................................................................... 215
Field Descriptions............................................................................. 215
RADIUS.................................................................................................. 216
Overview .......................................................................................... 216
General Field Descriptions............................................................... 216
Attributes Field Descriptions ............................................................ 217
Kerberos................................................................................................ 218
Field Descriptions............................................................................. 218
LDAP...................................................................................................... 219
Overview .......................................................................................... 219
Field Descriptions............................................................................. 219
TACACS+ .............................................................................................. 220
Overview .......................................................................................... 220
Field Descriptions............................................................................. 220
SecurID.................................................................................................. 221
Overview .......................................................................................... 221
Field Descriptions............................................................................. 221
NIS.......................................................................................................... 222
Field Descriptions............................................................................. 222
SSH............................................................................................ 223
Overview................................................................................................ 223
Functionality ......................................................................................... 223
Users Logging into the IOLAN Using SSH....................................... 223
Users Passing Through the IOLAN Using SSH (Dir/Sil) .................. 224
Field Descriptions ................................................................................ 225
SSL/TLS .................................................................................... 226
Overview................................................................................................ 226
Functionality ......................................................................................... 226
Field Descriptions ................................................................................ 227
Cipher Suite Field Descriptions........................................................ 228
Adding/Editing a Cipher ................................................................... 229
Validation Criteria Field Descriptions ............................................... 230