8e6 Technologies R3000 manual 8e6 Authenticator configuration priority

Models: R3000

1 277
Download 277 pages 39.87 Kb
Page 57
Image 57

CHAPTER 1: INTRODUCTION AUTHENTICATION OPERATIONS

8e6 Authenticator configuration priority

The source and order in which parameters are received and override one another are described below.

NOTE: Any parameter set at the end of the list will override any parameter that was previously set.

1.Compiled Defaults: Given no parameters at all, the client will try to execute using the default compilation.

2.Configuration File (optional): The default location of the configuration file is the same path/name as the authen- ticat.exe client, but with a “.cfg” extension instead of “.exe”. The full path/name can be specified on the command line with the CF[] parameter. Review the ++ comment following Table 1 for more information.

3.Command Line (optional): Options on the command line will override compiled defaults and the configuration file. The command line can be left blank.

4.R3000 Configuration Packet (optional): The R3000 may send a configuration packet that will override all other settings, including the command line. If the R3000 changes the IP address or port used by authenticat.exe, then when authenticat.exe reconnects, authenticat.exe will use the new IP address and port.

NOTE: The R3000 can force authenticat.exe to reconnect with a re-logon event packet.

8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE

45

Page 57
Image 57
8e6 Technologies R3000 manual 8e6 Authenticator configuration priority