8e6 Technologies R3000 manual Introduction Authentication Operations

Models: R3000

1 277
Download 277 pages 39.87 Kb
Page 67
Image 67

CHAPTER 1: INTRODUCTION AUTHENTICATION OPERATIONS

The entries made in this window will vary depending on whether you are using the invisible mode, or the router or firewall mode. The LAN 1 and LAN 2 IP addresses should usually be in a different subnet.

If using the invisible mode: For the LAN1 IP (eth0) address, select 255.255.255.255 for the subnet mask.

If using the router or firewall mode: Specify the appro- priate IP address and subnet mask in the applicable fields.

3.Select “Authentication” from the control panel, and then select Enable/Disable Authentication from the pop-up menu.

Enable authentication, and then select one of three tiers in the Web-based Authentication frame:

Tier 1: Choose this option if you will only be using net use based authentication for NT or Active Directory servers.

Tier 2: Choose this option if you wish to use timed Web-based authentication for NT and LDAP domains. This option gives the user a timed session for his/her Internet access. After the timed profile expires, the user will have to log in again if he/she wants to continue to have Internet access.

Tier 3: Choose this option if you wish to use persistent Web-based authentication for NT and LDAP domains. This option gives the user a persistent network connection via a pop-up window that keeps the user’s session open until the window is closed, so the user does not have to log in repeatedly.

If choosing Tier 2 or Tier 3, enable either 8e6 Authenti- cator or Novell eDirectory Agent, as appropriate to your environment.

4.Select “Authentication” from the control panel, and then select “Authentication Settings” from the pop-up menu.

8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE

55

Page 67
Image 67
8e6 Technologies R3000 manual Introduction Authentication Operations