
Chapter 4
Configuration via the Command Line Interface
4.2 Peer: Authentication Attribute
What is ... Two main methods for user authentication are supported in the SpeedTouch™:
certificates
The user authentication parameters used for IKE negotiations are bundled in a descriptor with a symbolic name.
This is called the Authentication Attribute. For
How is it used An Authentication Attribute is required as one of the parameters to successfully create an operational peer. The peer refers to the Authentication attribute by its symbolic name. So, as an initial preparatory step to define an operational peer, a valid Authentication Attribute is created.
In this section The following topics are discussed in this section:
Topic | Page |
|
|
4.2.1 Authentication Attribute Parameters | 105 |
|
|
4.2.2 List all Authentication Attributes | 106 |
|
|
4.2.3 Create a New Authentication Attribute | 107 |
|
|
4.2.4 Set or Modify the Authentication Attribute Parameters | 108 |
|
|
4.2.5 Delete an Authentication attribute | 109 |
|
|
104 | |
|