RSA Security 3.6.0 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of RSA Security 3.6.0, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of RSA Security 3.6.0 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of RSA Security 3.6.0. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of RSA Security 3.6.0 should contain:
- informations concerning technical data of RSA Security 3.6.0
- name of the manufacturer and a year of construction of the RSA Security 3.6.0 item
- rules of operation, control and maintenance of the RSA Security 3.6.0 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of RSA Security 3.6.0 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of RSA Security 3.6.0, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the RSA Security service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of RSA Security 3.6.0.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the RSA Security 3.6.0 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    RSA SecurID Ready Implementation Guide Last Modified: March 8, 2006 Partner Information Product Information Partner Name MRV Communication, Inc. Web Site www.mrv.com Product Name LX Series Version & Platform LX OS 3.6.0 or later Product Description MRV Communications is a leading provider o f network access solutions for the enterprise edge, th[...]

  • Page 2

    Solution Summary The MRV LX-Series Secure Consol e/Te rminal Serv ers have been spe cifically desig ned with a focus on security. The LX Series multi-pro cessor platfo rms have the pro ce ssing horse po wer to handle the FIPS approved encryption and cipher al go rithms required to meet demands of today’s high se curit y environments. LX-Series pl[...]

  • Page 3

    Agent Host Configuration To facilitate communication between the LX Product line and the RSA Authentication Manager / RSA SecurID Appliance, an Agent Host record must be added to the RSA Authenticat ion Manager Database and RADIUS Server Database whe n using RADIUS . The Agent Host reco rd ide ntifies the LX Product line within its database and con[...]

  • Page 4

    Partner Authentication Agent Configuration Setting Up RSA SecurID Authenti cation (Command Line Interface) You can implement SecurID authe ntication at the server level and for sp ecifi c interfaces and asynchronous ports on the LX unit. You must implement RSA SecurID Authentication at the server level before you can implement it on specific inte r[...]

  • Page 5

    RSA SecurID Authentication Command Examples This section provides examples of all o f the co mmands that are used to specify settings for the RSA Authentication Manager servers. AAA:0 >> securid primary authent ication ser ver address 1 0.242.131.1 1 AAA:0 >> securid authentication port 450 0 AAA:0 >> securid primary authent icati[...]

  • Page 6

    Setting Up RSA SecurID Au thentication (Web Interface) 1. Point your browser to the LX IP address. (Brows er must have Java 1.4.2 or higher installed.) 2. Login to the LX unit. 3. Click the Admin button on the upper tool bar. 6[...]

  • Page 7

    4. Select SecurID under the Authentic ation Folder from the navigation tool bar on t he left. Enter the desired information for your site. 7[...]

  • Page 8

    Setting Up RADIUS (C ommand Line Interface) RADIUS Primary Authentication Server Commands Login: InReach Password : access InReach: 0 >enable Password : ****** InReach: 0 >>configurat ion Config:0 >>aaa AAA:0>> radius primary authenti cation serv er address 10 .242.131.13 AAA:0 >>radius primary authe ntication s erver por[...]

  • Page 9

    Setting Up RADIUS (Web Interface) 1. Point your browser to the LX IP address. 2. Login to the LX unit. 3. Click the Admin button on the upper tool bar. 9[...]

  • Page 10

    4. Select RADIUS under the Authentication Fo lder from the navigation tool bar on the left. Enter the desired information for your site. 10[...]

  • Page 11

    Setting Up TACACS+ You can implement TACACS+ auth entication and TA CACS+ accounting at the serve r level and for specific interfaces and asy nch ronous ports on the LX unit. Access the AAA Configurat ion mode on the LX. TACACS+ Primary Authentication Server Commands AAA: 0>> tacacs+ primary a uthenticati on server addr ess 10.242. 131.15 AAA[...]

  • Page 12

    Setting Up TACACS+ (Web Interface) 1. Point your browser to the LX IP address. 2. Login to the LX unit. 3. Click the Admin button on the upper tool bar. 12[...]

  • Page 13

    4. Select TACACS+ under the Authentic ation Folder from the navigation tool bar on the left. Enter the des ired information for your site. 13[...]

  • Page 14

    Certification Checklist Date Tested: March 8, 2006 Certification Environment Product Name Version Information Operating System RSA Authentication Man ager 6.1 Windows 2000 LX Series 3.6.0 LX-4000 LX-80 00 Mandatory Functionality RSA Native Protocol RADIUS Protocol New PIN Mode Force Authentication After New PIN Force Authentication After New PIN Sy[...]