About the UAC Settings Page
You are here: Security Services > Firewall Authentication > UAC Settings.
Use this page to configure UAC Settings.
To configure UAC settings:
- Complete the configuration according to the guidelines provided in Table 1.
- Click Save to save the changes.
Table 1 describes the fields on the UAC Setting page.
Table 1: Fields on the UAC Setting Page
Determines whether server certificate verification is required when initiating a connection between a device and an Access Control Service in a UAC configuration.
Select the following options from the list:
Specifies the value in seconds that the device should expect to receive a heartbeat signal from the IC Series device.
Enter the heartbeat interval in seconds. Range: 1 through 9999.
Test Only Mode
Allows all traffic and log enforcement result.
Enable the Test Only Mode option.
Specifies (in seconds) that the device should wait to get a heartbeat response from an IC Series UAC Appliance.
Enter the timeout in seconds. Range: 2 through 10000.
Specifies the action to be performed when a timeout occurs and the device cannot connect to an Infranet Enforcer.
Select the timeout action from the list.
Click + to add an infranet controller.
Click pencil icon to edit a selected infranet controller.
Click delete icon to delete the selected infranet controller.
Enter a name for the Infranet Controller.
Enter an IP address for the Infranet Controller.
Select an interface used for the Infranet Controller.
Enter the password to use for the Infranet Controller
Select a CA from the list in the CA Profiles column and then click the right arrow to move them to the Selected column.
Note: To deselect a CA, select the CA in the Selected column and then click the left arrow to move them to the CA Profiles column.
Specifies the port number to be associated with this Infranet Controller for data traffic.
Enter a value from 1 through 65,535.
Server Certificate Subject
Enter the server certificate subject name of the Infranet Controller certificate to match.
Specifies the preconfigured security policy for captive portal on the Junos OS Enforcer.
Click + to add a captive portal.
Click pencil icon to edit a selected captive portal.
Click delete icon to delete the selected captive portal.
Enter a name for the captive portal.
Select a traffic type to be redirected.
Enter the URL to which the captive portal should be directed.