A
- admin page
- agency compliance
- alarms
- antenna
- mounting
- mounting conditions 1, 2
- mounting requirements
B
C
- clear alarm command
- clear authlog command
- clear daemon log command
- clear eventlog command
- clear ptp-stat command
- clear syslog command
- CLI 1
- commands
- backup scp
- backup tftp
- clear alarm
- clear authlog
- clear daemon log
- clear eventlog
- clear ptp-stat
- clear syslog
- config 1/5MHz
- config accounting
- config accounting-level
- config accounting-server add
- config accounting-server del
- config alarm-email-receiver
- config alarm-profile
- config antenna-cable-delay-compensation
- config antenna-voltage
- config auth-order
- config change-password
- config cli-banner-file
- config cli-banner-text
- config cli-timeout
- config datetime
- config dns0
- config dns1
- config domain
- config dst
- config e1 output loopback
- config e1 output port
- config enable-password
- config eth0 auto-nego
- config eth0 duplex
- config eth0 ip
- config eth0 ip-mode
- config eth0 speed
- config gps anti-jamming
- config holdover-state
- config hostname
- config language
- config password
- config pps-squelch
- config ppx
- config primary-ptp-server
- config ptp add server
- config ptp slave
- config radius-server add
- config radius-server del
- config secondary-ptp-server
- config snmp contact
- config snmp readonly-community
- config snmp readwrite-community
- config snmp-trap add
- config snmp-trap del
- config snmp-v3user add
- config snmp-v3user del
- config snr
- config ssl-cert
- config ssl-key
- config sync-src-priority
- config timezone
- config unsecured-communication-protocols
- config user add
- config user class
- config user del
- config user password
- config web
- config web-mode
- config web-timeout
- ftp
- halt
- ping
- reboot
- reset config
- reset password
- restart ptp
- restart timeprobe-agent
- restore scp
- restore tftp
- save scp authlog
- save scp daemonlog
- save scp eventlog
- save scp syslog
- save tftp authlog
- save tftp daemonlog
- save tftp eventlog
- save tftp syslog
- scp
- tftp
- tftp license
- compliance
- config 1/5/10MHz command
- config accounting
- config accounting-level
- config accounting-server add
- config accounting-server del
- config alarm-email-receiver command
- config alarm-profile command
- config antenna-cable-delay-compensation command
- config antenna-voltage command
- config auth-order
- config change-password
- config cli-banner-file
- config cli-banner-text
- config cli-timeout command
- config datetime command
- config dns0 command
- config dns1 command
- config domain command
- config dst command
- config e1 output loopback command
- config e1 output port command
- config enable-password command
- config eth0 auto-nego command
- config eth0 duplex command
- config eth0 ip command
- config eth0 ip-mode command
- config eth0 speed command
- config gps anti-jamming command
- config holdover-state
- config hostname command
- config language command
- config page
- config password command
- config pps-squelch
- config ppx command
- config primary-ptp-server command
- config ptp add server command
- config ptp slave command
- config ptp slv disable command
- config ptp slv domain command
- config ptp slv dscp command
- config ptp slv enable command
- config ptp slv profile command
- config ptp unicast acc-master add command
- config ptp unicast acc-master del command
- config ptp unicast announce command
- config ptp unicast delay command
- config ptp unicast duration command
- config ptp unicast signaling command
- config ptp unicast sync command
- config radius-server add
- config radius-server del
- config secondary-ptp-server command
- config snmp contact command
- config snmp readonly-community command
- config snmp readwrite-community command
- config snmp-trap add command
- config snmp-trap del command
- config snmp-v3user add command
- config snmp-v3user del command
- config snr command
- config ssl-cert command
- config ssl-key command
- config sync-src-priority command
- config timezone command
- config unsecured-communication-protocols command
- config user add
- config user class
- config user del
- config user password
- config web command
- config web-mode command
- config web-timeout command
- console cable
- conventions
- customer support 1, 2
D
E
- e-mail lists
- elements
- EMC testing
- enable mode password
- environmental specifications
- event states
F
- factory defaults
- ftp command
G
- graphical user interface
H
- halt command
- hardware
- height
- humidity
I
- input voltage
- installation instructions
- installation requirements
- IP address
K
L
- log page
- login class
- changing by Admin user
- login page
M
N
P
- parameters
- password
- physical dimensions
- ping command
- port LEDs
- power
- PTP
R
S
- safety testing
- save scp authlog command
- save scp daemonlog command
- save scp eventlog command
- save scp syslog command
- save tftp authlog command
- save tftp daemonlog command
- save tftp eventlog command
- save tftp syslog command
- scp command
- SNMPv3
- software
- specifications
- SSH
- status page
- support
- support, technical See technical support
- system LEDs
T
U
- unpacking the chassis
- upgrading See software
- user account
- admin password changing
- admin password reset
- creating Read-Only user
- creating Read/Write user
- deleting Read-Only user
- deleting Read/Write user
- guidelines
- management
- modifying
- overview
- Read-Only user password changing by Admin user
- Read/Write user password changing by Admin user
- Read/Write user password changing by Read/Write user
- user interface
W
Configuring User Authentication through RADIUS
The TCA6000 and TCA6500 Timing Clients support RADIUS server authentication, local authentication, or both based on the configured authentication order to authenticate the user logging in to the Timing Client.
When you configure the authentication order as RADIUS server authentication followed by the local authentication, the Timing Client passes the information about the logging user to the configured RADIUS servers for authentication. If any one of the RADIUS server successfully authenticates the user, then the Timing Client allows the user to login. If all the configured RADIUS servers fail to authenticate the user or configured RADIUS servers are not available, then the Timing Client performs the local authentication and allows the user to login after successful local authentication. The Timing Client blocks the logging user if both RADIUS and local authentication fails.
When you configure the authentication order as local authentication followed by the RADIUS server authentication, the Timing Client performs the local authentication to grant access to the logging user. If the local authentication fails to authenticate the user, then the Timing Client passes the information about the logging user to the configured RADIUS servers for authentication. If any one of the RADIUS server successfully authenticates the user, then the Timing Client allows the user to login. If all configured RADIUS servers fail to authenticate the user, then the Timing Client denies access to the logging user.
When you configure the authentication order as RADIUS server authentication only, the Timing Client passes the information about the logging user to the configured RADIUS servers for authentication. If any one of the RADIUS server successfully authenticates the user, then the Timing Client allows the user to login. If all configured RADIUS servers fail to authenticate the user, then the Timing Client denies access to the logging user. If all configured RADIUS servers are not available, then the Timing Client performs local authentication and allows the user to login after successful local authentication.
When you configure the authentication order as local authentication only, the Timing Client performs the local authentication to grant or deny access to the user logging in to the Timing Client.
![]() | Note:
|
The user authentication process protects the Timing Client from being accessed by unauthorized persons. The usage of RADIUS authentication servers provides the following advantages:
- Management of multiple user credentials on remote machine for detailed logging.
- Centralized user information and authentication process at one server.
- No loss of user information due to Timing Client damage.
To configure user authentication process:
- Click the Config tab.
- Locate the RADIUS tab across
the top tabs of the Config page. See Figure 13.
Figure 13: Timing Client Config Page—RADIUS Pane (Authentication)
- Configure the RADIUS authentication server details.
- Click the Save button to save the authentication server configuration.
- Select the authentication order.
- Click the Apply button to apply the configured authentication order.
The following sections describe RADIUS authentication server configuration and authentication order configuration:
- Adding a New RADIUS Authentication Server Entry
- Deleting a RADIUS Authentication Server Entry
- Modifying a RADIUS Authentication Server Entry Details
- Configuring Authentication Order
Adding a New RADIUS Authentication Server Entry
To add a new RADIUS authentication server entry to the authentication server list:
- Click the Config tab.
- Locate the RADIUS tab across the top tabs of the Config page. See Figure 13.
- In the Server IP field, enter the IP address of the RADIUS authentication server to be used for user authentication.
- In the Port field, enter the port through which the specified RADIUS authentication server is contacted for user authentication.
- In the Retry field, enter the number of attempts should be made for contacting the specified RADIUS authentication server.
- In the Timeout field, enter the time in seconds till which the Timing Client waits for a response from the specified RADIUS authentication server.
- In the Secret Word field, enter the password shared with the specified RADIUS authentication server.
- Click the Save button to add the RADIUS authentication server entry in the RADIUS Authentication Servers window and memory.
Deleting a RADIUS Authentication Server Entry
To delete a RADIUS authentication server entry from the authentication server list:
- Click the Config tab.
- Locate the RADIUS tab across the top tabs of the Config page. See Figure 13.
- In the RADIUS Authentication Servers window, click the RADIUS authentication server entry to be deleted.
- Click the Delete button to remove the entry from the RADIUS Authentication Server window and memory.
Modifying a RADIUS Authentication Server Entry Details
To modify the details of a RADIUS authentication server entry existing in the authentication server list:
- Click the Config tab.
- Locate the RADIUS tab across the top tabs of the Config page. See Figure 13.
- In the RADIUS Authentication Servers window, select the RADIUS authentication server entry to be modified.
- Click the Edit button to populate the values of the selected RADIUS authentication server entry in the Server IP, Port, Retry, Timeout, and Secret Word fields.
- Modify the populated values.
- Click the Save button to save the changes done in the selected RADIUS authentication server entry.
Configuring Authentication Order
To configure the authentication order:
- Click the Config tab.
- Locate the RADIUS tab across the top tabs of the Config page. See Figure 13.
- In the first drop box, select the type of authentication
to be performed initially. Select:
- radius: To authenticate the user using the configured RADIUS authentication servers.
- local: To authenticate the user using local settings.
- In the second drop box, select the type of authentication
to be performed on failure or unavailability of initial authentication.
Select:
- radius: To authenticate the user using the configured RADIUS authentication servers.
- local: To authenticate the user using local settings.
- Click the Apply button to save the authentication order.