Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation  Back up to About Overview 
ContentIndex
  
[+] Expand All
[-] Collapse All

 A  B  C  D  E  F  G  H  I  K  L  M  N  P  R  S  T  U  W

 

A

admin page    
accessing
alarm pane
config pane
description
password pane
service pane
understanding
upgrade pane
agency compliance
alarms    
configuring
event states
types
antenna    
mounting
mounting conditions    12
mounting requirements
 

B

backup scp command
backup tftp command
 

C

clear alarm command
clear authlog command
clear daemon log command
clear eventlog command
clear ptp-stat command
clear syslog command
CLI    1
configuring the Timing Client using
options    1
viewing
using to view configuration
using to view status
commands    
backup scp
backup tftp
clear alarm
clear authlog
clear daemon log
clear eventlog
clear ptp-stat
clear syslog
config 1/5MHz
config accounting
config accounting-level
config accounting-server add
config accounting-server del
config alarm-email-receiver
config alarm-profile
config antenna-cable-delay-compensation
config antenna-voltage
config auth-order
config change-password
config cli-banner-file
config cli-banner-text
config cli-timeout
config datetime
config dns0
config dns1
config domain
config dst
config e1 output loopback
config e1 output port
config enable-password
config eth0 auto-nego
config eth0 duplex
config eth0 ip
config eth0 ip-mode
config eth0 speed
config gps anti-jamming
config holdover-state
config hostname
config language
config password
config pps-squelch
config ppx
config primary-ptp-server
config ptp add server
config ptp slave
config radius-server add
config radius-server del
config secondary-ptp-server
config snmp contact
config snmp readonly-community
config snmp readwrite-community
config snmp-trap add
config snmp-trap del
config snmp-v3user add
config snmp-v3user del
config snr
config ssl-cert
config ssl-key
config sync-src-priority
config timezone
config unsecured-communication-protocols
config user add
config user class
config user del
config user password
config web
config web-mode
config web-timeout
ftp
halt
ping
reboot
reset config
reset password
restart ptp
restart timeprobe-agent
restore scp
restore tftp
save scp authlog
save scp daemonlog
save scp eventlog
save scp syslog
save tftp authlog
save tftp daemonlog
save tftp eventlog
save tftp syslog
scp
tftp
tftp license
compliance
config 1/5/10MHz command
config accounting
config accounting-level
config accounting-server add
config accounting-server del
config alarm-email-receiver command
config alarm-profile command
config antenna-cable-delay-compensation command
config antenna-voltage command
config auth-order
config change-password
config cli-banner-file
config cli-banner-text
config cli-timeout command
config datetime command
config dns0 command
config dns1 command
config domain command
config dst command
config e1 output loopback command
config e1 output port command
config enable-password command
config eth0 auto-nego command
config eth0 duplex command
config eth0 ip command
config eth0 ip-mode command
config eth0 speed command
config gps anti-jamming command
config holdover-state
config hostname command
config language command
config page    
accessing
description
E1 pane
network pane
profile pane
PTP pane
RADIUS pane
SNMPv3 pane
timing pane
trap pane
understanding
Users pane
config password command
config pps-squelch
config ppx command
config primary-ptp-server command
config ptp add server command
config ptp slave command
config ptp slv disable command
config ptp slv domain command
config ptp slv dscp command
config ptp slv enable command
config ptp slv profile command
config ptp unicast acc-master add command
config ptp unicast acc-master del command
config ptp unicast announce command
config ptp unicast delay command
config ptp unicast duration command
config ptp unicast signaling command
config ptp unicast sync command
config radius-server add
config radius-server del
config secondary-ptp-server command
config snmp contact command
config snmp readonly-community command
config snmp readwrite-community command
config snmp-trap add command
config snmp-trap del command
config snmp-v3user add command
config snmp-v3user del command
config snr command
config ssl-cert command
config ssl-key command
config sync-src-priority command
config timezone command
config unsecured-communication-protocols command
config user add
config user class
config user del
config user password
config web command
config web-mode command
config web-timeout command
console cable    
specifications
conventions    
notice icons
customer support    12
contacting JTAC
 

D

depth
dimensions    
physical
Dynamic SSL certificate    
overview
 

E

e-mail lists    
adding users
removing users
elements    
configurable in the CLI
EMC testing
enable mode password    
reset by resetting the Timing Client
reset via CLI
reset via GUI
environmental specifications
event states
 

F

factory defaults    
resetting
ftp command
 

G

graphical user interface    
using
 

H

halt command
hardware    
returning
height
humidity    
operating
 

I

input voltage
installation instructions    
Timing Client
installation requirements
IP address    
assigning
changing
reserving
 

K

knowledge base
 

L

log page    
accessing
AuthLog Pane
daemon Pane
description
EventLog Pane
SysLog Pane
understanding
login class    
changing by Admin user    
via GUI
login page    
accessing
description
understanding
 

M

mounting conditions    
minimal
optimal
 

N

notice icons
 

P

parameters    
configuring (CLI)
password    
changing for Admin user    
via CLI
via GUI    12
changing for Read-Only user by Admin user    
via GUI
changing for Read/Write user by Admin user    
via GUI
changing for Read/Write user by Read/Write user    
via GUI
reset for Admin user    
by resetting the Timing Client
via CLI
via GUI
physical dimensions
ping command
port LEDs
power    
consumption
specifications
PTP    
setting parameters
 

R

reboot command
requirements    
installing
mounting the antenna
upgrade
reset config command
reset password command
restart ptp command
restart timeprobe-agent command
restore scp command
restore tftp command
returns
RMA
 

S

safety testing
save scp authlog command
save scp daemonlog command
save scp eventlog command
save scp syslog command
save tftp authlog command
save tftp daemonlog command
save tftp eventlog command
save tftp syslog command
scp command
SNMPv3    
creating users
specifying contacts
software    
upgrading using the CLI
upgrading using the GUI
specifications    
console cable
environmental
power
SSH
status page    
accessing
alarm pane
description
E1 pane
GPS pane
PTP pane
system pane
timing pane
understanding
support
support, technical     See technical support    
system LEDs    
understanding
 

T

technical support    1
contacting JTAC
telnet
temperature    
operating
storage
tftp command
tftp license command
Timing Client    
accessing using the CLI
description
installing
stopping and restarting
troubleshooting
unpacking
visually testing
traps    
configuring
creating targets
deleting targets
 

U

unpacking the chassis
upgrading     See software    
user account    
admin password changing    
via CLI
via GUI    12
admin password reset    
by resetting the Timing Client
via CLI
via GUI
creating Read-Only user
creating Read/Write user
deleting Read-Only user    
via GUI
deleting Read/Write user    
via GUI
guidelines
management
modifying
overview
Read-Only user password changing by Admin user    
via GUI
Read/Write user password changing by Admin user    
via GUI
Read/Write user password changing by Read/Write user    
via GUI
user interface    
accessing
requirements for using
 

W

warranty
width

Configuring User Authentication through RADIUS

The TCA6000 and TCA6500 Timing Clients support RADIUS server authentication, local authentication, or both based on the configured authentication order to authenticate the user logging in to the Timing Client.

When you configure the authentication order as RADIUS server authentication followed by the local authentication, the Timing Client passes the information about the logging user to the configured RADIUS servers for authentication. If any one of the RADIUS server successfully authenticates the user, then the Timing Client allows the user to login. If all the configured RADIUS servers fail to authenticate the user or configured RADIUS servers are not available, then the Timing Client performs the local authentication and allows the user to login after successful local authentication. The Timing Client blocks the logging user if both RADIUS and local authentication fails.

When you configure the authentication order as local authentication followed by the RADIUS server authentication, the Timing Client performs the local authentication to grant access to the logging user. If the local authentication fails to authenticate the user, then the Timing Client passes the information about the logging user to the configured RADIUS servers for authentication. If any one of the RADIUS server successfully authenticates the user, then the Timing Client allows the user to login. If all configured RADIUS servers fail to authenticate the user, then the Timing Client denies access to the logging user.

When you configure the authentication order as RADIUS server authentication only, the Timing Client passes the information about the logging user to the configured RADIUS servers for authentication. If any one of the RADIUS server successfully authenticates the user, then the Timing Client allows the user to login. If all configured RADIUS servers fail to authenticate the user, then the Timing Client denies access to the logging user. If all configured RADIUS servers are not available, then the Timing Client performs local authentication and allows the user to login after successful local authentication.

When you configure the authentication order as local authentication only, the Timing Client performs the local authentication to grant or deny access to the user logging in to the Timing Client.

Note:

  • The selection of RADIUS authentication server to authenticate user is based on the order in the RADIUS authentication server list.
  • The user authentication process is implemented only for the Access Request, Access Reject, and Access Accept messages.
  • The user authentication process is not supported for shell users.

The user authentication process protects the Timing Client from being accessed by unauthorized persons. The usage of RADIUS authentication servers provides the following advantages:

  • Management of multiple user credentials on remote machine for detailed logging.
  • Centralized user information and authentication process at one server.
  • No loss of user information due to Timing Client damage.

To configure user authentication process:

  1. Click the Config tab.
  2. Locate the RADIUS tab across the top tabs of the Config page. See Figure 13.

    Figure 13: Timing Client Config Page—RADIUS Pane (Authentication)

    Timing Client Config Page—RADIUS Pane (Authentication)
  3. Configure the RADIUS authentication server details.
  4. Click the Save button to save the authentication server configuration.
  5. Select the authentication order.
  6. Click the Apply button to apply the configured authentication order.

The following sections describe RADIUS authentication server configuration and authentication order configuration:

Adding a New RADIUS Authentication Server Entry

To add a new RADIUS authentication server entry to the authentication server list:

  1. Click the Config tab.
  2. Locate the RADIUS tab across the top tabs of the Config page. See Figure 13.
  3. In the Server IP field, enter the IP address of the RADIUS authentication server to be used for user authentication.
  4. In the Port field, enter the port through which the specified RADIUS authentication server is contacted for user authentication.
  5. In the Retry field, enter the number of attempts should be made for contacting the specified RADIUS authentication server.
  6. In the Timeout field, enter the time in seconds till which the Timing Client waits for a response from the specified RADIUS authentication server.
  7. In the Secret Word field, enter the password shared with the specified RADIUS authentication server.
  8. Click the Save button to add the RADIUS authentication server entry in the RADIUS Authentication Servers window and memory.

Deleting a RADIUS Authentication Server Entry

To delete a RADIUS authentication server entry from the authentication server list:

  1. Click the Config tab.
  2. Locate the RADIUS tab across the top tabs of the Config page. See Figure 13.
  3. In the RADIUS Authentication Servers window, click the RADIUS authentication server entry to be deleted.
  4. Click the Delete button to remove the entry from the RADIUS Authentication Server window and memory.

Modifying a RADIUS Authentication Server Entry Details

To modify the details of a RADIUS authentication server entry existing in the authentication server list:

  1. Click the Config tab.
  2. Locate the RADIUS tab across the top tabs of the Config page. See Figure 13.
  3. In the RADIUS Authentication Servers window, select the RADIUS authentication server entry to be modified.
  4. Click the Edit button to populate the values of the selected RADIUS authentication server entry in the Server IP, Port, Retry, Timeout, and Secret Word fields.
  5. Modify the populated values.
  6. Click the Save button to save the changes done in the selected RADIUS authentication server entry.

Configuring Authentication Order

To configure the authentication order:

  1. Click the Config tab.
  2. Locate the RADIUS tab across the top tabs of the Config page. See Figure 13.
  3. In the first drop box, select the type of authentication to be performed initially. Select:
    • radius: To authenticate the user using the configured RADIUS authentication servers.
    • local: To authenticate the user using local settings.
  4. In the second drop box, select the type of authentication to be performed on failure or unavailability of initial authentication. Select:
    • radius: To authenticate the user using the configured RADIUS authentication servers.
    • local: To authenticate the user using local settings.
  5. Click the Apply button to save the authentication order.

Modified: 2016-07-21