Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation  Back up to About Overview 
ContentIndex
  
[+] Expand All
[-] Collapse All

 A  B  C  D  E  F  G  H  I  L  M  N  P  Q  R  S  T  U  V

 

A

access lines    1
description    12
accesses    
configuring subscriptions    
SRC CLI
accounting    
basic RADIUS accounting plug-in
custom RADIUS accounting plug-ins
flat file accounting plug-ins
flexible RADIUS accounting plug-ins
anonymous subscriber
attributes    
RADIUS accounting
authenticated subscriber
authentication plug-ins    
configuring
types
authorization plug-ins    
configuring
types
 

B

basic RADIUS accounting plug-in    1
configuring    
SRC CLI
basic RADIUS authentication plug-in    1
configuring    
SRC CLI
 

C

captive portal    
preventing access to resources
classification scripts    
conditions    1
glob matching
joining
regular expression matching
configuring    
C-Web interface
descriptions
DHCP classification, C Series Controller    
conditions
configuring, SRC CLI
description
targets
interface classification, C Series Controller    
conditions
configuring, SRC CLI
description
empty policy    12
examples
how it works
targets
structure    
C-Web interface
subscriber classification, C Series Controller    
condition
configuring, SRC CLI
description
DHCP options
enterprise subscriber example
how it works
static IP subscriber example
subscriber group example
targets
target, C Series Controller    
definition
expressions
types
component interactions    
DHCP    
initial login
persistent login
subscriber account login
subscriber logout
enterprise subscribers    
login
remote session activation
PPP    
login
logout
static IP subscribers
subscription activation
subscription deactivation
conventions    
notice icons
text
COPS (Common Open Policy Service)    
DHCP interactions    
initial login
logout
persistent login
subscriber account login
interface startup interactions
PPP interactions    
login
logout
static IP subscriber interactions
subscription activation interactions
subscription deactivation interactions
custom RADIUS accounting plug-ins    1
configuring    
SRC CLI
custom RADIUS authentication plug-ins    1
configuring    
SRC CLI
customer support    1
contacting JTAC
 

D

default retailer authentication plug-ins    
configuring    
SRC CLI
default retailer DHCP authentication plug-ins    
configuring    
SRC CLI
denial-of-service attacks
DHCP (Dynamic Host Configuration Protocol)    
address assignment
classification scripts.     See classification scripts    
options
profiles    
SRC CLI
subscribers    
login process
logout process
documentation    
comments on
 

E

enterprise    
description
enterprise subscribers    1
adding    
SRC CLI
enterprise subscribers, login process
event publishers    
configuring    
SRC CLI
default retailer authentication, configuring    
SRC CLI
default retailer DHCP authentication, configuring    
SRC CLI
description
retailer-specific
service-specific
virtual router-specific
external plug-ins    
configuring    
SRC CLI
 

F

file upload settings for log rotation    
configuring    
SRC CLI
flat file accounting plug-ins    1
configuring    
SRC CLI
configuring headers    
SRC CLI
flexible RADIUS accounting plug-ins    1
attributes, defining    
C-Web interface
configuring
RADIUS packets, defining
flexible RADIUS authentication plug-ins    1
attributes, defining    
C-Web interface
examples
configuring    
SRC CLI
RADIUS packets, defining    
SRC CLI
setting responses    
C-Web interface
FTP server for log rotation    
configuring    
SRC CLI    12
 

G

general properties    
configuring    
SRC CLI
 

H

HTTP proxy    12
HTTPS traffic
 

I

interface classification scripts.     See classification scripts    
interim accounting, configuring on SAE
internal plug-ins    
configuring    
SRC CLI
 

L

LDAP authentication plug-in    1
configuring    
SRC CLI
limiting subscribers plug-in    1
configuring    
SRC CLI
log rotation    
overview    
SRC CLI
logging    
redirect server
login events, description
login process    
enterprise
residential    12,  See also logout process, residential    
DHCP
PPP
summary
login registration    
configuring    
SRC CLI
logout process, residential    
DHCP
 

M

managers    
configuring    
SRC CLI
control over all retailers
management privileges
subscribers and subscriptions
manuals    
comments on
 

N

NAT (Network Address Translation)    
VPNs
notice icons
 

P

plug-ins    
activating service sessions
authentication    
configuring
authorization    
configuring
basic RADIUS accounting    1
configuring, SRC CLI
basic RADIUS authentication    1
configuring, SRC CLI
creating subscriber sessions
custom RADIUS accounting    1
configuring, SRC CLI
custom RADIUS authentication    1
configuring, SRC CLI
defining RADIUS packets    
SRC CLI
DHCP address assignment
event publishers.     See event publishers    
external    
configuring, SRC CLI
flat file accounting    1
configuring, SRC CLI
flexible RADIUS accounting    1
configuring
flexible RADIUS authentication    1
configuring, SRC CLI
internal    1
authorization
configuring RADIUS peers, SRC CLI
configuring, SRC CLI
customizing RADIUS packets
how they work
pool
RADIUS attributes, C-Web interface
tracking
LDAP authentication    1
configuring, SRC CLI
limiting subscribers    1
configuring, SRC CLI
state synchronization    
configuring, SRC CLI
tracking    
configuring, C-Web interface
service sessions
subscriber sessions
policy groups    
empty    12
policy management    
external policy system    12
PPP subscribers    
login process
Web login
prevention, use of unauthorized resources
protocols    
routing
proxy HTTP    12
proxy request management
public addresses, VPNs
 

Q

QoS tracking plug-in
 

R

RADIUS accounting    
attributes
description
RADIUS attributes    
defining in RADIUS plug-ins    
C-Web interface
examples, defining in RADIUS plug-ins    
C-Web interface
RADIUS client library, custom RADIUS plug-ins
RADIUS packets, customizing in plug-ins
RADIUS peers    
configuring in plug-ins    
SRC CLI
RADIUS plug-ins    1,  See also plug-ins    
authentication
UDP port
redirect server    
assessing load    
C-Web interface
configuration statements    
SRC CLI
configuring    
SRC CLI
configuring DNS server for    
SRC CLI
configuring HTTP proxy support    
SRC CLI
configuring redundant    
SRC CLI
directory connection    
SRC CLI
failover
file extensions    
SRC CLI
logging
number of requests    
SRC CLI
protection against denial-of-service attacks
redundancy    123
static route to router
traffic definition    
SRC CLI
verifying    
SRC CLI
redundancy    
redirect server
residential subscribers    1
adding    
SRC CLI
login process.     See login process    
retailers    
subscribers    1
adding, SRC CLI
router subscribers    1
adding    
SRC CLI
routing instances    
VPNs
routing scheme
 

S

SAE (service activation engine)    
classification scripts.     See classification scripts    
login events
login process.     See login process    
SAE (service activation engine), configuring    
interim accounting    
SRC CLI
login registration    
SRC CLI
multiple logins from same IP address    
SRC CLI
reduce reported session time    
SRC CLI
session reactivation timers    
SRC CLI
time for MAC address in cache    
SRC CLI
unauthenticated user DN    
SRC CLI
service activation engine.     See SAE    
service sessions    
activate-on-login    12
activating and tracking
activating with Web application
enterprise, remote activation
sites    123
subscriber    1
adding, SRC CLI
state synchronization plug-in interface    
configuring    
SRC CLI
static IP subscribers, login process
static routing
subscriber classification scripts.     See classification scripts    
subscriber folders    1
adding    
SRC CLI
subscriber sessions    
activating with Web application
creating and tracking
enterprise, creating and activating
subscribers    
3gpp attributes (Gx router driver)    
configuring, SRC CLI
adding    
SRC CLI
enterprise    1
adding, SRC CLI
inheriting properties
inheriting subscriptions
residential    1
adding, SRC CLI
retailer    1
adding, SRC CLI
router    1
adding, SRC CLI
sessions
sites    1
adding, SRC CLI
types
subscriptions    1
access, configuring    
SRC CLI
an orderly deactivation, activation order, specifying    
SRC CLI
configuring    
SRC CLI
multiple per subscriber
support, technical     See technical support    
 

T

targets.     See classification scripts    
technical support    
contacting JTAC
text conventions defined
tracking plug-ins    1
configuring    
C-Web interface
 

U

UDP ports    
RADIUS plug-ins
User Datagram Protocol.     See UDP    
 

V

validating    
VPNs
virtual private networks.     See VPNs    
VPNs (virtual private networks)    
adding    
SRC CLI
configuration requirements
configuration statements
extranet clients, modifying    
SRC CLI
invalid subscriptions
modifying
routing schemes
using NAT
validating

Configuring Authentication Plug-Ins (SRC CLI)

You can perform the following tasks to configure authentication plug-ins:

Limiting Subscribers on Router Interfaces

You can limit the number of authenticated subscribers who connect to an IP interface on the router. This plug-in does not limit the number of unauthenticated subscribers who connect to an IP interface, and does not limit the number of subscribers who connect to a physical or link-layer interface. In the case of subscriber interfaces, the plug-in limits the number of authenticated subscribers on the subscriber interface but not on the underlying primary IP interface.

Use the following configuration statement to set up a plug-in that limits the number of subscribers who connect to interfaces:

shared sae configuration plug-ins name name interface-subscriber-limit {concurrent-subscribers concurrent-subscribers ; }

To set up a plug-in that limits the number of subscribers on interfaces:

  1. From configuration mode, access the custom RADIUS accounting plug-in configuration. In this sample procedure, the plug-in called subsLimit is configured in the west-region SAE group.
    user@host# edit shared sae group west-region configuration plug-ins name subsLimit interface-subscriber-limit
  2. Configure the number of authenticated subscribers who can connect to an IP interface on the router simultaneously.
    [edit shared sae group west-region configuration plug-ins name subsLimit interface-subscriber-limit] user@host# set concurrent-subscribers concurrent-subscribers
  3. (Optional) Verify your configuration.
    [edit shared sae group west-region configuration plug-ins name subsLimit interface-subscriber-limit]
    user@host# show 
    concurrent-subscribers 1;

Configuring Basic RADIUS Authentication Plug-Ins

You can use basic RADIUS authentication plug-ins to send authentication information to an external RADIUS accounting server or a group of redundant servers. To communicate with nonredundant servers, you need to create additional instances of the plug-in.

Use the following configuration statements to set up basic RADIUS authentication plug-ins:

shared sae configuration plug-ins name name radius-authentication {load-balancing-mode (failover | roundRobin); failback-timer failback-timer ; nas-ip (SspIp | ErxIp); retry-interval retry-interval ; maximum-queue-length maximum-queue-length ; bind-address bind-address ; udp-port udp-port ; default-peer default-peer ; }

To set up basic RADIUS authentication plug-ins:

  1. From configuration mode, access the basic RADIUS authentication plug-in configuration. In this sample procedure, the plug-in called RadiusAuth is configured in the west-region SAE group.
    user@host# edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication
  2. Configure the mode for load-balancing RADIUS servers.
    [edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication] user@host# set load-balancing-mode (failover | roundRobin)
  3. Specify if and when the SAE attempts to fail back to the default peer.
    [edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication] user@host# set failback-timer failback-timer
  4. (Optional) Configure the value of the NAS-Ip attribute.
    [edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication] user@host# set nas-ip (SspIp | ErxIp)
  5. Configure the time the SAE waits for a response from a RADIUS server before it resends the RADIUS packet.
    [edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication] user@host# set retry-interval retry-interval
  6. Configure the maximum number of unacknowledged RADIUS messages that the plug-in receives from the RADIUS server before it discards new messages.
    [edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication] user@host# set maximum-queue-length maximum-queue-length
  7. (Optional) Configure the source IP address that the plug-in uses to communicate with the RADIUS server. If you do not specify an address, the global default address is used.
    [edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication] user@host# set bind-address bind-address
  8. (Optional) Configure the source UDP port or a range of source UDP ports used for communication with the RADIUS server. If you do not specify a UDP port, the global UDP port is used.
    [edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication] user@host# set udp-port udp-port
  9. Configure the name of the RADIUS server to which the SAE sends packets for this plug-in.
    [edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication] user@host# set default-peer default-peer
  10. (Optional) Verify your configuration.
    [edit shared sae group west-region configuration plug-ins name RadiusAuth radius-authentication]
    user@host# show 
    load-balancing-mode failover;
    failback-timer -1;
    retry-interval 3000;
    maximum-queue-length 10000;
    default-peer peer1;

Configuring Flexible RADIUS Authentication Plug-Ins

Flexible RADIUS authentication plug-ins provide the same features as basic RADIUS authentication plug-ins. In addition, they allow you to customize RADIUS authentication packets that the system sends to RADIUS servers and specify which fields are included in the RADIUS authentication packets and what information is contained in the fields.

Use the following configuration statements to set up flexible RADIUS authentication plug-ins:

shared sae configuration plug-ins name name flex-radius-authentication {load-balancing-mode (failover | roundRobin); failback-timer failback-timer ; timeout timeout ; retry-interval retry-interval ; maximum-queue-length maximum-queue-length ; bind-address bind-address ; udp-port udp-port ; error-handling (0 | 1); default-peer default-peer; template template ; }

To set up flexible RADIUS authentication plug-ins:

  1. From configuration mode, access the flexible RADIUS authentication plug-in configuration. In this sample procedure, the plug-in called flexRadiusAuth is configured in the west-region SAE group.
    user@host# edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication
  2. Configure the mode for load-balancing RADIUS servers.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication] user@host# set load-balancing-mode (failover | roundRobin)
  3. Specify if and when the SAE attempts to fail back to the default peer.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication] user@host# set failback-timer failback-timer
  4. (Optional) Configure the maximum time the SAE waits for a response from a RADIUS server.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication] user@host# set timeout timeout
  5. Configure the time the SAE waits for a response from a RADIUS server before it resends the RADIUS packet.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication] user@host# set retry-interval retry-interval
  6. Configure the maximum number of unacknowledged RADIUS messages that the plug-in receives from the RADIUS server before it discards new messages.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication] user@host# set maximum-queue-length maximum-queue-length
  7. (Optional) Configure the source IP address that the plug-in uses to communicate with the RADIUS server. If you do not specify an address, the global default address is used.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication] user@host# set bind-address bind-address
  8. (Optional) Configure the source UDP port or a range of source UDP ports used for communication with the RADIUS server. If you do not specify a UDP port, the global UDP port is used.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication] user@host# set udp-port udp-port
  9. Configure the way the SAE handles errors.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication] user@host# set error-handling (0 | 1)
  10. Configure the name of the RADIUS server to which the SAE sends packets for this plug-in.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication] user@host# set default-peer default-peer
  11. Configure the name of the RADIUS packet template that defines attributes for this plug-in.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAct flex-radius-accounting] user@host# set template template
  12. (Optional) Verify your configuration.
    [edit shared sae group west-region configuration plug-ins name flexRadiusAuth flex-radius-authentication]
    user@host# show 
    load-balancing-mode failover;
    failback-timer -1;
    timeout 15000;
    retry-interval 3000;
    maximum-queue-length 10000;
    error-handling 0;
    default-peer 1;
    template stdAuth;
    peer-group 1 {
      server-address ;
      server-port 1812;
      secret ********;
    }

Configuring Custom RADIUS Authentication Plug-Ins

The custom RADIUS authentication plug-ins provide the same functions as the flexible RADIUS authentication plug-ins, but are designed to deliver better system performance. To use a custom plug-in, you must provide a Java class that implements the SPI defined in the RADIUS client library. Use this SPI to specify which fields and field values to include in RADIUS accounting packets. The RADIUS client library is part of the SAE core API.

See the documentation for the RADIUS client library in the SAE core API documentation on the Juniper Networks website at:

For a sample implementation, see in the SDK+AppSupport+Demos+Samples.tar.gz file on the Juniper Networks website at: https://www.juniper.net/support/products/src/index.html#sw

The application is located the following directory: SDK/plugin/java/src/net/juniper/smgt/sample/radiuslib/RadiusPacketHandlerImpl.java.

Use the following configuration statements to set up custom RADIUS authentication plug-ins:

shared sae configuration plug-ins name name custom-radius-authentication {java-class-radius-packet-handler java-class-radius-packet-handler ; class-path-radius-packet-handler class-path-radius-packet-handler ; require-mandatory-attributes; load-balancing-mode (failover | roundRobin); failback-timer failback-timer ; timeout timeout ; retry-interval retry-interval ; maximum-queue-length maximum-queue-length ; bind-address bind-address ; udp-port udp-port ; default-peer default-peer; }

To set up custom RADIUS authentication plug-ins:

  1. From configuration mode, access the custom RADIUS authentication plug-in configuration. In this sample procedure, the plug-in called customRadiusAuth is configured in the west-region SAE group.
    user@host# edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication
  2. Configure the name of the Java class that implements the RadiusPacketHandler interface in the RADIUS client library.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set java-class-radius-packet-handler java-class-radius-packet-handler
  3. Configure the URLs that identify a location from which Java classes are loaded when the plug-in is initialized.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set class-path-radius-packet-handler class-path-radius-packet-handler
  4. (Optional) Specify that a RADIUS authentication or accounting request must contain all mandatory RADIUS attributes before sending the request packet.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set require-mandatory-attributes
  5. Configure the mode for load-balancing RADIUS servers.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set load-balancing-mode (failover | roundRobin)
  6. Specify if and when the SAE attempts to fail back to the default peer.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set failback-timer failback-timer
  7. (Optional) Configure the maximum time the SAE waits for a response from a RADIUS server.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set timeout timeout
  8. Configure the time the SAE waits for a response from a RADIUS server before it resends the RADIUS packet.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set retry-interval retry-interval
  9. Configure the maximum number of unacknowledged RADIUS messages that the plug-in receives from the RADIUS server before it discards new messages.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set maximum-queue-length maximum-queue-length
  10. (Optional) Configure the source IP address that the plug-in uses to communicate with the RADIUS server. If you do not specify an address, the global default address is used.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set bind-address bind-address
  11. (Optional) Configure the source UDP port or a range of source UDP ports used for communication with the RADIUS server. If you do not specify a UDP port, the global UDP port is used.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set udp-port udp-port
  12. Configure the name of the RADIUS server to which the SAE sends packets for this plug-in.
    [edit shared sae group west-region configuration plug-ins name customRadiusAuth custom-radius-authentication] user@host# set default-peer default-peer
  13. (Optional) From operational mode, verify your configuration.
    [edit shared sae configuration plug-ins name customRadiusAuth custom-radius-authorization]
    user@host# show 
    java-class-radius-packet-handler net.juniper.smgt.radius.RadiusPacketHandlerImpl;
    require-mandatory-attributes;
    load-balancing-mode failover;
    failback-timer -1;
    timeout 15000;
    retry-interval 3000;
    maximum-queue-length 10000;
    default-peer peer4;

Configuring LDAP Authentication Plug-Ins

Use the following configuration statements to configure LDAP authentication plug-ins:

shared sae configuration plug-ins name name ldap-authentication {method (search | bind); server server ; bind-dn bind-dn ; bind-password bind-password ; search-filter search-filter ;(ldaps); search-base-dn search-base-dn ; name-attribute name-attribute ; password-attribute password-attribute ; service-bundle-attribute service-bundle-attribute ; session-volume-quota session-volume-quota ;timeout timeout ; }

To create LDAP authentication plug-ins:

  1. From configuration mode, access the custom LDAP authentication plug-in configuration. In this sample procedure, the plug-in called ldapAuth is configured in the west-region SAE group.
    user@host# edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication
  2. Configure the LDAP authentication method that the SAE uses.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set method (search | bind)
  3. (Optional) Configure a comma-separated list of IP addresses or hostnames of the LDAP authentication server.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set server server
  4. (Optional) Configure the DN used to authenticate access to the directory.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set bind-dn bind-dn
  5. (Optional) Configure the password that the SAE uses to authenticate its access to the directory to search for the subscriber profile. If you do not specify a bind DN or bind password, the SAE uses anonymous access.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set bind-password bind-password
  6. (Optional) Configure the additional LDAP search filter that the SAE uses to search the directory for the subscriber profile.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set search-filter search-filter
  7. (Optional) Enable the secure protocol used for LDAP connections with the directory. LDAPS, the only secure protocol supported, causes communication with the directory to be encrypted with Secure Sockets Layer (SSL).
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set ldaps
  8. (Optional) Configure the base DN for searching entries in the directory.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set search-base-dn search-base-dn
  9. (Optional) Configure the name of the directory attribute that holds the username.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set name-attribute name-attribute
  10. (Optional) Configure the name of the directory attribute that stores the password.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set password-attribute password-attribute
  11. (Optional) Configure the name of the directory attribute that contains the name of the service bundle that is used for subscriber authentication. This value is made available to the subscriber classification process and can be used to select the subscriber profile to load.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set service-bundle-attribute service-bundle-attribute
  12. (Optional) Configure the name of the LDAP attribute that contains the value of the session volume quota. The LDAP plug-in sets the session volume quota to this value.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set session-volume-quota session-volume-quota
  13. (Optional) Configure the maximum time the SAE waits for a response from a directory server.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication] user@host# set timeout timeout
  14. (Optional) From operational mode, verify your configuration.
    [edit shared sae group west-region configuration plug-ins name ldapAuth ldap-authentication]
    user@host# show 
    method search;
    search-filter (objectClass=umcSubscriber);
    name-attribute uniqueId;
    timeout 5000;

Related Documentation

Modified: 2015-06-19