Use the information in this section to understand, create, and use RADIUS authentication profiles.
Figure 53 illustrates how RADIUS authentication can be used to control access to proxy services
Figure 53
The following table summarizes the platforms supported for RADIUS authentication profiles:
Table 15.
Network Component | Software Requirements |
---|---|
Workstation |
Any SSL-capable Internet browser |
Cache Device |
Excelerator 2.x |
RADIUS Server |
RADIUS database as specified in the authentication profile |
Figure 54 summarizes the configuration requirements for RADIUS authentication:
Figure 54
After you have completed the steps in Preparing Your Network for RADIUS Authentication, you can set up a RADIUS authentication profile by completing the following procedure.
In the browser-based management tool, click Cache > Authentication > Insert.
Type a name for the profile in the Authentication Profile Name field.
IMPORTANT: Each profile name created on a cache device must be unique. Excelerator doesn't recognize case differences (MyProfile and myprofile are the same name to Excelerator) and it will overwrite and concatenate previously created profiles without warning if a duplicate name is used. For more information, see Authentication Dialog Box.
Check RADIUS Authentication > click Options.
In the RADIUS Server Address field, type the IP address of the RADIUS server.
In the RADIUS Server Listening Port field, type the port number on which the server will listen for incoming authentication requests.
In the RADIUS Shared Secret field, type the string the RADIUS server uses to verify that the appliance can request authentication of users.
Click OK > OK.
Assign the profile to one or more proxy services as described in each service tab section in Using the Cache Panel.