User's Manual

Table Of Contents
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing
146
TLSCipherSuite (all|legacy|suite-b to set supported cipher suite for EAP-TLS):
Enabling the internal authentication server causes an entry to
be automatically added to the authentication server list output
by the
show auth command (refer to Section 4.5.1). This entry
is automatically removed if the internal authentication server is
disabled.
NOTE: The shared
key on the internal
authentication server
must be 1–64 printable
characters.
4.5.2.1 Basic Internal Authentication Server Settings
In addition to enabling (
y
) and disabling (
n
) local authentication,
you can configure the
port used by the internal authentication
server, change the servers shared key (
SharedKey), and
establish a
Priority for this authentication server.
4.5.2.2 Certificate Authority Settings
The
CaCertUrl (CA Certificate URL) parameter specifies the
full LDAP uniform resource locator, as a domain name or IP
address, of the LDAP server from which the Mesh Point will
download the most recent CA certificates. This setting, with
LdapSB (described in the next paragraph) permits CA
certificates on the Mesh Point to be automatically refreshed at
the time the internal RADIUS server is enabled.
The
LdapSB (LDAP Search Base) parameter specifies the
starting point in the LDAP (Lightweight Directory Access
Protocol) directory for certificate retrieval search, as the
distinguished name of the search base object.
(
ou=engineering,dc=gdfortress,dc=com
, for example). This
setting, with
CaCertUrl (described in the paragraph above)
permits CA certificates on the Mesh Point to be automatically
refreshed at the time the internal RADIUS server is enabled.
4.5.2.3 Global User and Device Authentication Settings
NOTE: Individual
device authentica-
tion settings override
the global Default
DeviceState setting
on the internal authenti-
cation server.
Fortress Secure Client device authentication (set localauth
EnableDevAuth
) and local user authentication (set
localauth EnableUserAuth
) are enabled (
y
) and disabled (
n
)
independently. At least one must be enabled, even if internal
authentication is disabled.
You can also configure the default connection state of Secure
Client devices auto-populating the authentication database
(
set localauth DefaultDeviceState):
pending
(default) requires an administrator to change
devices’ authentication state settings to
allow
before they
can connect.
allow
permits auto-populating devices to connect by default
(provided their individual authentication mode is
allowfirst
or
defer
, as described in Section 4.5.4).
deny
blocks all device connections by default.