AWAN 3883/4/5 Access Server Configuration and Management Manual
Configuring User and Port Access
AWAN 3883/4/5 Access Server Configuration and Management Manual—424242-001
7-2
Planning User Names and Passwords
Planning User Names and Passwords
The RAS Management Tool enables you to create a database of AWAN access server
users called a user list. The user list stores the names, passwords, and authorized
protocols for users who will connect to the network through the AWAN access server.
The user is prompted for a user name and password before being allowed to connect to
the network. There are two types of user lists:
•
The local database, which is maintained on the hard drive of the management
workstation.
•
The server database, which is maintained on the AWAN access server in its
nonvolatile random access memory (NVRAM).
If a factory reset is performed on the AWAN access server and the server database is
lost, the user list can be restored from the local database. Similarly, if the local database
is deleted from the management workstation, it can be restored to the workstation from
the AWAN access server.
A user name may be a maximum of 15 characters long. User passwords must be a
minimum of 6 and may be a maximum 15 characters long. User passwords are case-
sensitive. Each AWAN access server may store information for up to 256 users names in
its user list.
Determining Which Protocols to Enable for Users
You must decide which protocols to enable for each user. The protocols you decide to
enable depend on the type of connection the user will make as follows:
•
For Transmission Control Protocol/Internet Protocol (TCP/IP) users, enable the
Point-to-Point Protocol (PPP) or Serial Line Interface Protocol (SLIP)
•
For Internet Packet Exchange (IPX)-over-PPP users, enable PPP
•
For Novell Remote Node (NRN) users, enable NRN.
•
For AppleTalk users, enable the Apple Remote Access Protocol (ARAP)
•
For Network Asynchronous Services Interface (NASI) remote-control users, enable
NASI
•
For 6530 or VT-series terminal or terminal emulator users, enable Telnet.
Note. Do not confuse the AWAN access server user list with the Checkpoint user list. The
Checkpoint user list is used to authenticate and authorize various capabilities for users of the
RAS Management Tool. The Checkpoint user list is described in Section 4, Setting Up RAS
Management Tool Security.
Worksheet Instructions. Record user names and passwords on your User Configuration
Worksheet.