AWAN 3883/4/5 Access Server Configuration and Management Manual

AWAN 3883/4/5 Access Server Configuration and Management Manual424242-001
4-1
4
Setting Up RAS Management Tool
Security
This section describes how to use the Checkpoint program to restrict access to the RAS
Management Tool. The Checkpoint program maintains a database of valid RAS
Management Tool users, authenticates users, and authorizes various capabilities for each
user. This section also describes how to make changes to RAS Management Tool
security after it has been initially configured.
You must perform the tasks described in this section before you can use the RAS
Management Tool.
Summary of Configuration Tasks
Setting up security for the RAS Management Tool involves a number of tasks. Table 4-1
lists each task in the order in which it must be performed.
Note. The dialog boxes shown in this section reflect the way the Checkpoint program appears
under Windows 95 and Windows NT 4.0.
Table 4-1. RAS Management Tool Security Configuration Tasks
Task Purpose
1. Changing the System
Administration Password
To modify the default system administration
password.
2. Configuring Checkpoint Templates To customize user access to the RAS Management
Tool.
3. Adding Users and Configuring
User Access
To create RAS Management Tool users.
4. Configuring the User Account
Policy
To set security policies for RAS Management Tool
users.