Instruction Manual

Table Of Contents
3 Obtain user names, passwords, and procedures required to access the devices on the network.
For specific user names and passwords to access devices on the network, contact your system
administrator.
4 Set up the users in the IT Admin group in Active Directory Users and Computers. See the
Authentication Services
manual.
5 Obtain the following values from the system administrator:
Line interface number
Zone Controller (ZC) site link path 1 IP address
ZC site link path 2 IP address
Host name to access the Unified Network Configurator (UNC) server application using
Secure SHell (SSH) (<username> @IP address format)
Site ID number
IP address 1 and 2
Primary and secondary NTP IP addresses
NOTICE: The following are applicable to systems with Authentication, Authorization,
and Accounting (AAA) Servers, Domain Controllers, or Syslog Servers.
Primary, secondary, and tertiary Domain Name Services (DNS) IP addresses
Requested DNS Domain Name
Requested DNS Host Name
System Name
Primary SYSLOG Service Name Fully Qualified Domain Name (FQDN)
Backup SYSLOG Service Name Fully Qualified Domain Name (FQDN)
Remote Authentication Dial-In User Service (RADIUS) FQDN parameter value
RADIUS Row Status parameter value
RADIUS Service Time Out (seconds) parameter value
RADIUS Service Retransmits Attempts parameter value
RADIUS Service Dead Timer (min) parameter value
RADIUS Specific Key parameter value
RADIUS Service Global Key parameter value
6 Obtain the default credentials (local accounts, central authentication, and SNMPv3) for the
device being installed, as well as the updated passwords for those types of accounts (so that
you can change the password after you install the device). Contact your system administrator, if
you do not have this information. See the SNMPv3 manual or see Local Password and SNMPv3
Passphrase Troubleshooting on page 219 for more information.
7 Configure the device as a RADIUS client on the RADIUS server. When these devices are
configured with a RADIUS key that matches a shared secret for that device in Microsoft
Windows Internet Authentication Service (IAS), they become RADIUS clients. They do not join
the Active Directory domain. See the Authentication Services manual for more information.
8
NOTICE: This step is applicable to systems with AAA Servers, Domain Controllers, or
Syslog Servers.
To use the VoyenceControl component of the Motorola Solutions centralized configuration
application for any of the site device procedures, set up the UNC. Depending on your
organizational policies, you may also need to implement a secure protocol between the UNC
MN003286A01-H
Chapter 3: GTR 8000 Base Radio Installation
123