18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table <strong>of</strong> Contents<br />

x<br />

ICA proxy considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259<br />

Sun RPC proxy considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 260<br />

Usenet News proxy configurations . . . . . . . . . . . . . . . . . . . . . . . . . 260<br />

T.120 and H.323 proxy considerations . . . . . . . . . . . . . . . . . . . . . 262<br />

Notes on using the DNS proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266<br />

Configuring proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266<br />

Setting up a new proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270<br />

Configuring connection ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271<br />

Configuring an SNMP port definition . . . . . . . . . . . . . . . . . . . . . . . 271<br />

TCP maximum segment size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271<br />

CHAPTER 10 Setting Up Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 273<br />

Authentication overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274<br />

Proxy authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274<br />

Administrator authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275<br />

Weak versus strong authentication . . . . . . . . . . . . . . . . . . . . . . . . 275<br />

Supported authentication methods . . . . . . . . . . . . . . . . . . . . . . . . . . 277<br />

Standard password authentication . . . . . . . . . . . . . . . . . . . . . . . . . 278<br />

SafeWord authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279<br />

LDAP/Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280<br />

Windows Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280<br />

SNK (SecureNet Key)/Symantec Defender authentication . . . . . . 281<br />

SecurID authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281<br />

RADIUS authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281<br />

Authentication process overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282<br />

Users, groups, and authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 283<br />

Configuring authentication services . . . . . . . . . . . . . . . . . . . . . . . . . 284<br />

Setting up LDAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 288<br />

Setting up password authentication . . . . . . . . . . . . . . . . . . . . . . . . 291<br />

Setting up RADIUS authentication . . . . . . . . . . . . . . . . . . . . . . . . . 292<br />

Setting up SafeWord authentication . . . . . . . . . . . . . . . . . . . . . . . . 294<br />

Setting up SecurID authentication . . . . . . . . . . . . . . . . . . . . . . . . . 295<br />

Setting up SecureNet Key (SNK) authentication . . . . . . . . . . . . . . 296<br />

Setting up Windows Domain authentication . . . . . . . . . . . . . . . . . . 298<br />

Configuring SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300<br />

Setting up authentication for services . . . . . . . . . . . . . . . . . . . . . . . . 303<br />

Special authentication notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304<br />

Setting up authentication for Web sessions . . . . . . . . . . . . . . . . . . . 305<br />

Setting up authentication for administrators . . . . . . . . . . . . . . . . . . . 306<br />

Allowing users to change their passwords . . . . . . . . . . . . . . . . . . . . 306<br />

How users can change their own password . . . . . . . . . . . . . . . . . . . 308<br />

CHAPTER 11 DNS (Domain Name System) . . . . . . . . . . . . . . . . . . . . . . . . 311<br />

What is DNS? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312<br />

About transparent DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312<br />

About <strong>Sidewinder</strong> hosted DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!