11.07.2015 Views

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> <strong>6.1</strong> Administrator’s <strong>Guide</strong>Legacy Agent Server Identification......................................................................... 241Primary and Replica Identification .......................................................................... 242Agent Host Passcode Configuration ............................................................................... 242Distributing the Configuration Update ........................................................................... 243Authenticating Across Multiple Network Interfaces ...................................................... 244Chapter 13: Replica Management Utility (Windows) ............................ 247Viewing Replica <strong>Authentication</strong> <strong>Manager</strong> Information .......................................... 248Chapter 14: Configuring the <strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> (UNIX) .. 251Updating Your License Record in <strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> for UNIX ................. 251Understanding Your <strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> Configuration................................ 252Changing the Configuration............................................................................................ 255Distributing the Configuration Update .................................................................... 259Changing an Agent Host Name or IP Address ............................................................... 260Multiple Agent Host IP Addresses.................................................................................. 261Chapter 15: Replica Management Utility (UNIX)...................................... 263Running the Replica Management Utility ...................................................................... 263Interactive Mode vs. Command Line Mode ............................................................ 263Adding a Replica............................................................................................................. 264Name of the Replica ................................................................................................ 264IP Address................................................................................................................ 264Alias IP Addresses ................................................................................................... 264Service Name........................................................................................................... 264Service Port.............................................................................................................. 264Delay........................................................................................................................ 264Interval..................................................................................................................... 264Modifying a Replica........................................................................................................ 265Replacing a Replica ........................................................................................................ 265Deleting a Replica........................................................................................................... 265Displaying the <strong>Authentication</strong> <strong>Manager</strong> Information ..................................................... 266Changing the Name or IP Address of the Primary.......................................................... 267Authenticating Across Multiple Network Interfaces ...................................................... 269Command Line Tasks ..................................................................................................... 271Syntax ...................................................................................................................... 271Adding a Replica (Command Line)......................................................................... 273Assigning an Alias IP Address (Command LIne) ................................................... 273Modifying Replica Information (Command Line) .................................................. 274Contents 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!