- Copyright and Trademark Information
- Table of Contents
- List of Figures
- List of Tables
- play_arrow Overview
- play_arrow Installation
- play_arrow Installation Tasks Overview
-
- Installing or Upgrading the CTPView Server OS
- Saving the CTPView Configuration Settings and Data (CTPView Server Menu)
- Creating More Disk Space on the CTPView Server (CTPView)
- Creating More Disk Space on the CTPView Server (CTPView Server Menu)
- Installing the CTPView Server OS (CTPView Server CLI)
- Restoring CTPView Software Configuration Settings and Data (CTPView)
- Restoring CTPView Software Configuration Settings and Data with the Restore Utility (CTPView Server Menu)
- Restoring CTPView Software Data by Manually Synchronizing the CTPView Server (CTPView)
- Reviewing the Installation Log for Errors (CTPView Server CLI)
- Verifying the CTPView Server OS Installation (CTPView)
- Validating the CTPView Server Configuration (CTPView)
- play_arrow Upgrade Tasks for Only the CTPView Software
-
- Configuring the CTPView Administrative Settings
- Preparing a New Server
- Changing the BIOS Menu Password (CTPView Server CLI)
- Changing the Server's Default User Account Password (CTPView Server CLI)
- Changing the Server's Root Account Password (CTPView Server CLI)
- Changing the GRUB Boot Loader Password (CTPView Server Menu)
- Changing the PostgreSQL Apache Account Password (CTPView Server Menu)
- Changing the PostgreSQL Administrator Account Password (CTPView Server Menu)
- Configuring IP ACLs for Restricting Access to Resources (CTPView Server Menu)
- Configuring the Network Access (CTPView Server Menu)
- Creating a Self-Signed Web Certificate (CTPView Server Menu)
- Enabling OpenSSL Authentication of Users by Creating a Self-Signed Web Certificate (CTPView Server Menu)
- Importing Certificates Issued by a Third-Party CA (CTPView Server Menu)
- Updating the CTPView Software
- Logging In with a Browser (CTPView)
- Changing the CTPView GUI Default User Account Password (CTPView)
- Creating a New Global_Admin Account (CTPView)
- Configuring Subdomains in Hostnames (CTPView Server Menu)
- play_arrow Upgrade Tasks for CTPOS
- play_arrow Default Accounts and Passwords
- play_arrow Understanding CTPView Upgrade Files
- play_arrow Administration
- play_arrow Managing and Displaying Users (CTPView)
- Managing CTPView Users with the CTPView Admin Center
- Accessing the CTPView Admin Center (CTPView)
- Monitoring CTPView Users (CTPView)
- Adding New CTPView Users (CTPView)
- Modifying CTPView User Properties (CTPView)
- Monitoring CTPView Groups (CTPView)
- Modifying CTPView User Group Affiliation (CTPView)
- Adding a New CTPView User Group (CTPView)
- Modifying CTPView User Group Default Properties (CTPView)
- play_arrow Deleting Users and Groups (CTPView)
- play_arrow Managing User Passwords (CTPView)
- play_arrow Configuring User Login Properties (CTPView)
- Logging Out a CTPView User (CTPView)
- Configuring Automatic Logout for a CTPView User (CTPView)
- Configuring the Number of Login Attempts Allowed Before Lockout (CTPView)
- Configuring a Lockout Period for CTPView Users (CTPView)
- Clearing CTPView User Counters (CTPView)
- Reinstating Locked-Out IP Addresses (CTPView)
- Creating an Access Filter to Allow or Deny IP Addresses (CTPView)
- Removing an IP Access Filter (CTPView)
- Understanding CTPView GUI User Levels
- CTPOS and CTPView Software Password Requirements
- play_arrow Managing the CTPView Server (CTPView)
- Adding and Removing CTP Platforms Managed by CTPView Software (CTPView)
- Adding and Removing Host Groups (CTPView)
- Adding and Removing SNMP Communities (CTPView)
- Managing CTP Platforms in the Network (CTPView)
- Configuring Email Notifications (CTPView)
- Setting the CTPView Server Start-Up Banner (CTPView)
- Setting the CTP Platforms Login Banner (CTPView)
- Configuring an SSH Connection to a CTP Platform that Persists Through the Session (CTPView)
- Setting the CTPView Server Clock (CTPView)
- Setting the CTPOS Clock (CTP Menu)
-
- Accessing the NTP Server Settings Window (CTPView)
- Stopping the NTP Daemon (CTPView)
- Adding an NTP Peer (CTPView)
- Removing an NTP Peer (CTPView)
- Synchronizing the CTPView Server to an NTP Peer (CTPView)
- Adding NTP Network Clients (CTPView)
- Removing an NTP Network Client (CTPView)
- Modifying the Netmask of an NTP Network Client (CTPView)
- play_arrow NTP Authentication Overview on CTP Devices
- Configuring NTP Authentication Using the System Query Page (CTPView)
- Configuring NTP Authentication Using the System Configuration Page (CTPView)
- Configuring NetRef Settings (CTPView)
- Setting a Limit on File Transfer Bandwidth Between the CTPView Server and CTP Platforms (CTPView)
- Restoring CTPView Software Configuration Settings and Data (CTPView)
- Restoring CTPView Software Data by Manually Synchronizing the CTPView Server (CTPView)
- play_arrow Monitoring CTP Platforms (CTPView)
- Monitoring the Network with the CTPView Software (CTPView)
- Changing the Display Settings for CTPView Network Monitoring (CTPView)
- Displaying Runtime Query Results for a CTP Platform (CTPView)
- Overriding CTP Platform Network Status and Adding Comments (CTPView)
- Saving CTP Platform Configurations (CTPView)
- Setting an Audible Alert for CTP Platform Status (CTPView)
- Displaying CTPView Network Reports (CTPView)
- Field Descriptions in CTPView Network Reports (CTPView)
- Displaying Network Statistics (CTPView)
- Displaying the Management and Circuit Interface Settings (CTP Menu)
- play_arrow Changing CTPView GUI Settings
-
- Accessing the CTPView Server Configuration Menu (CTPView Server Menu)
- play_arrow Managing CTPView Users (CTPView Server Menu)
- Unlocking a User Account (CTP Menu)
- play_arrow Adding a VLAN Interface to a Node (CTP Menu)
- Configuring Separate Interfaces for Management and Circuit Traffic (CTP Menu)
- Accessing the Security Profile Configuration Menu (CTP Menu)
- Classification of CTPView Shell Account Users
-
- Setting the CTPView Server Start-Up Banner (CTPView Server Menu)
- Establishing an SSH Connection (CTP Menu)
- Saving the CTPView Configuration Settings and Data (CTPView Server Menu)
- Creating More Disk Space on the CTPView Server (CTPView Server Menu)
- Restoring CTPView Software Configuration Settings and Data with the Restore Utility (CTPView Server Menu)
- Restarting the PostgreSQL Server (CTPView Server Menu)
- Setting the Logging Level (CTPView Server Menu)
-
- Resetting the Default System Administrator Account (CTPView Server Menu)
- Resetting the Data File Permissions (CTPView Server Menu)
- Resetting the CTPView System Files to the Default Values (CTPView Server Menu)
- Burning an Image of CTPOS to a CompactFlash Card (CTPView Server Menu)
- Resetting the Default Firewall Settings (CTPView Server Menu)
-
- Changing Passwords to Improve Access Security
- Changing the BIOS Menu Password (CTPView Server CLI)
- Changing the Server's Root Account Password (CTPView Server CLI)
- Changing the GRUB Boot Loader Password (CTPView Server Menu)
- Changing the PostgreSQL Apache Account Password (CTPView Server Menu)
- Changing the PostgreSQL Administrator Account Password (CTPView Server Menu)
- play_arrow Troubleshooting
- play_arrow Restoring CLI Access to the CTPView Server
- Restoring Access to a CTPView Server
- Accessing a Shell on the CTPView Server (CTPView Server CLI)
- Setting a New Password for a Nonroot User Account (CTPView Server CLI)
- Setting a New Password for a Root User Account (CTPView Server CLI)
- Creating a Nonroot User Account and Password (CTPView Server CLI)
- play_arrow Restoring Browser Access to a CTPView Server
- play_arrow Changing a CTPOS User Password
ON THIS PAGE
Configuring CTPView User Authentication with Steel-Belted RADIUS
Starting with CTPView Release 4.1, you can provide RADIUS authentication to both HTTPS and SSH users. Earlier releases of CTPView supported RADIUS authentication only for HTTPS users. Enabling RADIUS authentication for SSH users ensures that both HTTPS and SSH users have a common authentication method without requiring separate user-specific configuration.
Starting with CTPView Release 4.1, users do not require a local user account on the CTPView server. For CTPView 4.0 and earlier, a user must have an account on the CTPView server. You can add a user or verify whether a user account exists from the CTPView CLI menu. The username for the CTPView account must match the username that is configured on the RADIUS server.
You can enable or disable RADIUS authentication for both SSH and HTTPS users. You can block a specific user by disbaling that user from the RADIUS server.
To provide RADIUS authentication, use an independent Steel-Belted RADIUS (SBR) server or an RSA SecurID appliance with your CTPView server running FC9 or Centos OS and CTPView 3.4R1 or later. The RSA SecurID appliance incorporates an SBR server, making the configuration very similar to that of an independent SBR server.
Users are authenticated in the following order:
By the SBR server.
By the local CTPView application.
You can configure the SBR server to use native user authentication or pass-through authentication with RSA SecurID.
Native user authentication references user accounts stored on the SBR server. When trying the native user method, the SBR software searches its database for an entry whose User-Type is Native User and whose username matches the User-Name in the Access-Request.
Pass-through authentication (two-factor authentication) enables the SBR server to pass authentication requests through to RSA Authentication Manager (RSA SecurID). RSA SecurID is then responsible for validating the username and password found in the Access-Request.
The order of authentication between these two categories of users is set on the SBR server. You can add the same user (that is, the same user ID) to both the SBR server and the local CTPView application.
Configuring RADIUS Settings on the CTPView Server
Before you begin, log in to the CTPView server and access the CTPView Configuration Menu. See Accessing the CTPView Server Configuration Menu (CTPView Server Menu).
To configure RADIUS settings on the CTPView server:
- From the CTPView Configuration Menu, select 9) AAA
Functions.
The RADIUS Menu is displayed.
- Select 8) RADIUS/RSA SecurID Configuration.
Configure the parameters described in Table 26.
Field
Function
Your Action
Servers
Displays the RADIUS servers configured on CTPView.
You can add up to 10 RADIUS servers.
If you define multiple servers, the order in which they are tried differs on the basis of whether the user is trying to access CTPView via SSH or HTTPS. For access via SSH, the servers are tried in order. For HTTPS access, the servers are tried in a round-robin fashion. In both cases, the process continues until the system receives a response from a server or until the maximum number of retries is reached for all servers.
Specify a RADIUS server.
Make sure you specify an IPv4 address if you are configuring RADIUS authentication for HTTPS. IPv6 addresses are supported for RADIUS authentication for SSH.
Destination Port
Specifies the RADIUS destination port.
The default value is 1812.
Retry Attempts
Specifies the number of attempts that the CTPView server makes to contact the listed RADIUS server.
Specify a value in the range of 0 through 9.
Off-Line-Failover
Determines whether the login credentials are passed to the local account login function when no RADIUS server responds to the login request.
Select one:
Allowed to Loc Acct—User credentials are passed to the local account login function.
Not Allowed—User is denied access and the session is terminated.
Reject-Failover
Determines whether the login credentials are passed to the local account login function.
The user credentials are not passed if the login information is incorrect or if the user does not have an account for the RADIUS server.
Select one:
Allowed to Loc Acct—User credentials are passed to the local account login function.
Not Allowed—User is denied access and the session is terminated.
- Select 6) Initialize Web UI Template Accounts.
- Enter the PostgreSQL administrator account password when prompted.
- Select 1) Servers.
The system displays the RADIUS servers that are configured currently.
- Enter y to add, remove, or modify a server
from the list. Note
Whenever you make changes to the server list, you must reenter all RADIUS servers.
- When prompted, enter the following information:
Shared secret
Timeout period
Number of retries
NoteFor shared secret, only alphanumeric characters and special characters such as “at” sign (@), curly braces ({}), pound sign (#), percent sign (%), tilde (~), square brackets ([]), equal sign (=), comma (,), em dash (–), and underscore (_) are supported.
Configuring the SBR Server’s Dictionary Files
To configure the SBR server’s dictionary files:
- Log in to the SBR server as an administrator.
- Open the file
C:\Program Files\Juniper Networks\Steel-Belted RADIUS\Service\juniper.dct
and append the following new block of text to the bottom of the file:content_copy zoom_out_map################################################################# # CTP Specific Attributes ################################################################# ATTRIBUTE Juniper-CTP-Group Juniper-VSA(21, integer) r VALUE Juniper-CTP-Group Read_Only 1 VALUE Juniper-CTP-Group Admin 2 VALUE Juniper-CTP-Group Privileged_Admin 3 VALUE Juniper-CTP-Group Auditor 4 ATTRIBUTE Juniper-CTPView-APP-Group Juniper-VSA(22,integer) r VALUE Juniper-CTPView-APP-Group Net_View 1 VALUE Juniper-CTPView-APP-Group Net_Admin 2 VALUE Juniper-CTPView-APP-Group Global_Admin 3 VALUE Juniper-CTPView-APP-Group NET_DIAG 4 ATTRIBUTE Juniper-CTPView-OS-Group Juniper-VSA(23, integer) r VALUE Juniper-CTPView-OS-Group Web_Manager 1 VALUE Juniper-CTPView-OS-Group System_Admin 2 VALUE Juniper-CTPView-OS-Group Auditor 3 ################################################################# # CTP Specific Attributes #################################################################
- Open the file
C:\Program Files\Juniper Networks\Steel-Belted RADIUS\Service\vendor.ini
and locate the block of text that begins:vendor-product = Juniper M/T Series
- Add the following text after that block.content_copy zoom_out_map
vendor-product = Juniper CTP Series dictionary = Juniper ignore ports = no port-number-usage = per-port-type help-id = 2000
NoteSBR Enterprise Release 6.1.4 and SBR Carrier Release 7.2.4 supports the RADIUS attributes required for CTP Series. This step is required only if you are using an earlier version of SBR and the Juniper CTP Series attribute is not listed.
- Restart the Steel-Belted RADIUS service on the server.
Configuring the SBR Server’s Active Authentication Method
To configure the SBR server’s active authentication method:
- Launch the Steel-Belted RADIUS Administrator application from your web browser by entering the address http://SBR-server-IP-address:1812.
- Click Launch.
- Select Steel-Belted RADIUS > Authentication
Policies > Order of Methods.
Ensure that your chosen method, Native User or SecurID User, is listed under the section Active Authentication Methods.
Adding the CTPView Server as a RADIUS Client on an SBR Server
To add the CTPView server as a RADIUS client on an SBR server:
- Launch the Steel-Belted RADIUS Administrator application from your web browser by entering the address http://SBR-server-IP-address:1812.
- Click Launch.
- Select Steel-Belted RADIUS > RADIUS Clients.
- Add your CTPView server as a client. In the Make or model field, select Juniper CTP Series.
Adding CTPView Users to an SBR Server
To add CTPView users to an SBR server:
- Launch the Steel-Belted RADIUS Administrator application from your web browser by entering the address http://SBR-server-IP-address:1812.
- Click Launch.
Select the user type.
For native users, select Steel-Belted RADIUS > Users> Native.
For RSA SecurID users, select Steel-Belted RADIUS > Users > SecurID.
- Add a user with the Add Native User dialog box or the Add SecurID dialog box, depending on your choice in the previous step.
- In the Attributes section, click the Return List tab and then click Add. The Add Return List Attribute dialog box opens.
- In the Attributes section select Juniper-CTPView_APP-Group.
In the Value section select one of the following authorization levels for the user you are adding:
Global_Admin
Net_Admin
Net_View
Net_Diag
Assigning SecurID Tokens to CTPView Users
SecurID authentication requires that you issue a SecurID token to each user and assign it to them on the RSA SecurID appliance. The first time a new user logs in to the CTPView software, the token code displayed on the SecurID token is the password. The user is then prompted to create a PIN. On subsequent logins, the user’s PIN followed immediately by the token code displayed on the SecurID token is the password.
To assign SecurID tokens:
- On the RSA SecurID appliance, launch the RSA Authentication Manager Host Mode application.
- Select User > Add User.
Complete at least the following required fields:
Last Name
Default Login
Required to Create a PIN
Assign Token