ON THIS PAGE
About the Access Profile Page
You are here: Security Services > Firewall Authentication > Access Profile.
Use this page to configure Access Profile. Access profiles enable you to define the authentication and accounting servers and their priorities.
Tasks You Can Perform
You can perform the following tasks from this page:
Create an access profile. See Add an Access Profile.
Edit an access profile. See Edit an Access Profile.
Delete an access profile. See Delete an Access Profile.
View the details of the Access profile—To do this, select the Access profile for which you want to view the details and follow the available options:
Click More and select Detailed View.
Right-click on the selected Access profile and select Detailed View.
Mouse over to the left of the selected Access profiles and click Detailed View.
Show or hide columns in the Access Profile table. To do this, click Show Hide Columns icon in the upper-right corner of the Access Profiles table and select the columns you want to display or deselect the columns you want to hide on the page.
Advance search for Access profile. To do this, use the search text box present above the table grid. The search includes the logical operators as part of the filter string. An example filter condition is displayed in the search text box when you hover over the Search icon. When you start entering the search string, the icon indicates whether the filter string is valid or not.
For an advanced search:
Enter the search string in the text box.
Based on your input, a list of items from the filter context menu appears.
Select a value from the list and then select a valid operator based on which you want to perform the advanced search operation.
Note:Press Spacebar to add an AND operator or OR operator to the search string. Press backspace to delete a character of the search string.
Press Enter to display the search results in the grid.
Field Descriptions
Table 1 describes the fields on the Access Profile page.
Field |
Description |
---|---|
Profile Name |
Displays the name of an access profile. |
Order 1 |
Shows the order in which Junos OS tries different authentication methods when verifying that a client can access the devices. |
Order 2 |
Shows the next authentication method if the authentication method included in the authentication order option is not available, or if the authentication is available but returns a reject response. |
Local Users |
Displays the usernames that are created for accessing the application. |
LDAP Servers |
Displays the IP address of the LDAP authentication server. |
RADIUS Servers |
Displays the RADIUS server configuration. |