This document provides an installation and configuration guide for TekRADIUS version 5.1. It includes information on system requirements, installation, configuration settings like clients, groups and users, reporting, monitoring, troubleshooting and features like data volume authorization, change of authorization, and IPv6 support. The guide has over 50 pages covering all aspects of installing and managing the TekRADIUS RADIUS server software.
The document provides an overview of installing Oracle Database Client, including planning the installation, considering hardware and software requirements, using different installation methods like interactive or response file installations, installing different client types, and ensuring interoperability between the client and database. It discusses installation types, methods, requirements and compatibility to help plan a successful Oracle Database Client deployment.
Mercury QuickTest Professional Installation Guide, Version 9.2 provides instructions for installing QuickTest Professional 9.2. The document and software are protected by copyright laws and may only be used under the license agreement. QuickTest Professional and other Mercury Interactive products are covered by over 30 U.S. and international patents, with other patents pending.
This document provides instructions for installing AirDefense Mobile 6.1 on a Windows laptop. It describes prerequisites like supported operating systems and network adapters. The installation process involves uninstalling previous versions, updating drivers, running the installer, selecting a network adapter, and restarting. After installing, a license must be installed using a file, authorization code, or legacy key to activate the software's features.
Microsoft OCSP LUNA SA PCI Integration GuideChris x-MS
This document provides guidance on integrating Microsoft Online Certificate Status Protocol (OCSP) with SafeNet Luna Hardware Security Modules (HSMs). It describes the OCSP client and server components, how Luna HSMs can be used to securely and quickly sign OCSP responses, and the steps to configure a CA to support OCSP and issue signing certificates stored on Luna HSMs. The document also outlines testing the integration by generating and checking the status of certificates.
This document provides instructions for installing or upgrading Oracle Governance, Risk and Compliance Controls (GRCC) release 8.6.0. It outlines prerequisites including supported operating systems and required software. The steps include downloading files, performing the installation, configuring global users and datasources, and installing additional components for specific applications. Additional chapters provide instructions for installing Preventive Enforcement Agents for Oracle and PeopleSoft applications.
This document provides release notes for Oracle Fusion Middleware 11g Release 1 (11.1.1) for Microsoft Windows (32-Bit). It includes sections on installation and configuration issues and workarounds, upgrade considerations, administration topics, and documentation errata. Specific issues covered include requirements for upgrading components, problems with installation on specific operating systems, configuration changes required when expanding a cluster, and inaccuracies in other documentation.
Virident FlashMAX II and FlashMAX Connect High Availability Oracle Reference ...Principled Technologies
Businesses looking to utilize highly available Oracle databases and protect their datacenters from loss of data during failover have a solution in Virident FlashMAX II and FlashMAX Connect software featuring vHA. The detailed steps in this report demonstrate the simplicity of installation for any organization implementing this hardware and software into their datacenter running Red Hat Enterprise Linux 6. Virident FlashMAX II with Red Hat Enterprise 6 and Oracle brings premium high performance and ultimate reliability for your database applications, without requiring an expensive storage array or costly high availability software.
Here are the key requirements for installing NetBackup server software:
- Hardware requirements: A server platform supported by NetBackup with sufficient disk space, memory, and CPU resources.
- Operating system: A supported version of Windows, Linux, Solaris, HP-UX, AIX, or Tru64.
- Licenses: Valid NetBackup base product license keys for all servers and options.
- Storage devices: Properly configured and compatible storage devices like tape drives and libraries if backing up to tape.
- Network: Ability to communicate between servers and clients on the network.
- Users: Local administrator-level access on Windows servers or root access on UNIX servers.
So in summary,
The document provides an overview of installing Oracle Database Client, including planning the installation, considering hardware and software requirements, using different installation methods like interactive or response file installations, installing different client types, and ensuring interoperability between the client and database. It discusses installation types, methods, requirements and compatibility to help plan a successful Oracle Database Client deployment.
Mercury QuickTest Professional Installation Guide, Version 9.2 provides instructions for installing QuickTest Professional 9.2. The document and software are protected by copyright laws and may only be used under the license agreement. QuickTest Professional and other Mercury Interactive products are covered by over 30 U.S. and international patents, with other patents pending.
This document provides instructions for installing AirDefense Mobile 6.1 on a Windows laptop. It describes prerequisites like supported operating systems and network adapters. The installation process involves uninstalling previous versions, updating drivers, running the installer, selecting a network adapter, and restarting. After installing, a license must be installed using a file, authorization code, or legacy key to activate the software's features.
Microsoft OCSP LUNA SA PCI Integration GuideChris x-MS
This document provides guidance on integrating Microsoft Online Certificate Status Protocol (OCSP) with SafeNet Luna Hardware Security Modules (HSMs). It describes the OCSP client and server components, how Luna HSMs can be used to securely and quickly sign OCSP responses, and the steps to configure a CA to support OCSP and issue signing certificates stored on Luna HSMs. The document also outlines testing the integration by generating and checking the status of certificates.
This document provides instructions for installing or upgrading Oracle Governance, Risk and Compliance Controls (GRCC) release 8.6.0. It outlines prerequisites including supported operating systems and required software. The steps include downloading files, performing the installation, configuring global users and datasources, and installing additional components for specific applications. Additional chapters provide instructions for installing Preventive Enforcement Agents for Oracle and PeopleSoft applications.
This document provides release notes for Oracle Fusion Middleware 11g Release 1 (11.1.1) for Microsoft Windows (32-Bit). It includes sections on installation and configuration issues and workarounds, upgrade considerations, administration topics, and documentation errata. Specific issues covered include requirements for upgrading components, problems with installation on specific operating systems, configuration changes required when expanding a cluster, and inaccuracies in other documentation.
Virident FlashMAX II and FlashMAX Connect High Availability Oracle Reference ...Principled Technologies
Businesses looking to utilize highly available Oracle databases and protect their datacenters from loss of data during failover have a solution in Virident FlashMAX II and FlashMAX Connect software featuring vHA. The detailed steps in this report demonstrate the simplicity of installation for any organization implementing this hardware and software into their datacenter running Red Hat Enterprise Linux 6. Virident FlashMAX II with Red Hat Enterprise 6 and Oracle brings premium high performance and ultimate reliability for your database applications, without requiring an expensive storage array or costly high availability software.
Here are the key requirements for installing NetBackup server software:
- Hardware requirements: A server platform supported by NetBackup with sufficient disk space, memory, and CPU resources.
- Operating system: A supported version of Windows, Linux, Solaris, HP-UX, AIX, or Tru64.
- Licenses: Valid NetBackup base product license keys for all servers and options.
- Storage devices: Properly configured and compatible storage devices like tape drives and libraries if backing up to tape.
- Network: Ability to communicate between servers and clients on the network.
- Users: Local administrator-level access on Windows servers or root access on UNIX servers.
So in summary,
ArcSight ESM Version 6.0c Patch 2 release notes provide instructions for installing the patch for multiple ESM components. The patch addresses critical issues, provides geographical and vulnerability updates, and can be installed by running executable files for each component. Detailed steps are outlined for installing the patch on the ESM suite, ArcSight Console, and uninstalling the patch. Issues fixed and known issues remaining in the patch are also documented.
This document provides installation instructions for Oracle WebCenter Sites 11g Release 1 (11.1.1.8.0) and includes the following key points:
- It outlines the installation process and prerequisites for installing WebCenter Sites on Oracle WebLogic Server, Apache Tomcat Server, or IBM WebSphere Application Server.
- It provides instructions for configuring the application server with managed servers, clusters, data sources, and other required settings before installing WebCenter Sites.
- It describes how to integrate the application server with a supported web server like Oracle HTTP Server, Apache HTTP Server, or IIS.
- It contains reference information like paths, directories, and start/stop commands for the application servers
This document provides a reference for the command line programs that are used to interact with Informatica PowerCenter. It includes copyright information for the various software components, a table of contents, and describes how to use the command line programs. The document is published by Informatica and provides technical documentation for administrators of the PowerCenter platform.
This document provides installation instructions for 1KEY Release 2.0.1. It outlines the necessary prerequisites, hardware requirements, and step-by-step procedures for installing various software components on the server and client systems. This includes installing MDAC, Windows Installer, .NET Framework 2.0, SQL Server 2005, 1KEY application, and other utilities. The goal is to guide users through setting up all the required software in the correct order to successfully implement the 1KEY Release 2.0.1 solution.
The document provides instructions for installing and upgrading Oracle Primavera P6 version 7.0 in a stand-alone configuration. It describes downloading required files, preparing for the installation, and outlines the steps to perform a new installation or upgrade from version 5.0, 6.0, or higher. The upgrade process is a multi-step procedure including backing up existing databases, performing intermediate upgrades, and migrating database platforms if desired.
This document provides release notes for Oracle Database Client 12c Release 1 (12.1) for IBM Linux on POWER systems. It certifies support for specific Linux operating system versions and notes that Pro*COBOL is not supported. An issue is also described where Pro*C does not support C99 headers on this platform. The document directs readers to Oracle support and documentation resources.
This document provides instructions to install the Oracle Data Integrator 12c Getting Started Virtual Machine. It describes downloading the Oracle VirtualBox software, extracting the ODI VM archive file, and importing the appliance into VirtualBox. It also outlines how to customize settings, start the VM, and begin the ODI tutorial by accessing the provided guide and starting the ODI Studio program. Credentials and access information for the Oracle database and ODI repository are also listed.
This document provides an overview and instructions for using several Oracle Financials features specific to Latin American countries, including inflation adjustment in Oracle General Ledger, copy and void invoice functionality in Oracle Receivables, and tax calculation using the Latin Tax Engine. Key steps are outlined for setting up and utilizing these regional capabilities to support accounting requirements and business processes common in Latin America.
This release summary provides information on new features and enhancements in ArcSight ESM Version 5.2, including:
- Enhanced reporting capabilities such as distributing reports to multiple recipients and non-ESM users.
- New correlation rules for improved performance.
- Active list enhancements like storing data in time segments.
- Support for managing the asset model within ESM using a new Asset Model Import Connector.
- Updated geographical information and vulnerability mappings.
- Notes on usage considerations like required JRE and Oracle PSU versions.
This document provides instructions for deploying a private Infrastructure as a Service (IaaS) cloud using Red Hat Cloud Foundations components. It describes setting up the necessary infrastructure services including the Red Hat Enterprise Linux, Red Hat Enterprise Virtualization, Red Hat Satellite, and JBoss middleware components. It then outlines the steps to deploy virtualization hosts, provision tenant virtual machines, and configure high availability clustering.
This document provides instructions for installing the driver and Adaptec Storage Manager software for Adaptec Embedded Serial ATA RAID controllers. It discusses installing the driver in new and existing Windows, Linux, and NetWare systems. It also provides steps for installing and starting Adaptec Storage Manager on Windows, Linux, and NetWare to manage storage arrays without having to restart the computer. Key features of Storage Manager like viewing physical and logical devices are also overviewed.
This document provides an implementation guide for Oracle Human Resources Management Systems (HRMS). It describes how to configure HRMS using the Configuration Workbench to define organizational structures and implement functionality for different areas such as compensation, benefits, and payroll. It also outlines implementation steps, technical essays on various HRMS features and processes, and country-specific additional implementation steps.
The SPYRUS Enterprise Management System (“SEMS™”) provides a very strong security and productivity solution for any organization deploying SPYRUS encrypting storage devices and/or our Microsoft certified bootable Windows To Go Drives. While SPYRUS drives provide the strongest Data--at--Rest protection when used by the mobile workforce, organizations are faced with another challenge that is the management, audit and policy enforcement of these high capacity, small form factor devices. SEMS solves that problem.
SEMS was designed to operate on a Windows server ecosystem, on premise, or on Microsoft Azure. It has the ability to scale from proof of concept with a small number of devices, to deployments with tens of thousands of devices under management anywhere on the globe.
SEMS enables an organization to manage their data assets wherever they are used. It provides a central, web-based, easy to use management interface for controlling and monitoring SPYRUS secure hardware. Robust role management for SEMS administrators, permits separation of responsibilities and enforcement of enterprise security policies. Recovery is easily facilitated to protect against data loss and employee downtime. A full set of Audit features allows usage to be tracked and an in-built reporting mechanism allows custom reports to be produced. It provides full transparency of all system and device operations. When things go wrong, the system provides the ultimate assurance that your assets don’t fall into the wrong hands. When things go really wrong, a remote device kill operation renders the data on the device unusable.
SEMS maintains audit records of management activities performed on the SEMS Management Console and activities on managed SPYRUS endpoint devices. It enables central administration and controls device behavior while transparently enforcing policies set by the organization. SEMS has a web based management console to provide operational views through which administrator can maintain control over all deployed devices. SPYRUS has achieved this balance to give the productivity promised by mobility, but with the security supplied by SPYRUS.
This document provides instructions for installing ArcSight ESM version 5.2 Patch 2. It includes steps for updating the ArcSight Database, ArcSight ESM Manager, ArcSight Console, and ArcSight Web Server components. Details are provided for installation on different platforms. The patch addresses critical issues in ESM v5.2 and provides updates to vulnerability mappings. Users should back up each component before installation and refer to release notes for any usage notes or known issues.
Ricoh Assure is a service that monitors devices to prevent IT downtime. It reviews performance metrics, protects devices with antivirus software, and alerts users to potential issues. For a monthly fee per device, Ricoh Assure provides on-demand support from their IT service desk for remote or onsite assistance, as well as anti-virus software. Key benefits include on-demand support, antivirus protection, managed costs where users only pay for issues they want fixed, and convenience through email alerts.
This document provides an agenda and overview for a July 15, 2020 webinar on the Patch Tuesday updates. The webinar will include an overview of the July 2020 Patch Tuesday updates, discussion of vulnerabilities in the news, such as a wormable DNS server vulnerability and publicly disclosed Windows vulnerability, and Q&A. The webinar is hosted by Chris Goettl and Todd Schell and participants can dial in or join online.
Security Guide for Oracle Fusion - E10543aakash2meet
This document provides the security guide for Oracle Business Intelligence Enterprise Edition 11g Release 1 (11.1.1). It discusses authentication, authorization, and the default users, groups, and roles installed. It also describes the tools used to configure security - Oracle WebLogic Server Administration Console, Oracle Fusion Middleware Control, Oracle BI Administration Tool, and the Administration page in Oracle BI Presentation Catalog. Finally, it provides detailed steps for setting up security and managing security using the default configuration.
This document provides a summary of Dell EMC's network virtualization handbook for VMware NSX Enterprise 6.2.x. It describes the components of network virtualization including the network underlay, ESXi hypervisor, vCenter, NSX Manager, NSX controllers, virtual distributed switches, and VXLAN. It then discusses NSX virtual components such as transport zones, replication modes, logical switching, and logical routing. The document provides guidance on getting started with a Dell underlay network design and deploying the NSX virtualization platform before covering vSphere networking, overlay network design, and hardware VTEP configuration.
InnoDB 1.1 is the latest version of the InnoDB storage engine plugin for MySQL 5.5 that provides performance and scalability improvements over previous versions. It includes features from the InnoDB Plugin 1.0 for MySQL 5.1 as well as new features for MySQL 5.5. InnoDB 1.1 supports data compression, fast index creation, and provides additional INFORMATION_SCHEMA tables for monitoring transactions and compression statistics. However, it is not recommended for production use and the generally available version is InnoDB Plugin 1.0.7 and higher.
This document provides instructions for installing Aspect Performance Management 8.1 software. It describes seven installation combinations with different server configurations including single server, split database/application servers, and clustered database and application servers. The document also provides steps for system preparation, database installation, application services installation, post-installation tasks, and repairing or removing the software.
This document provides instructions for administrators on installing and configuring the Druva inSync 5.1 server and client. It covers installing the server on Windows and Linux, performing an express or advanced configuration wizard to set up the server, understanding the dashboard and backup/restore/data loss prevention overview screens. The intended audience is backup and system administrators.
This document provides instructions on installing and launching MySQL Workbench on Windows, Linux, and Mac OS X. It discusses the software's hardware and software requirements, installation procedures for each operating system, and an overview of the main features and interface of MySQL Workbench.
ArcSight ESM Version 6.0c Patch 2 release notes provide instructions for installing the patch for multiple ESM components. The patch addresses critical issues, provides geographical and vulnerability updates, and can be installed by running executable files for each component. Detailed steps are outlined for installing the patch on the ESM suite, ArcSight Console, and uninstalling the patch. Issues fixed and known issues remaining in the patch are also documented.
This document provides installation instructions for Oracle WebCenter Sites 11g Release 1 (11.1.1.8.0) and includes the following key points:
- It outlines the installation process and prerequisites for installing WebCenter Sites on Oracle WebLogic Server, Apache Tomcat Server, or IBM WebSphere Application Server.
- It provides instructions for configuring the application server with managed servers, clusters, data sources, and other required settings before installing WebCenter Sites.
- It describes how to integrate the application server with a supported web server like Oracle HTTP Server, Apache HTTP Server, or IIS.
- It contains reference information like paths, directories, and start/stop commands for the application servers
This document provides a reference for the command line programs that are used to interact with Informatica PowerCenter. It includes copyright information for the various software components, a table of contents, and describes how to use the command line programs. The document is published by Informatica and provides technical documentation for administrators of the PowerCenter platform.
This document provides installation instructions for 1KEY Release 2.0.1. It outlines the necessary prerequisites, hardware requirements, and step-by-step procedures for installing various software components on the server and client systems. This includes installing MDAC, Windows Installer, .NET Framework 2.0, SQL Server 2005, 1KEY application, and other utilities. The goal is to guide users through setting up all the required software in the correct order to successfully implement the 1KEY Release 2.0.1 solution.
The document provides instructions for installing and upgrading Oracle Primavera P6 version 7.0 in a stand-alone configuration. It describes downloading required files, preparing for the installation, and outlines the steps to perform a new installation or upgrade from version 5.0, 6.0, or higher. The upgrade process is a multi-step procedure including backing up existing databases, performing intermediate upgrades, and migrating database platforms if desired.
This document provides release notes for Oracle Database Client 12c Release 1 (12.1) for IBM Linux on POWER systems. It certifies support for specific Linux operating system versions and notes that Pro*COBOL is not supported. An issue is also described where Pro*C does not support C99 headers on this platform. The document directs readers to Oracle support and documentation resources.
This document provides instructions to install the Oracle Data Integrator 12c Getting Started Virtual Machine. It describes downloading the Oracle VirtualBox software, extracting the ODI VM archive file, and importing the appliance into VirtualBox. It also outlines how to customize settings, start the VM, and begin the ODI tutorial by accessing the provided guide and starting the ODI Studio program. Credentials and access information for the Oracle database and ODI repository are also listed.
This document provides an overview and instructions for using several Oracle Financials features specific to Latin American countries, including inflation adjustment in Oracle General Ledger, copy and void invoice functionality in Oracle Receivables, and tax calculation using the Latin Tax Engine. Key steps are outlined for setting up and utilizing these regional capabilities to support accounting requirements and business processes common in Latin America.
This release summary provides information on new features and enhancements in ArcSight ESM Version 5.2, including:
- Enhanced reporting capabilities such as distributing reports to multiple recipients and non-ESM users.
- New correlation rules for improved performance.
- Active list enhancements like storing data in time segments.
- Support for managing the asset model within ESM using a new Asset Model Import Connector.
- Updated geographical information and vulnerability mappings.
- Notes on usage considerations like required JRE and Oracle PSU versions.
This document provides instructions for deploying a private Infrastructure as a Service (IaaS) cloud using Red Hat Cloud Foundations components. It describes setting up the necessary infrastructure services including the Red Hat Enterprise Linux, Red Hat Enterprise Virtualization, Red Hat Satellite, and JBoss middleware components. It then outlines the steps to deploy virtualization hosts, provision tenant virtual machines, and configure high availability clustering.
This document provides instructions for installing the driver and Adaptec Storage Manager software for Adaptec Embedded Serial ATA RAID controllers. It discusses installing the driver in new and existing Windows, Linux, and NetWare systems. It also provides steps for installing and starting Adaptec Storage Manager on Windows, Linux, and NetWare to manage storage arrays without having to restart the computer. Key features of Storage Manager like viewing physical and logical devices are also overviewed.
This document provides an implementation guide for Oracle Human Resources Management Systems (HRMS). It describes how to configure HRMS using the Configuration Workbench to define organizational structures and implement functionality for different areas such as compensation, benefits, and payroll. It also outlines implementation steps, technical essays on various HRMS features and processes, and country-specific additional implementation steps.
The SPYRUS Enterprise Management System (“SEMS™”) provides a very strong security and productivity solution for any organization deploying SPYRUS encrypting storage devices and/or our Microsoft certified bootable Windows To Go Drives. While SPYRUS drives provide the strongest Data--at--Rest protection when used by the mobile workforce, organizations are faced with another challenge that is the management, audit and policy enforcement of these high capacity, small form factor devices. SEMS solves that problem.
SEMS was designed to operate on a Windows server ecosystem, on premise, or on Microsoft Azure. It has the ability to scale from proof of concept with a small number of devices, to deployments with tens of thousands of devices under management anywhere on the globe.
SEMS enables an organization to manage their data assets wherever they are used. It provides a central, web-based, easy to use management interface for controlling and monitoring SPYRUS secure hardware. Robust role management for SEMS administrators, permits separation of responsibilities and enforcement of enterprise security policies. Recovery is easily facilitated to protect against data loss and employee downtime. A full set of Audit features allows usage to be tracked and an in-built reporting mechanism allows custom reports to be produced. It provides full transparency of all system and device operations. When things go wrong, the system provides the ultimate assurance that your assets don’t fall into the wrong hands. When things go really wrong, a remote device kill operation renders the data on the device unusable.
SEMS maintains audit records of management activities performed on the SEMS Management Console and activities on managed SPYRUS endpoint devices. It enables central administration and controls device behavior while transparently enforcing policies set by the organization. SEMS has a web based management console to provide operational views through which administrator can maintain control over all deployed devices. SPYRUS has achieved this balance to give the productivity promised by mobility, but with the security supplied by SPYRUS.
This document provides instructions for installing ArcSight ESM version 5.2 Patch 2. It includes steps for updating the ArcSight Database, ArcSight ESM Manager, ArcSight Console, and ArcSight Web Server components. Details are provided for installation on different platforms. The patch addresses critical issues in ESM v5.2 and provides updates to vulnerability mappings. Users should back up each component before installation and refer to release notes for any usage notes or known issues.
Ricoh Assure is a service that monitors devices to prevent IT downtime. It reviews performance metrics, protects devices with antivirus software, and alerts users to potential issues. For a monthly fee per device, Ricoh Assure provides on-demand support from their IT service desk for remote or onsite assistance, as well as anti-virus software. Key benefits include on-demand support, antivirus protection, managed costs where users only pay for issues they want fixed, and convenience through email alerts.
This document provides an agenda and overview for a July 15, 2020 webinar on the Patch Tuesday updates. The webinar will include an overview of the July 2020 Patch Tuesday updates, discussion of vulnerabilities in the news, such as a wormable DNS server vulnerability and publicly disclosed Windows vulnerability, and Q&A. The webinar is hosted by Chris Goettl and Todd Schell and participants can dial in or join online.
Security Guide for Oracle Fusion - E10543aakash2meet
This document provides the security guide for Oracle Business Intelligence Enterprise Edition 11g Release 1 (11.1.1). It discusses authentication, authorization, and the default users, groups, and roles installed. It also describes the tools used to configure security - Oracle WebLogic Server Administration Console, Oracle Fusion Middleware Control, Oracle BI Administration Tool, and the Administration page in Oracle BI Presentation Catalog. Finally, it provides detailed steps for setting up security and managing security using the default configuration.
This document provides a summary of Dell EMC's network virtualization handbook for VMware NSX Enterprise 6.2.x. It describes the components of network virtualization including the network underlay, ESXi hypervisor, vCenter, NSX Manager, NSX controllers, virtual distributed switches, and VXLAN. It then discusses NSX virtual components such as transport zones, replication modes, logical switching, and logical routing. The document provides guidance on getting started with a Dell underlay network design and deploying the NSX virtualization platform before covering vSphere networking, overlay network design, and hardware VTEP configuration.
InnoDB 1.1 is the latest version of the InnoDB storage engine plugin for MySQL 5.5 that provides performance and scalability improvements over previous versions. It includes features from the InnoDB Plugin 1.0 for MySQL 5.1 as well as new features for MySQL 5.5. InnoDB 1.1 supports data compression, fast index creation, and provides additional INFORMATION_SCHEMA tables for monitoring transactions and compression statistics. However, it is not recommended for production use and the generally available version is InnoDB Plugin 1.0.7 and higher.
This document provides instructions for installing Aspect Performance Management 8.1 software. It describes seven installation combinations with different server configurations including single server, split database/application servers, and clustered database and application servers. The document also provides steps for system preparation, database installation, application services installation, post-installation tasks, and repairing or removing the software.
This document provides instructions for administrators on installing and configuring the Druva inSync 5.1 server and client. It covers installing the server on Windows and Linux, performing an express or advanced configuration wizard to set up the server, understanding the dashboard and backup/restore/data loss prevention overview screens. The intended audience is backup and system administrators.
This document provides instructions on installing and launching MySQL Workbench on Windows, Linux, and Mac OS X. It discusses the software's hardware and software requirements, installation procedures for each operating system, and an overview of the main features and interface of MySQL Workbench.
This document provides step-by-step instructions for installing SAP Enterprise Portal 7.0, including prerequisites, installation screenshots, post-installation steps, downloading and deploying business packages, configuring single sign-on, downloading support stacks using Solution Manager, applying Java support stacks, and creating user accounts. The installation involves running SAPinst to install the AS Java, EP Core and EP components, configuring the Oracle database, and completing post-installation configuration such as starting and stopping the system, applying licenses, and more.
This document provides an overview and summary of Oracle's Transparent Data Encryption (TDE) and Data Redaction capabilities. TDE allows encryption of entire tablespaces or specific columns in the database for data at rest, without requiring changes to applications. Data Redaction allows masking of sensitive data for test or development environments using full, partial or random redaction. The document covers how to configure TDE with software or hardware keystores, encrypt columns and tablespaces, and manage encryption keys. It also covers Oracle Data Redaction policies, capabilities for different data types, and integration with other Oracle features like Data Guard.
The document is the Oracle Database Client Installation Guide for Linux which provides instructions on installing Oracle Database Client 12c Release 1 (12.1) on Linux systems. It covers topics such as planning the installation, system requirements, preinstallation tasks, installing Oracle Database Client, and postinstallation tasks. The guide has several appendixes that discuss installing using response files, configuring globalization support, and troubleshooting. It is intended for anyone responsible for installing Oracle Database Client 12cR1.
This white paper provides guidance on deploying Microsoft operating systems to Dell PowerEdge servers. It discusses several deployment methods including the Unified Server Configurator (USC), Dell Systems Build and Update Utility (SBUU), Dell OpenManage Deployment Toolkit (DTK), Microsoft WDS/RIS, and Microsoft Automated Deployment Service (ADS). It also covers manual installation and potential drive lettering issues with newer PowerEdge servers.
Here are the key client requirements for Oracle Demantra:
- Desktop products require at least a 1.3 GHz CPU, 512 MB RAM (1 GB recommended), 500 MB disk space, and a minimum 1280x1024 screen resolution.
- Web-based products have the same minimum requirements.
- The locale generally controls date, time, and number formats.
- Supported browsers for web-based products include recent versions of Internet Explorer, Firefox, Chrome, and Safari on Windows and Mac OS X platforms, with the latest Java version 1.7 or 1.8.
- There may be some limitations when using Apple Mac OS X, so check the documentation.
- The hardware running the client software
This document provides instructions for installing Oracle Application Express release 4.2 for Oracle Database 12c. Key aspects covered include:
- Understanding the multitenant architecture in Oracle Database 12c and how it impacts Application Express installation.
- Choosing between installing Application Express from the database and configuring either Oracle REST Data Services, the embedded PL/SQL Gateway, or Oracle HTTP Server.
- Required pre-installation tasks like checking database requirements and choosing a web listener.
- Post-installation tasks like creating a workspace, adding users, and converting between runtime and development environments.
The document provides instructions for configuring the Windows Server 2012 R2 Base Configuration test lab. It describes installing Windows Server 2012 R2 on DC1 and configuring it as an Active Directory domain controller, DNS server, and DHCP server for the Corpnet subnet. It also describes installing Windows Server 2012 R2 on additional computers APP1 and CLIENT1, configuring their TCP/IP settings, and joining them to the Corp domain. This establishes the basic Corpnet infrastructure to build out additional test labs.
This document provides instructions for installing Oracle WebLogic Server 11g Release 1 (10.3.4). It describes downloading the installer, meeting prerequisites like system requirements and administrator privileges. It explains choosing installation directories and modes. Sections cover running the graphical, console, and silent mode installers, including samples. The document provides post-installation information.
Teradata Tools and Utilities Installation Guide for UNIX and Linux provides instructions for installing Teradata software on UNIX and Linux systems. It supports Teradata Database 13.10 and Teradata Tools and Utilities 13.10. The guide has been updated to include new product installations and platform support. It provides an overview of the installation process and prerequisites for installing the software.
The document is a getting started guide for Trend Micro ServerProtect that provides centralized virus protection for servers. It introduces the main features of ServerProtect, including its architecture of a management console, information server, and normal servers. It also covers installation instructions, virus detection technologies, and managing the software through domains and tasks.
This document provides instructions for installing Oracle Database Client on Windows systems. It discusses installation overview, types of installations, preinstallation tasks, the installation process, and postinstallation tasks. It also covers uninstalling Oracle Database Client and troubleshooting the installation process.
A- LES CONCEPTS
Comprehension du bim.
Travailler dans différentes vues.
Classement et hierarchie des éléments dans Revit.
B-L'ENVIRONNEMENT DE TRAVAIL
Page des fichiers rescents et grand R.
Le ruban.
Fenêtre des propriétés.
Explorateur du projet.
Navigation dans un modèle.(zoom, rotation et panoramique).
Selection des objets, et verouillage.
C-DEMARRAGE D'UN PROJET.
Les gabarits.
Travail collaboratif.
Configuration d'un nouveau projet.
Manipulation des niveaux.
Manipulation des files de projet.
Utilisation des cotes temporaires.
C- MODELISATION PAR OBJETS:
Ajout des murs.
Propriété et type de murs.
Utilisation des accroches.
Ajouts de poteaux et poutres.
Ajout de portes et fenêtres.
Ajout d'élements de plomberie et d'électricité.
Utilisation de la jonction entre murs.
Utilisation des contraintes.
D- LIENS, IMPORTS ET GROUPES:
Lier fichiers DWG/DXF/SKP
Création de topogrpahie d'un site à partir d'un fichier.
Création et gestion des groupes.
Création et gestion des liens Revit.
Utilisation du partage d'emplacement.
E- MODELISATION PAR ESQUISSE:
Sols., toits et plafonds.
Toit par extrusion.
Ouvertures.
F-ESCALIERS.
Edition avancée d'escalier.
Edition avancée de gardes corps.
G- EDITION AVANCEE DES MURS:
Création d'un nouveau type de murs..
Création et gestion des murs empilés.
Création et gestion des murs rideaux.
.
H- GESTION DES GRAPHISMES:
Gestion du style des objets.
Gestion du remplacement de la visibilité et du graphisme des éléments.
Création et application des gabarits de vue.
Cacher et isoler les éléments.
Cadrage de la vue.
Plage de vue et entendues.
Vue isométrique d'une selection.
Option d'affichage des graphismes.
I- PIECES:
Création et gestion des pièces.
J- NOMENCLATURE ET ETIQUETTES:
Gestion des étiquettes.
Création et gestion des nomenclatures.
Modification des nomenclatures.
Enrichissement des VCCTP par les nomenclatures.
K-ANNOTATIONS.
Textes.
Dimensions
Symboles.
Légendes.
Détails.
Définir ses annotations.
L- PARAMETRIQUE ET FAMILLES
Utilisation des paramètres en mode projet.
Concept de famille.
Création d'une famille.
Utilisation des contraintes.
Utilisation des formes solides.
M- FEUILLE, IMPRESSION, PUBLICATION:
Création d'une feuille d'impression.
Export CAO.
Publication.
Impression PDF.
N- TRUCS ET ASTUCES.
A découvrir en formation.
This document is the user guide for Oracle Advanced Pricing, release 12.2. It contains information about price lists and modifiers in Oracle Advanced Pricing. Price lists allow users to define pricing for items, customers or contracts. Modifiers allow pricing adjustments through discounts, surcharges, price breaks or promotional goods. The guide describes how to create, maintain and use price lists and modifiers through the Oracle Advanced Pricing HTML interface. It also contains information on security, components and copying price list or modifier structures.
This document provides an installation guide for Oracle8i Client Release 3 (8.1.7) for Windows, describing the new features, components, system requirements, installation overview and process, configuration tasks, and how to deinstall Oracle components. It is intended for users installing or configuring Oracle8i Client on Windows NT, 2000, 95 or 98 systems and assumes familiarity with those operating systems and database concepts. The guide is organized to walk the user through introduction, preinstallation, installation, post-installation, and deinstallation steps.
TekOTP is a one-time password generator that runs on Windows systems and is based on RFC 2289. It allows users to generate OTPs using MD4, MD5, or SHA-1 algorithms. To install TekOTP, extract its ZIP file contents to a new directory. Once installed, it can be run by executing TekOTP.exe, where users can enter a seed, passphrase, and other settings to generate an OTP that will be copied to the clipboard. Version 1.1 added a command line interface.
TekWiFi is a WiFi connection and diagnostic tool that runs on Windows operating systems. It simplifies connecting to wireless networks that use PEAP authentication. Some key features include listing available wireless networks, displaying connection details, automatically configuring PEAP authentication on the client side, diagnosing connection problems, and changing cipher suite priorities for PEAP/EAP authentication. The software can be run from a downloaded ZIP file without installation and allows configuring connection settings through a GUI.
This document provides an installation and configuration guide for TekSIP Route Server version 1.2. It describes the system requirements, installation process, configuration settings and tabs, routing rules, application logging, starting the service, using SQL mode, and number portability application functionality. Troubleshooting tips are also provided.
SMPPCli is a command line SMPP client for Windows that enables sending SMS messages. It has features like setting connection properties from the command line or .ini file. The system requirements are Windows with 2GB RAM and .NET 2.0. It can be installed by extracting the zip file and run by specifying options like the phone number, server, and message text.
This document provides instructions for installing and configuring Tekaba, a SIP media gateway software. It describes downloading and running the installation file, required system specifications, and how to configure settings like the SIP proxy, listen port, and USB modem ports in the software. Telephony routes and an active call monitor are also explained. The guide aims to help users set up and begin using Tekaba's features which include call forwarding, SMS support via SIP, and NAT traversal capabilities.
TekENUM is a ENUM [The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)] server (Based on RFC 3761) runs under Windows
TekENUM is a ENUM [The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)] server (Based on RFC 3761) runs under Windows
This document provides instructions for installing and configuring TekFax version 1.7 fax server software. It describes system requirements, installing the software, and configuring settings for the TekFax service including SIP accounts and SMTP settings. It also explains how to monitor active calls, define fax recipients, and troubleshoot issues using log files.
TekFax is a SIP fax receiver server that runs on Windows operating systems. It supports receiving faxes over IP networks using T.38 protocol and sending received faxes via email in TIFF format. TekFax uses UDP and TCP for T.38 traffic and supports NAT traversal using UPnP. It provides a simple interface to monitor active calls and configure email recipients for received faxes. TekFax is used to receive incoming faxes from a PSTN network via a VoIP gateway or directly over the Internet if the provider supports T.38.
TekSMTP is an SMTP/POP3 server that runs on Windows systems. It has a graphical user interface for configuration and management. Key features include support for multiple domains, TLS encryption, blacklisting for spam prevention, and password discovery for migrating email accounts. The document provides instructions for installing TekSMTP, configuring settings like ports and certificates, defining user mailboxes, starting the TekSMTP service, and troubleshooting issues.
This document is the installation and configuration guide for AARRPPMMiinneerr Version 2.2. It describes the system requirements, installation process, and provides instructions for configuring the software's settings, NAT, authentication, and accounting features. The guide also covers users, application logging, customizing the login interface, supported RADIUS attributes, troubleshooting, and starting the TekSpot service.
ARPMiner is a captive portal/hotspot software that runs on Windows. It consists of a GUI and service called TekSpot that provides NAT, DNS proxy, and HTTP services. TekSpot allows users to be monitored and authenticated in real-time. ARPMiner supports RADIUS AAA, WISPr, and sends standard RADIUS attributes for authentication, accounting start/stop, and disconnect packets. It has a simple interface for user definitions and monitoring connected users.
This document provides a 3 sentence summary of the installation and configuration guide for TekTape version 2.0:
TekTape is an audio recorder and call detail records generator that runs on Windows and is used to monitor and record SIP calls, with features like real-time call monitoring, recording, CDR generation, and a web-based interface for configuration and management. The guide provides instructions on installing TekTape, configuring settings like packet filtering, audio capturing and TLS decoding, and managing recorded calls, active sessions, and system logs through the web interface. Packet filters use a declarative syntax to select packets for capture based on attributes like source/destination, protocol, port and length.
TekTape - Audio Recorder for SIP CallsYasin KAPLAN
TekTape is an audio recorder and call detail records generator for Windows that provides real-time monitoring of SIP calls on a network. It can record audio conversations in wave or MP3 format and filter recordings based on call details. Recorded files and call detail records can be accessed through TekTape's interface and exported in CSV format. TekTape also decodes TLS with SRTP to record encrypted SIP calls if the server certificate is installed locally.
TekConSer is a SIP conference server that runs on Windows operating systems. It provides features such as simple user interface, ability to select custom waiting messages, support for G.711 audio codecs, NAT traversal using UPnP, ability to monitor and manage active SIP calls, and HTTP server for remote management. The document provides installation and configuration instructions, including setting SIP accounts, conferences, and other server settings. It also covers troubleshooting by examining log files and performance counters.
This document provides an installation and configuration guide for TekIVR version 2.4. TekIVR is an interactive voice response (IVR) system built on SIP that allows users to create custom IVR scenarios through a graphical interface. The guide outlines system requirements, installation instructions, and how to configure settings like SIP accounts, extensions, prompts, and IVR scenarios through the TekIVR manager interface. It also provides examples of typical IVR workflows and call flows that can be created with TekIVR.
TekIVR is an interactive voice response system that provides call attendant functionality using SIP. It allows users to create IVR scenarios using a built-in editor by selecting audio files and text-to-speech. TekIVR supports G.711 codecs, NAT traversal, call transfer methods, and monitoring active SIP calls. It requires Microsoft .NET 4.0 and is compatible with Windows XP through Windows Server 2012.
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...The Third Creative Media
"Navigating Invideo: A Comprehensive Guide" is an essential resource for anyone looking to master Invideo, an AI-powered video creation tool. This guide provides step-by-step instructions, helpful tips, and comparisons with other AI video creators. Whether you're a beginner or an experienced video editor, you'll find valuable insights to enhance your video projects and bring your creative ideas to life.
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...kalichargn70th171
In today's fiercely competitive mobile app market, the role of the QA team is pivotal for continuous improvement and sustained success. Effective testing strategies are essential to navigate the challenges confidently and precisely. Ensuring the perfection of mobile apps before they reach end-users requires thoughtful decisions in the testing plan.
Orca: Nocode Graphical Editor for Container OrchestrationPedro J. Molina
Tool demo on CEDI/SISTEDES/JISBD2024 at A Coruña, Spain. 2024.06.18
"Orca: Nocode Graphical Editor for Container Orchestration"
by Pedro J. Molina PhD. from Metadev
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...Luigi Fugaro
Vector databases are transforming how we handle data, allowing us to search through text, images, and audio by converting them into vectors. Today, we'll dive into the basics of this exciting technology and discuss its potential to revolutionize our next-generation AI applications. We'll examine typical uses for these databases and the essential tools
developers need. Plus, we'll zoom in on the advanced capabilities of vector search and semantic caching in Java, showcasing these through a live demo with Redis libraries. Get ready to see how these powerful tools can change the game!
What is Continuous Testing in DevOps - A Definitive Guide.pdfkalichargn70th171
Once an overlooked aspect, continuous testing has become indispensable for enterprises striving to accelerate application delivery and reduce business impacts. According to a Statista report, 31.3% of global enterprises have embraced continuous integration and deployment within their DevOps, signaling a pervasive trend toward hastening release cycles.
A neural network is a machine learning program, or model, that makes decisions in a manner similar to the human brain, by using processes that mimic the way biological neurons work together to identify phenomena, weigh options and arrive at conclusions.
Voxxed Days Trieste 2024 - Unleashing the Power of Vector Search and Semantic...Luigi Fugaro
Vector databases are redefining data handling, enabling semantic searches across text, images, and audio encoded as vectors.
Redis OM for Java simplifies this innovative approach, making it accessible even for those new to vector data.
This presentation explores the cutting-edge features of vector search and semantic caching in Java, highlighting the Redis OM library through a demonstration application.
Redis OM has evolved to embrace the transformative world of vector database technology, now supporting Redis vector search and seamless integration with OpenAI, Hugging Face, LangChain, and LlamaIndex. This talk highlights the latest advancements in Redis OM, focusing on how it simplifies the complex process of vector indexing, data modeling, and querying for AI-powered applications. We will explore the new capabilities of Redis OM, including intuitive vector search interfaces and semantic caching, which reduce the overhead of large language model (LLM) calls.
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid
IBM watsonx Code Assistant for Z, our latest Generative AI-assisted mainframe application modernization solution. Mainframe (IBM Z) application modernization is a topic that every mainframe client is addressing to various degrees today, driven largely from digital transformation. With generative AI comes the opportunity to reimagine the mainframe application modernization experience. Infusing generative AI will enable speed and trust, help de-risk, and lower total costs associated with heavy-lifting application modernization initiatives. This document provides an overview of the IBM watsonx Code Assistant for Z which uses the power of generative AI to make it easier for developers to selectively modernize COBOL business services while maintaining mainframe qualities of service.
Transforming Product Development using OnePlan To Boost Efficiency and Innova...OnePlan Solutions
Ready to overcome challenges and drive innovation in your organization? Join us in our upcoming webinar where we discuss how to combat resource limitations, scope creep, and the difficulties of aligning your projects with strategic goals. Discover how OnePlan can revolutionize your product development processes, helping your team to innovate faster, manage resources more effectively, and deliver exceptional results.
The Role of DevOps in Digital Transformation.pdfmohitd6
DevOps plays a crucial role in driving digital transformation by fostering a collaborative culture between development and operations teams. This approach enhances the speed and efficiency of software delivery, ensuring quicker deployment of new features and updates. DevOps practices like continuous integration and continuous delivery (CI/CD) streamline workflows, reduce manual errors, and increase the overall reliability of software systems. By leveraging automation and monitoring tools, organizations can improve system stability, enhance customer experiences, and maintain a competitive edge. Ultimately, DevOps is pivotal in enabling businesses to innovate rapidly, respond to market changes, and achieve their digital transformation goals.
Penify - Let AI do the Documentation, you write the Code.KrishnaveniMohan1
Penify automates the software documentation process for Git repositories. Every time a code modification is merged into "main", Penify uses a Large Language Model to generate documentation for the updated code. This automation covers multiple documentation layers, including InCode Documentation, API Documentation, Architectural Documentation, and PR documentation, each designed to improve different aspects of the development process. By taking over the entire documentation process, Penify tackles the common problem of documentation becoming outdated as the code evolves.
https://www.penify.dev/
5. TekRADIUS - Installation & Configuration Guide Version 5.0
5
Introduction
TekRADIUS is a RADIUS AAA server (Based on RFC 2865 and RFC 2866) and runs under
Microsoft Windows (XP/Vista/7/8, 2003/2008/2012 Server) operating systems. Visit
http://www.tekradius.com/ regularly for updates.
The following authentication methods are supported by TekRADIUS:
PAP [RFC 2865]
CHAP [RFC 2865]
MS-CHAP v1 [RFC 2548, RFC 2759]
MS-CHAP v2 [RFC 2548, RFC 2759]
Cisco LEAP
EAP-MD5 [RFC 2284, RFC 2869]
EAP-MS-CHAP v2 [draft-kamath-pppext-eap-mschapv2-02.txt]
EAP-TLS [RFC 2716] , EAP-TTLS [RFC 5281]
EAP-SIM [RFC 4186]
PEAPv0-EAP-MS-CHAP v2 [draft-kamath-pppext-peapv0-00.txt] (As implemented in Windows XP
SP1)
Digest [draft-sterman-aaa-sip-00.txt] (SIP Authentication)
OTP (One Time Password) authentication based RFC 2289.
TekRADIUS also supports RFC 2868 (RADIUS Attributes for Tunnel Protocol Support) and RFC
3079 (Deriving Keys for use with Microsoft Point-to-Point Encryption (MPPE)). PPTP/L2TP
connections may be authenticated and authorized using TekRADIUS. TekRADIUS also supports
TCP (RFC 6613) and TLS (RFC 6614-RadSec) transports. TekRADIUS can proxy RADIUS
requests to other RADIUS servers.
LEAP, EAP-TLS, EAP-SIM and EAP-TTLS are only supported in the commercial edition of
TekRADIUS. You can use only PAP, CHAP, MS-CHAP, MS-CHAP-v2, EAP-MD5 and EAP-
MS-CHAP-v2 as inner authentication methods with EAP-TTLS. Inner authentication methods
supported in PEAP are EAP-MD5 and EAP-MS-CHAP-v2. CHAP authentication can be used
just for local user profiles.
TekRADIUS has a built-in DHCP server that can assign IP addresses to wireless clients based on
the usernames entered for PEAP/EAP authentication and not just based on MAC addresses. The
DHCP server function is available in both the free and commercial editions of TekRADIUS.
IP address assignment based on username is only supported in the commercial edition of
TekRADIUS.
TekRADIUS can send Packet of Disconnect (PoD) or execute a user defined session kill command
when a user’s credit is fully consumed (SP Edition only).
The execution of a user defined session kill command when a user’s credit is fully consumed
is only supported in the SP Edition of TekRADIUS.
7. TekRADIUS - Installation & Configuration Guide Version 5.0
7
Installation
Unzip TekRADIUS.zip or TekRADIUSLT.zip and launch Setup.exe that comes with the
distribution. Follow the instructions of the setup wizard. The setup will install TekRADIUS
Manager and the TekRADIUS Service, and add a shortcut for TekRADIUS Manager to the desktop
and the start menu.
Please uninstall existing version prior to install a new version. You can keep existing
TekRADIUS.ini (Configurations settings) and TekRADIUS.db (Dictionary file) files.
9. TekRADIUS - Installation & Configuration Guide Version 5.0
9
Figure 1 - SQL Connection Settings
Ignore ANSI Warnings:
Large attribute values in accounting packets may cause truncation errors. Check this option to
force SQL Server to ignore these truncation errors.
Use Default Authentication Query:
Uncheck this box to specify an alternative query to select the authentication attributes from
the Users Table to be checked against to the attributes received from the access server.
Authentication Query:
If the Use Def. Authorization Query option is unchecked, enter the alternative query. Always
use AttrType=0 to get check attributes. Query syntax is automatically checked.
By default, to fetch the check attributes from the Users Table, TekRADIUS uses:
Select Attribute, Val from <users_table> where UserName='%ietf|1%' and
AttrType=0
Use Default Authorization Query:
Uncheck this box to specify an alternative query to select the authorization parameters from
the Users Table to be returned to the access server.
Authorization Query:
If the Use Def. Authorization Query option is unchecked, enter the alternative query. Always
use AttrType=1 to get success-reply attributes. Query syntax is automatically checked.
By default, to fetch the success-reply attributes from the Users Table, TekRADIUS uses:
Select Attribute, Val from <users_table> where UserName='% ietf|1%' and
AttrType=1
Delimiter Character:
Specify the delimiter character to be used when entering multiple string-type, reply attributes
in user or group profiles. The default value is a semi-colon “;”.
11. TekRADIUS - Installation & Configuration Guide Version 5.0
11
Figure 2 - Database Tables Configuration
Create Tables / Users Table:
The Users Table contains the user definitions and the check and reply RADIUS attributes for
the users. Uncheck the checkbox if the Users Table is not to be created.
The following SQL clause is automatically executed to create the Users Table:
USE [TekRADIUS]
GO
CREATE TABLE [dbo].[Users](
[UserName] [nchar](64) NOT NULL,
[Attribute] [nchar](16) NULL,
[AttrType] [int] NULL,
[Val] [nchar](64) NULL
) ON [PRIMARY]
GO
CREATE NONCLUSTERED INDEX [IX_Users] ON [dbo].[Users]
([UserName] ASC)
GO
Create Tables / Accounting Table:
The Accounting Table stores RADIUS accounting messages. Uncheck the checkbox if the
Accounting Table is not to be created.
The following SQL clause is executed to create the Accounting Table (Indexes are vital for
high performance!):
USE [TekRADIUS]
GO
CREATE TABLE [dbo].[Accounting](
[SessionID] [nchar](255) NOT NULL,
[StatusType] [nchar](30) NULL,
[InputOcts] [int] NULL CONSTRAINT [DF_Accounting_InputOcts] DEFAULT ((0)),
[OutOcts] [int] NULL CONSTRAINT [DF_Accounting_OutOcts] DEFAULT ((0)),
[UserName] [nchar](128) NULL,
[NasIPAddr] [nchar](15) NULL,
[NasIdentifier] [nchar](255) NULL,
[NasPort] [nchar](40) NULL,
[NasPortId] [nchar](255) NULL,
[NasPortType] [nchar](40) NULL,
[ServiceType] [nchar](40) NULL,
[FramedIPAddr] [nchar](15) NULL,
[CallingStationId] [nchar](64) NULL,
[CalledStationId] [nchar](64) NULL,
13. TekRADIUS - Installation & Configuration Guide Version 5.0
13
Click Create Tables to create the selected tables. If the tables are created successfully, the
message “Table(s) created and connection settings are updated…” will be displayed. The
AttrType field is set to “0” for RADIUS check attributes, “1” for success-reply attributes and
“2” for failure-reply attributes in the Users and Groups tables.
Database Maintenance
The TekRADIUS Database may be shrunk and old accounting records deleted to save space, and a
backup may be taken of the database for disaster recovery purposes.
Shrink Database:
To shrink the TekRADIUS database, click Shrink Database.
Delete accounting records prior to:
Enter a date and time prior to which all accounting records should be deleted and click Delete.
Backup File:
Enter the filename for the database backup and click Backup Database.
The SQL Server service account must have write privilege to selected backup directory.
Figure 3 - Accounting Table Field Selection
Accounting Table
It is possible to define in which field of the Accounting table will store which RADIUS accounting
attribute that are received in RADIUS Accounting messages. Additional accounting fields may be
created and assigned a RADIUS attribute. Existing field/attribute pairs may also be deleted.
The left list-box identifies the Accounting Table field; the right list-box identifies the matching
RADIUS attribute.
To create additional fields:
15. TekRADIUS - Installation & Configuration Guide Version 5.0
15
Service Parameters
Enter the following information to configure service specific parameters:
Figure 5 - Service Parameters Configuration
Listen IP Address:
From the drop-down list, select an IP address for TekRADIUS to listen for incoming
messages. The list contains all IP addresses associated with all enabled network interfaces.
If an IP address, used by TekRADIUS, is removed from the Windows Network configuration,
TekRADIUS will automatically select the first available IPv4 address in the network settings
at startup.
Listen IP Port:
Enter the UDP RADIUS authentication port between 1 - 65535. If no value is entered, the
default port of 1812 will be used.
If the selected port is used by another program, TekRADIUS will disable the RADIUS
Authentication thread and add the following event entry to the Windows Event Log: “Unable
to initialize TekRADIUS Authentication thread”.
TLS Port:
TekRADIUS uses TCP port 2083 for TLS transport by default. Enter the TCP port between 1
- 65535 for TLS transport.
Server Certificate:
Select a certificate for Server Authentication for TLS transport. TekRADIUS lists valid
certificates in Windows Certificate Store / Local Machine. This certificate will also be used
by default for PEAP sessions if you do not set a TLS-Server-Certificate in user or group
profiles.
Transport:
From the drop-down list, select transport. TekRADIUS enables both UDP and TCP transports
17. TekRADIUS - Installation & Configuration Guide Version 5.0
17
Smart Card Reader:
Select Smart Card Reader to read SIM triplets from a SIM card for EAP-SIM authentication.
Keep Domain Name:
Check this option to prevent TekRADIUS from automatically removing characters before a
‘’ character in a User-Name attribute received in access and accounting requests. The default
action is for TekRADIUS to remove all characters before a ‘’ character.
DHCP Server Enabled:
Check this option to enable the TekRADIUS built-in DHCP server. The DHCP server
automatically assigns IP addresses to all wired or wireless devices from pools of IP Addresses
defined Pools in the DHCP tab.
A unique feature of the TekRADIUS DHCP server is that it allows IP addresses to be
assigned to wireless clients based on the usernames entered in PEAP/EAP authentication and
not solely on the client MAC addresses.
The IP address assignment based usernames is available only in commercial editions of
TekRADIUS.
SSCC (Self Signed Certificate Creation):
Check this option to force TekRADIUS to generate a server certificate dynamically for every
PEAP authentication request. If this option is set, it is not necessary to configure a server
certificate using the TLS-Server-Certificate attribute.
Server certificate validation must be disabled when this option is enabled.
This option is only available in the commercial edition of TekRADIUS.
HTTP Interface Enabled | Port:
Check this option to enable the TekRADIUS HTTP interface. Refer to the ‘HTTP Reporting
Interface’ section of this manual for more details.
HTTP Session Timeout:
If the HTTP Interface is enabled, select the timeout before a user session expires. Once an
HTTP session has expired, the user will need to re-logon to gain HTTP access.
Accounting Enabled:
Check this box to enable the collection and processing of accounting packets from RADIUS
clients.
When an Accounting-Checkpoint message is received for a previously unknown session, this
checkpoint message is assumed to be an accounting session start (an entry will also be added
in the Sessions Table).
When an Accounting-Stop message is received for an already stopped session and the
previously received Accounting-Stop of the session has no Acct-Session-Time attribute (Acct-
Session-Time=NULL), the session's stored stop record is updated by the newly received one.
When an Accounting-Off message is received from a RADIUS client, all active sessions with
that RADIUS client will be stopped with Acct-Session-Time=NULL and the session entries
will be cleared in the Sessions Table.
Accounting Port:
Enter the UDP RADIUS accounting port between 1- 65535; if no value is entered, the default
port of 1813 will be used.
19. TekRADIUS - Installation & Configuration Guide Version 5.0
19
Alerting
TekRADIUS can be configured to send e-mail alerts if an error condition occurs for a specified
duration.
Figure 6 - Alerting Configuration
Enter the following information to configure alerting:
Mail Alerting Enabled:
Check this option to enable the Mail Alerting feature.
SMTP Server:
Enter the IP address or FQDN of the SMTP server.
Mail To:
Enter the e-mail address to which alerts are to be sent.
Mail From:
Enter the e-mail address that will be shown as the sender email address.
Authentication Required:
Check this option if the SMTP server requires user authentication.
SMTP Username:
If ‘Authentication Required’ has been checked, enter the SMTP username.
Password:
If ‘Authentication Required’ has been checked, enter the password of the SMTP user.
Error Duration:
Enter the minimum error duration (in seconds) before sending an e-mail alert (Default: 60
seconds).
21. TekRADIUS - Installation & Configuration Guide Version 5.0
21
Username Part:
Enter a regular expression to specify username portion for a received username in User-Name
attribute from this RADIUS client. Start always with (^) and end with ($). TekRADIUS will
take seconds group of regular expression as username. Matching is performed in case
insensitive. Left blank if you do not use this option. Samples;
Regular Expression Input Result
(^.+)([a-z]+)($) Domainuser user
(^)([a-z]+)(@.+$) user@Domain user
Vendor:
Select the vendor of the RADIUS client. If the vendor is not known, or is not listed, select
‘ietf’ as the Vendor.
Enabled:
To temporarily disable a RADIUS client, select ‘No’ from the drop-down list. The default
value is ‘Yes’.
Interim Update Period:
If the RADIUS client supports sending Interim Accounting Messages, the ‘Interim Update
Period’ may be set to force TekRADIUS to clear any associated active sessions and
simultaneous session entries if an update is not received in the period specified. The minimum
allowed value for interim update period is 60 seconds.
Setting interim update period to 0 disables interim update period checking for the selected
RADIUS client. The default setting is ‘0’.
A default RADIUS client entry may be created in version 2.5 onwards to enable TekRADIUS to
accept a RADIUS request from unlisted RADIUS clients with the correct shared key.
A ‘Kill’ command can be defined to drop user sessions through the Active Sessions tab if the host
supports a command line utility to send an appropriate signal to disconnect a particular user session.
The following variables can be used as parameters with the “Kill” command;
$NASIPAddress
$SessID
$UserName
$NasPort
$NasPortId
$Calling-Station-Id
Some NAS devices support SNMP MIBs that can be used to disconnect users. In this case it is
possible to use the command line ‘SNMP set’ utility to disconnect users. Please consult your NAS
documentation to find out whether the NAS supports this function and which MIB to use.
This is an example to clear TTY sessions on a Cisco device:
c:utilsnmpset $NASIPAddress public .1.3.6.1.4.1.9.2.9.10.0 integer $NasPort
It is possible to also use other types of utilities that are supported by your access server.
23. TekRADIUS - Installation & Configuration Guide Version 5.0
23
If a group is deleted, the Users associated with that group are moved automatically to the
Default group.
To search for a particular group:
1. Enter the first letters of the group name in the Browse Groups window (if the search box is
left blank, all groups will be retrieved),
2. Click the Search icon.
Matching group names will be listed in the group list box. It is also possible to search for a specific
attribute and its value in the group profiles.
Check and reply attributes may be added or deleted for a user Group.
To add an attributes to a Group:
1. Select the required attribute from the entry fields,
2. Click the Add/Update icon.
To delete an existing attribute from a Group:
1. Select the Group and attribute,
2. Click the Delete icon.
Attribute:
1. Select the attribute type (Check or Reply) from the first dropdown list,
2. Select the attribute name from the second dropdown list,
3. Select the attribute value from the third dropdown list or manually type in the value as
appropriate.
To restrict access to unauthenticated users, add Failure-Reply attributes to the user or group
profiles. TekRADIUS will reply with an Access-Accept message containing the Failure-Reply
attributes if that User or Group profile has Failure-Reply attributes defined when the authentication
fails; if the User or Group profile does not have any Failure-Reply attributes, TekRADIUS will
reply with an Access-Reject message.
This feature is not available for PEAP authentication, VPN authentication or when the
authentication failure is caused by an invalid authentication method.
Use this feature with extreme care. If the Default user group has Failure-Reply attributes, all
failed authentication attempts will be replied with Access-Reject messages containing the
Failure-Reply attributes. When a user is authorized with Failure-Reply, TekRADIUS will NOT
check the Simultaneous-Use, Simultaneous-Group-Use, Expire-Date, Login-Time,
TekRADIUS-Status nor Quota parameters.
To send Failure-Reply attributes in an Access-Accept message, add the Failure-Reply-Type
attribute as a check attribute to the user or group profile with value of ‘Accept’.
Check items will be listed in dark red, success-reply items will be listed in dark blue and failure-
reply items will be listed in turquoise.
25. TekRADIUS - Installation & Configuration Guide Version 5.0
25
3. Click the Add icon.
Follow the instruction in the ‘Groups’ section above for instructions on how to search for, modify
or delete Users.
The User-Password attribute is stored encrypted in the Users and Groups tables.
A default User profile may be defined and will be used when an incoming RADIUS authentication
request does not match any of the existing User profiles. If Windows Authentication Proxy (WAP)
or Active Directory Proxy (ADP) is enabled, TekRADIUS will try to authenticate the user against
WAP and then ADP, and finally, if a ‘Default’ User profile exists, it will be checked against the
‘Default’ User profile. Simultaneous-Use, User-Credit, Credit-Unit, First-Logon, Credit-Period,
Credit-Per-Period attributes have no function in the ‘Default’ User profile. The username ‘Default’
is reserved for the default User profile.
Attributes defined in User profiles have precedence over those defined in Group profiles. If the
same attributes are defined in both a User and associated Group profile, the attribute in the User
profile will be preferred. Only one instance of an attribute in check or reply attributes can be used.
Click Import SIM Triplets button to import SIM triplets from the SIM card inserted in the smart
card reader. The use of a smart card reader can be selected through Settings / Service Parameters.
Dictionary Editor
RADIUS dictionary entries can be edited using the Dictionary Editor tab. RADIUS dictionary
entries (Vendors, Attributes and Values) and client definitions are stored in TekRADIUS.db, which
can be found in the application directory.
Figure 10 - Dictionary Editor
The Dictionary consists of Vendors, Attributes and Values tables. If a valid entry for a vendor could
not be found because a vendor or an attribute has been deleted or disabled, VSAs from that vendor
27. TekRADIUS - Installation & Configuration Guide Version 5.0
27
Reporting
TekRADIUS provides a simple interface for browsing RADIUS Accounting records stored in the
Accounting table, and accessed via the Reporting tab. Reports can be generated for a selected User,
or all users in a Group, for a specified interval of dates.
Figure 5 - Reporting Tab
To select a User or Group, enter the first letters of the User name or Group name and click the List
button. If the Query parameter box is left blank, all users in the TekRADIUS database will be listed
if ‘User’ has been selected; and all groups will be listed if ‘Group’ has been selected.
Dates when accounting events occurred may be optionally selected. If no dates are specified, all
session entries will be listed for the selected User(s). Click the Report icon to list the accounting
entries. The results may be printed or saved as a CSV file.
TekRADIUS generates a user list from the Accounting table. You may not see all users listed when
you select “All Users” since some users may not have accounting events in the Accounting table.
29. TekRADIUS - Installation & Configuration Guide Version 5.0
29
Figure 7 - DHCP Profile based on MAC Address
The commercial edition of TekRADIUS allows DHCP options to be added to the user profile.
Figure 8 - User Profile with DHCP Options
31. TekRADIUS - Installation & Configuration Guide Version 5.0
31
Assigned IP addresses can be viewed in the Active Leases section. If static IP addresses are
assigned to EAP authenticated users through DHCP, it is also possible to monitor the IP address
reservations in the Active Reservations section.
33. TekRADIUS - Installation & Configuration Guide Version 5.0
33
Monitoring
Application Log entries added by TekRADIUS may be viewed in the Application Log tab. If the
‘Enable Auto Refresh’ option is checked, the list will be automatically refreshed; otherwise the log
can be manually refreshed by clicking the Refresh Log button. All log entries can be deleted by
clicking the Clear Log button. It is necessary to have Administrative privileges to read from, and
write to, the event log in Microsoft Vista.
Figure 10 - Application Log Tab
Active sessions can be monitored from the Active Sessions tab; this list is not refreshed
automatically. To refresh the list, click the Refresh button or set a refresh period in seconds. There
are additional hidden information columns that can be revealed by checking the ‘Show Detail’
option in context menu accessible when you right click on active session list.
TekRADIUS automatically clears all entries in the Sessions table when the TekRADIUS
service is restarted.
35. TekRADIUS - Installation & Configuration Guide Version 5.0
35
TekRADIUS Specific Attributes (RADIUS Check Items)
TekRADIUS provides a number of special attributes; their names and functions are described
below. These attributes can be added to User or Group profiles only as check attributes. These
attributes are listed under vendor KaplanSoft in the dictionary editor.
TekRADIUS-Status
TekRADIUS will reject authentication requests if the TekRADIUS-Status attribute is set to
‘Disabled’ in User or Group profiles. If this attribute does not exist in the User or Group profile,
TekRADIUS will assume that the User or Group is enabled. NOTE: A user attempting
authentication will receive failure-reply if the User profile has Failure-Reply attributes when the
user profile was disabled.
Simultaneous-Use
In order to use the Simultaneous-Use attribute, Accounting must be enabled on TekRADIUS,
otherwise users with the Simultaneous-Use attribute set will receive an Access-Reject. This feature
will not function if the RADIUS client sends only RADIUS Accounting-Stop packets (most
RADIUS clients only support accounting stop-only mode).
In order to set a simultaneous session limit for a user, add the Simultaneous-Use attribute as a
Check attribute in the User profile. If this attribute is added to a Group profile, the number of total
sessions for a group can be limited. TekRADIUS first checks if a Group’s limit, specified with
Simultaneous-Group-Use attribute in the user’s group profile, has been reached and then checks the
individual User’s limit.
Simultaneous-Group-Use
In order to use the Simultaneous-Group-Use attribute, Accounting must be enabled on
TekRADIUS, otherwise users with the Simultaneous-Group-Use attribute set will receive an
Access-Reject. This feature will not function if the RADIUS client sends only RADIUS Accounting-
Stop packets (most RADIUS clients only support accounting stop-only mode).
In order to set a simultaneous session limit for a group, add the Simultaneous-Group-Use attribute
as a Check attribute in the Group profile. TekRADIUS first checks if a Group’s limit has been
reached and then checks the individual User’s limit.
Expire-Date
An Expire-Date parameter can be specified in User or Group profiles to disallow logins after the
specified date for a User or Group of users. Add the Expire-Date as a check item in a User or Group
profiles. When Expire-Date is added as a check item to the User profile, TekRADIUS will
automatically add the Session-Timeout attribute, with remaining time in seconds, as a reply-item to
an authorization response. You need use T character in place of space between date and time when
you add this attribute using TRCLI (12.03.2013T23:30 e.g., you can use date format based on your
locale settings). TekRADIUS keeps date values as an integer value representing seconds since July,
1st
1970 in the database.
37. TekRADIUS - Installation & Configuration Guide Version 5.0
37
1. Activate AD Proxy (or Windows Auth. Proxy on a domain-connected server) in Settings /
Service Parameters. A local User profile is not necessary in this case.
2. With a local User or Group profile, add Authentication-Method = Active-Directory and
Directory-Server = <AD Server>. If TekRADIUS is installed on a domain-member server,
add Authentication-Method = Windows.
One-Time Password Authentication
Commercial editions of TekRADIUS Supports OTP (One Time Password) authentication based
RFC 2289. To use OTP authentication, the Authentication-Method attribute needs to be added to
User or Group profiles with one of following values: OTP-MD4, OTP-MD5 or OTP-SHA1. The
initial value of User-Password must be calculated using an OTP password generator. A suitable
OTP password generator is TekOTP (http://www.tekotp.com/). See below for an example of
TekOTP OTP generation:
Figure 12 - TekOTP
Note: the initial password must be generated by unchecking the ‘Six Words Output’ option. It is
necessary to use the six words form of OTP when implementing CHAP or MS-CHAP-v1/v2.
TLS-Server-Certificate (TLS-Certificate prior to version 4.0)
The TLS-Server-Certificate holds the server certificate name that has been configured for PEAP or
EAP-TLS sessions. When TekRADIUS receives a PEAP or EAP-TLS authentication request, the
User profile is first searched for a TLS-Server-Certificate attribute, if it is not found then the Group
profile is searched. If TekRADIUS cannot find the TLS-Server-Certificate in the User or Group
profiles, then PEAP or EAP-TLS authentication requests will be rejected.
Server Certificates must be installed with their private keys in the Windows Certificate Store.
Please make sure that you have set Private Key Exportable option while importing a 3rd
party
certificate to Windows Certificate store / Local Machine. See the section ‘Creating and Installing a
Self-Signed Certificate for PEAP/EAP-TLS Authentication’ in this manual for information about
installing certificates. TekRADIUS distinguishes certificates using the CN property of the Subject
field of the certificates.
TLS-Client-Certificate
The TLS-Client-Certificate holds the client certificate name that has been configured for EAP-TLS
sessions. When TekRADIUS receives an EAP-TLS authentication request, the received certificate
39. TekRADIUS - Installation & Configuration Guide Version 5.0
39
Time-Limit
If the Time-Limit check-attribute is added to a User or Group profile, TekRADIUS will check if the
specified duration (Minutes) has elapsed since the first logon, specified using the First-Logon
attribute. If the First-Logon attribute is not found, TekRADIUS assumes that the current login
attempt is the first login attempt and then adds the First-Login attribute to the User profile as a
check attribute with the current date and time as its value. Add Time-Limit = 43200 (Check) for one
month period to user or group profile.
Time-Limit is an integer type attribute and can exist as a check attribute in user or group profiles.
If the allowed total session time is set using the Session-Timeout attribute and the remaining
time for the allowed time span for the user is less than Session-Timeout value, TekRADIUS
will set the Session-Timeout value to the remaining time for the allowed period.
First-Logon
The First-Logon attribute is automatically added to user profiles at the first login attempt by
TekRADIUS if the User or Group profile has a Time-Limit attribute. This attribute can be manually
updated using TekRADIUS Manager or trcli.exe.
First-Logon is a string type attribute and can exist as a check attribute only in user profiles.
Login-Time
The allowed login days and hours can be limited for a user by adding Login-Time as a check
attribute to the User or Group profile. When this attribute is added to a User or Group profile, the
default action will be to reject the access request if the authentication request is not received within
the defined time period. The syntax of the Login-Time attribute is:
[Su|Mo|Tu|We|Th|Fr|Sa|Wk|Hd|Al]<Begin Hour>-<End Hour>
Where:
Wk : Weekdays (Monday to Friday)
Hd : Weekend (Saturday and Sunday)
Al : All days of the week (Sunday to Saturday)
Hours must be in 24-hour format (e.g., 22:55). Several periods may be defined by concatenating the
periods with commas ‘,’. Every period is processed individually; ‘Tu11:00-12:00, Tu12:00-14:00’
is not interpreted as ‘Tu:11:00-14:00’. Longer periods are preferred over shorter periods when
overlapping periods are defined. If ‘Tu12:00-14:00, Al13:00-17:00’ have been defined,
TekRADIUS will prefer ‘Al13:00-17:00’ on Tuesdays at 13:30.
Examples:
1. Wk09:00-18:00, Hd12:00-16:00 will allow logins from 09:00 to 18:00 during weekdays
and from 12:00 to 16:00 at weekends.
2. Mo10:00-23:50, We10:00-23:50, Hd11:00-17:00 will allow logins from 10:00 to 23:50 on
Monday and Wednesday, and from 11:00 to 17:00 at weekends.
3. Al09:00-18:00, Fr08:00-19:00 will allow logins from 09:00 to 18:00 for all days except
Friday; logins are allowed from 08:00 to 19:00 on Fridays.
41. TekRADIUS - Installation & Configuration Guide Version 5.0
41
The default behavior of TekRADIUS if this attribute does not exist in a User or Group profile and
Failure-Reply attributes are configured is be to send Failure-Reply attributes in an Access-Reject
message. Add FailonPasswordFailure=1 parameter under [Server] section of TekRADIUS.ini in
order to send Failure-Reply attributes in an Access-Reject message when user entered password is
not valid.
Failure-Reply-Type is an integer type attribute and can exist only as a check attribute in user or
group profiles.
Tunnel-Tag
The Tunnel-Tag attribute is used as a check attribute in User or Group profiles. This attribute sets
the tag values of tunnel attributes (Tunnel-Type, Tunnel-Medium-Type, Tunnel-Client-Endpoint,
Tunnel-Server-Endpoint, Tunnel-Password, Tunnel-Private-Group-ID, Tunnel-Assignment-ID,
Tunnel-Preference, Tunnel-Client-Auth-ID and Tunnel-Server-Auth-ID) that is sent in RADIUS
replies.
If this attribute does not exist in a User or Group profile, TekRADIUS assumes a tag value of 1.
This attribute can have a value between 0-15 inclusive.
Tunnel-Tag is an integer type attribute and can exist only as a check attribute in user or group
profiles.
Credit-Period
The Credit-Period attribute is used as a check attribute to User or Group profiles. This attribute
specifies a time-duration for user credit. For example, it is possible to assign users daily, weekly or
monthly time credits by adding the Credit-Period attribute to User or Group profiles. This attribute
must be used in conjunction with the Credit-Per-Period and User-Credit attributes.
Credit-Period is an integer type attribute and can exist only as a check attribute in user or group
profiles.
Credit-Per-Period
The Credit-Per-Period attribute is used as a check attribute in User or Group profiles and is used to
set a credit-limit for the period specified by the Credit-Period attribute.
If neither a User nor Group profile has a Credit-Period attribute, the default period will be ‘Daily’.
This attribute must be used in conjunction with the User-Credit attribute.
If this attribute is added to a User or Group profile, the First-Logon attribute will be automatically
added to the User profile after user’s first successful logon. Period end and start times are calculated
based on First-Logon date/time. TekRADIUS will set the value of the User-Credit attribute to the
value defined in the Credit-Per-Period attribute after every Credit-Period expiry.
Sample User profile:
User has 2 hours credit per day;
User-Credit = 7200 (Check)
Credit-Unit = Seconds (Check)
Credit-Period = Daily (Check)
Credit-Per-Period = 7200 (Check)
43. TekRADIUS - Installation & Configuration Guide Version 5.0
43
EAP-SIM-Triplet-[1|2|3]
TekRADIUS stores SIM triplets in EAP-SIM-Triplet attributes for EAP-SIM authentication in the
following format:
0x<Hexadecimal encoded 16 Byte RAND string><Hexadecimal encoded 4
Bytes SRES string><Hexadecimal encoded 8 Bytes Kc string>
Example:
0xF926A7CDE05A44A8B749204E6F8DBB51F51440E587F4A6CD5A02B07A
The bolded section denotes the SRES portion.
These attributes are automatically inserted to a User profile when the Import SIM triplets button
in Users tab is clicked. It is also possible to manually enter these attributes into a User profile.
EAP-SIM-Triplet attributes are string type attributes and can exist only as a check attributes in User
or Group profiles.
HTTP-Access-Level
The HTTP-Access-Level attribute is used as a check attribute in User or Group profiles. This
attribute specifies user’s access level to the TekRADIUS HTTP interface.
By default all users have access to the TekRADIUS HTTP interface with user-level privilege,
enabling them to view their own usage statistics. Admin rights can be granted to a User or Group
profile by adding HTTP-Access-Level = Admin as a check attribute. Admin users can generate
reports for all User and Group profiles.
HTTP-Access-Level is an integer type attribute and can exist as a check attribute in User or Group
profiles.
HTTP-User-Name & HTTP-User-Password
If a User profile does not have a User-Password configured, HTTP-User-Name and HTTP-User-
Password attributes can be added as check attributes to the user profile to enable access to the
HTTP reporting interface. The HTTP-User-Password attribute must be added to the user profile if
the HTTP-User-Name attribute is used.
HTTP-User-Name and HTTP-User-Password attributes are string type attribute and can exist as
check attributes only in User profiles.
Password-Limit
You can apply password aging by adding Password-Limit attribute as a check attribute to user or
group profiles. Password-Limit is specified by in minutes. TekRADIUS can request a new
password if you implement MS-CHAP authentication methods in your RADIUS clients when
password age is expired. TekRADIUS will add Password-Reset attribute to the user profile after a
successful password change operation.
Password-Limit attribute is integer type attribute and can exist as check attributes in User or Group
profiles.
45. TekRADIUS - Installation & Configuration Guide Version 5.0
45
Data Volume Based Authorization
The RADIUS protocol provides a standard way to instruct access servers or Network Access
Servers (NAS) to limit the maximum session time for an authorized user by the Session-Timeout
parameter. Unfortunately, the RADIUS protocol does not provide a standard way to instruct the
NAS to restrict the session based on a maximum amount of data that can be uploaded or
downloaded; however, some vendors provide Vendor Specific Attributes (VSA) for this purpose:
Mikrotik
Mikrotik-Recv-Limit, 32 bit value of number of allowed input octets.
Mikrotik-Xmit-Limit, 32 bit value of number of allowed output octets.
Mikrotik-Total-Limit, 32 bit value of number of allowed total octets.
Nomadix
Nomadix-MaxBytesUp, 32 bit value of number of allowed input octets.
Nomadix-MaxBytesDown, 32 bit value of number of allowed output octets.
Chillispot
ChilliSpot-Max-Input-Octets, 32 bit value of number of allowed input octets.
ChilliSpot-Max-Output-Octets, 32 bit value of number of allowed output octets.
ChilliSpot-Max-Total-Octets, 32 bit value of number of allowed total octets.
Colubris
Colubris-AVPAIR=max-input-octets=<32 bit value of number of allowed input octets>
Colubris-AVPAIR=max-output-octets=<32 bit value of number of allowed output octets>
TekRADIUS uses the User-Credit attribute to store user quotas, which can be set using the Credit-
Unit attribute. The Credit-Unit attribute can have following values:
Seconds
Minutes
Bytes-in
KBytes-in
MBytes-in
Bytes-out
KBytes-out
MBytes-out
Bytes-sum
KBytes-sum
MBytes-sum
If the User-Credit attribute exists in a User profile and is set to a value other than Seconds or
Minutes, TekRADIUS will add following attributes to the Success-Reply message depending on the
vendor of the NAS.
47. TekRADIUS - Installation & Configuration Guide Version 5.0
47
Change of Authorization Support for Disconnecting User Sessions
You can disconnect user sessions by sending a Disconnect Message as described in RFC 5176
(RFC 3756). Disconnect Message, DM (a.k.a Packet of Disconnect or PoD), is a special form
Change of Authorization packet but its special purpose is to disconnect a user session.
You can disconnect user sessions through Active Sessions tab. You can select sessions to be
disconnected and click “Disconnect” button. TekRADIUS will send a PoD packet to the NAS.
Attributes in a PoD packet are selected based on vendor specified for the NAS in Clients tab. Here
is list of attributes sent in PoD packets based on vendors;
Generic (IETF)
User-Name
NAS-Port
Acct-Session-Id
Framed-IP-Address
Called-Station-Id
Calling-Station-Id
NAS-Port-Id
Cisco-AVPair = audit-session-id
Cisco
Acct-Session-Id
Framed-IP-Address
Service-Type = Login
Mikrotik
Acct-Session-Id
Framed-IP-Address
NAS-IP-Address
Attributes received in Accounting-Start packets will be added to PoD packets (Only exception is
Service-Type attribute in Cisco PoDs). Try IETF, if you experience problems when you select
Cisco as then vendor.
TekRADIUS SP edition can send a PoD packets when user consumes all credit specified in the user
profile. This can be set by adding Credit-Expiry-Action = Send-POD as a check attribute to user or
group profile. RADIUS interim accounting must be enabled in the NAS device in order this feature
works.