Lucent Technologies 6000 User Manual

Page of 586
2-8
MAX 6000/3000 Network Configuration Guide
Configuration Concepts and Profiles
MAX profiles
4
Select 1 to load the profile.
Profile loaded as current profile
 appears. 
The newly activated profile reappears.
Saving a profile
When you exit a profile after changing any of the settings, you are prompted to accept or 
discard the changes. You must select the accept option if you want to retain the new settings. 
For example, to create a new Line Config profile, complete each of the following steps:
1
Open Net/T1 > Line Config and select an unconfigured profile.
2
Press the Right Arrow key and enter a descriptive name as the setting for the Name 
parameter.
3
Continue setting the parameters that are relevant for your environment.
4
When you have set all the relevant parameters, press the Back Arrow key to exit the 
profile. The following message appears:
EXIT?
0=ESC (Don’t exit)
1=Exit and discard
2=Exit and accept
5
Select the number that reflects the action you want to take.
Using RADIUS
You can use RADIUS to externally authenticate connections answered by the MAX unit. 
External authentication centralizes the management of WAN connections, and concentrates 
user profiles into a single text file. The use of RADIUS also enables token-card authentication 
for secure networks, or authentication based on a UNIX password database. For details about 
obtaining and installing the Ascend RADIUS daemon and dictionary, and for a sample users 
file, see the TAOS RADIUS Guide and Reference.
RADIUS profiles are composed of three parts:
User-Name Check-Items
          Reply-Items
The User-Name must be left justified. It is typically the name of the caller (or calling device), 
but it may also be a phone number (for CLID or DNIS authentication), a special string 
indicating a pseudo-user profile, or the string DEFAULT (for the default user profile). For 
details about pseudo-user profiles, see the TAOS RADIUS Guide and Reference.
Check-Items must be on the same line as the User-Name, and must be separated by white 
space (space or tab) from the User-Name. Check-Items includes zero or more attribute-value 
pairs that must match the attributes that are present in the Access-Request for the user to be 
authenticated. Check-Items typically include the password for the entry.
Reply-Items must be indented and separated from the User-Name and Check-Items by a 
newline. (If a Reply-Item is not indented, it is interpreted as the User-Name of a new entry.) 
Reply-Items includes zero or more attribute-value pairs that are returned in Access-Accept 
messages to authorize services for the user.