All rights reserved. Printed in the USA. December 1996.
The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, b ut are presented without express or implied
warranty. Users must take full responsibility for their applications of any products specified in this document. The
information in this document is proprietary to Bay Networks, Inc.
The software described in this document is furnished under a license agreement and may only be used in accordance with
the terms of that license.
Restricted Rights Legend
Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notice for All Other Executive Agencies
Notwithstanding any other license agreement that may pertain to, or accompany the deli very of, this computer softw are,
the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the Commercial
Computer Software-Restricted Rights clause at FAR 52.227-19.
Trademarks of Bay Networks, Inc.
Annex, Remote Annex, Annex Manager , Remote Annex 2000, Remote Annex 4000, Remote Anne x 6100, Remote Annex
6300, Remote Annex 5390/Async, Remote Annex 5391/CT1, Remote Annex 5393/PRI, BayStack Remote Anne x 2000
Server,Quick2Config, Bay Networks, Bay Networks Press, and the Bay Networks logo are trademarks of Bay Networks,
Inc.
Third Party Trademarks
All other trademarks and registered trademarks are the property of their respective owners.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability , Bay Netw orks, Inc. reserves the right
to make changes to the products described in this document without notice.
Bay Networks, Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit
layout(s) described herein.
In addition, the program and information contained herein are licensed only pursuant to a license agreement that contains
restrictions on use and disclosure (that may incorporate by reference certain limitations and notices imposed by third
parties).
Remote Annex Server Tools for Windows NT® User Guide
Preface
Remote Annex Server Tools for Windows NT
configure, and manage Remote Annexes on a W indows NT
performs user authentication and authorization from a Windows NT
network and supports:
•Remote Annex 2000
•Remote Annex 4000
•Remote Annex 6100 and 6300
•5390, 5391, 5393
•MicroCS
•Cabletron CSMIMII
•3COM 6133C-XS
•3COM 6117C-XS
TheRemote Annex Server T ools
for System Administrators or others who need to configure Remote
Annex servers. It assumes that you are familiar with network protocols
and that you know the parameter values you need to configure Remote
Annexes.
for Windows NT
®
allows you to boot,
®
network. It
®
User Guide is intended
®
This guide is part of the complete Remote Annex documentation
set. You should refer to other manuals in the set for information
not related to Remote Annex Server Tools for Windows NT
®
Remote Annex Server Tools for Windows NT
User Guide
®
.
v
Preface
About this Book
This book documents Remote Annex Server Tools for W indo ws NT®. It
explains the product’ s features and provides instructions for each of those
features.
The Remote Annex Server Tools
the following chapters:
•Chapter 1
Annex Server Tools
, Introduction, provides an overview of Remote
for Windows NT
customers who are migrating to the
environment, this chapter compares and contrasts several
features and behaviors that were ported from UNIX. In
addition, this chapter lists minimum system requirements.
•Chapter 2,
®
NT
Server security options and tells you how to set
Selecting ServerTools Options, describes Windows
Remote Annex security parameters.
•Chapter 3,
Understanding Erpcd, discusses the role of the
expedited remote procedure call daemon (erpcd). Erpcd is
a Remote Annex software sub-system that receives and
responds to all Remote Annex boot, dump, and ACP
security requests.
•Chapter 4,
Using Security Features, discusses Windows NT
Server security and host-based network security.
for Windows NT
®
features. For existing
Windows NT
®
User Guide includes
®
®
•Appendix A, Browsing for Resources on a Microsoft
•The Index gives you detailed page references for the entire
vi
Remote Annex Server Tools for Windows NT® User Guide
Network, describes Microsoft client setup for locating
resources on a Microsoft network.
Remote Annex Server Tools for Windows NT® User Guide.
Documentation Conventions
Preface
The following table lists the Remote Annex Server Tools for Windows NT
User Guide conventions:
Convention:Represents:
Italicschapter titles, book titles, and chapter headings.
special type
boldcommands, path names, program names, or file
▼
defines samples in the na utility.
names.
one-step procedures.
important information.
conditions that can have adverse effects on
processing.
dangerous conditions.
®
Remote Annex Server Tools for Windows NT® User Guide
vii
Preface
viii
Remote Annex Server Tools for Windows NT® User Guide
Chapter 1
Introduction
Remote Annex Server Tools for Windows NT
and configure Remote Annexes on a Windows NT
manage one or more Remote Annexes using the na utility. In addition,
the product takes advantage of Windows NT
and authorize users.
NA Utility Features
The na utility is a command-line interface that lets you monitor and
modify Remote Annex operating characteristics. It allows you to:
•Boot a Remote Annex.
•Reset a Remote Annex.
•Identify a Remote Annex by its Internet address or host
•Show and set values for all Remote Annex configuration
name.
parameters.
®
allows you to boot
®
network. You can
®
domains to authenticate
•Save current configuration parameter settings into script
files.
•Copy the current parameter settings from one port to
another or from one Remote Annex to another.
•Create new site defaults.
®
Remote Annex Server Tools for Windows NT
User Guide
1-1
Chapter 1 Introduction
Windows NT® Server Access Security Features
Remote Annex Server Tools for Windows NT® works with a Windows
®
Server to provide access security . You define user and group access
NT
®
parameters in Windows NT
with the Remote Annex through the Server Tools Options graphical user
interface.
Remote Annex Server Tools for Windows NT
standard Remote Annex log file, a RADIUS server log file, and/or the
®
Windows NT
Event Log.
and link the appropriate group definitions
®
allows you to view the
Using Remote Annex Documentation
In addition to this manual, you need theRemote Annex Administrator’s Guide
for UNIX and the Remote Annex 6300 Supplement to the Remote Annex
Administrator’s Guide for UNIX . These guides provide reference,
procedure, and feature descriptions for the Remote Annexes in a UNIX
environment.
Be aware that minor differences exist between Windows NT
erpcd and UNIX-based erpcd. This section lists these issues and guides
you to the appropriate manuals.
User Authentication Issues
Remote Annex Server Tools for Windows NT® takes full advantage of
®
Windows NT
remote dial-in events trigger security services from Windows for NT
For information about Remote Annex Server Tools Windows NT
authentication, see
server user authentication and authorization. Logon and
Chapter 2, Chapter 4, and Chapter 4.
®
-based
®
®
user
.
1-2
Remote Annex Server Tools for Windows NT®User Guide
Chapter 1 Introduction
Name Server Issues
Remote Annex Server Tools for Windows NT® supports DNS and IEN-
®
116 name servers. W e do not ship IEN-116 for W indows NT
information, see the
Remote Annex Administrator’ s Guide for UNIX.Be aware
. For more
that IEN-116 discussions do not apply to Remote Annex Server T ools for
®
Windows NT
.
Logging Issues
In addition to the standard Annex log destinations, you can configure
®
Remote Annex Server Tools for Windows NT
®
log messages to the Windo ws NT
Event Log. See Chapter 3 for details.
For additional logging information, you can refer to numerous chapters
in the
6300 Supplement to the Remote Annex Administrator’s Guide for UNIX.
Remote Annex Administrator’s Guide for UNIX and the Remote Annex
to send Syslog and ACP
Documentation Exceptions
Some information in theRemote Annex Administrator’ s Guide for UNIX does
®
not apply to Remote Annex Server Tools for Windows NT
®
to innate differences between Windows NT
and UNIX environments.
In addition, certain UNIX-based Annex features are not implemented in
®
Remote Annex Server Tools for Windows NT
. You can use this table
as a guide to documentation that does not apply to Remote Annex Server
®
Tools for Windows NT
.
, due in part
Remote Annex Server Tools for Windows NT®User Guide
1-3
Chapter 1 Introduction
Book/Chapter Topic
A /1UNIX Host-Originated Connections
A /2Using the Terminal Server TTY (TSTTY)
Using the Transport Multiplexing (TMux) Protocol
A /4Terminal Server TTY
How TSTTY Interacts with Annex Port Parameters
Configuring the Annex for TSTTY
Transport Multiplexing Protocol (TMux)
tip and uucp
getty
A /13Printing from a BSD Host using aprint or rtelnet
Printing from a System V Host using aprint or rtelnet
A /14Installing Software Using bfs
IEN-116 Name Server
Setting Up a Host for 4.3BSD Syslogging
A /15Configuring the acp_regime file
Creating User Password Files
Limiting Access to Hosts via acp_restrict
Overview of Password History and Aging
Enabling and Configuring Password Histories
Overview of Blacklisting
Viewing and Managing the acp_dbm Database
Security for NDP Ports
Using Kerberos Authentication
Using the ACE Server
Using SafeWord AS Security
Modifying the Supplied Security Application
Using the ch_password Utility
(continued on next page)
1-4
Remote Annex Server Tools for Windows NT®User Guide
Book/Chapter Topic
B /2TMux-Specific Annex Parameters vs. MIB Objects
C /4aprint
Platform Requirements
Remote Annex Server Tools for Windows NT® requires:
•Windows NT® Server version 3.51 or 4.0 configured to
support the TCP/IP protocol.
•Administrative privileges on the server.
Chapter 1 Introduction
rtelnet
•10 MB free disk space on an NTFS drive.
•One
Windows NT
®
Server client license per Annex.
•A PC with an Intel 486 (or higher) CPU, or any fully
compatible CPU.
•32 MB RAM.
•CD ROM drive to install the product.
Remote Annex Server Tools for Windows NT®User Guide
1-5
Chapter 1 Introduction
1-6
Remote Annex Server Tools for Windows NT®User Guide
Chapter 2
Selecting Server Tools Options
The Server Tools Options window appears when you complete the
installation process or when you double-click on the Options icon in the
Bay Networks program group window. The Server Tools Options
window has four tabbed dialog boxes that allo w you to select a security
server , select booting and logging options, choose and setup a RADIUS
server, and view information about your current Remote Annex Server
®
Tools for Windows NT
•Selecting a Security Server and Group Authentication
•Selecting Booting/Logging Options
•Configuring a RADIUS Server
•Displaying Version Information
software version. This chapter includes:
Selecting a Security Server
TheSecurity tab dialog box allows you to choose a security regime, select
RADIUS Authentication and Accounting servers, and add or remove
domains and remote access groups.
▼To see this information, click on the Server Tools Options window’s
Security tab.
Remote Annex Server Tools for Windows NT
®
User Guide
2-1
Chapter 2 Selecting Server Tools Options
To select options in the Security window:
1.Select your desired security protocol from the Regime list
box.
By default, Native NT security is selected.
2.In the Directory for security files field, accept the default or
enter a new destination drive and directory for the
acp_logfile file.
This field lists the drive on which you installed Remote Annex
Server Tools
for Windows NT
®
and the etc directory, where the
system stores the acp_dialup, acp_keys, and acp_userinfo
files.
2-2
Remote Annex Server Tools for Windows NT®User Guide
Chapter 2 Selecting Server Tools Options
3.If you selected RADIUS as your security protocol, select the
Authentication Server and Accounting Server in the RADIUS
Servers list box.
If you selected Native NT from the Regime list box, skip this
step.
If the only options available in these two drop–do wn lists
is local and same as authentication server you need to
create a list of servers from which to choose. For more
information on this procedure, see Configuring aRADIUS Authentication and Accounting Server , later in
this section.
4.If you selected Native NT as your regime, select the Global
Group Authentication check box.
You must select this box if you want to use
Windows NT
®
global groups to authenticate users. If you do not select it,
the system will authenticate user names and passwords only.
5.If you selected Native NTand want to create a default remote
users group, select the Create Remote Users Group check box
to create the default Remote Users Group availability.
If want to create a new Remote Users Group, see Creating a
Remote Users Group later in this section.
6.If you selected Native NT, select an existing domain from the
Domain field.
When you select a domain, the groups within that domain
appear in the Groups list box.
7.If you selected Native NT, select a name from the Groups list
box.
8.Use
Add to move the group you selected to the Remote
Access Groups list box.
Remote Annex Server Tools for Windows NT®User Guide
2-3
Chapter 2 Selecting Server Tools Options
The groups you add appear in the Remote Access Groups
list box preceded by their domain names. All users in the
groups you list will be allowed access once they are
authenticated using Windows NT
who are not members of any group listed here will not have
access to Remote Annexes, their ports, or networks.
You can double-click on a group name to move additional
groups to the list. If you want to change your selections,
select the group from the list box and use the use Remove.
If you install Remote Annex Server Tools for Windows NT® on a
primary domain controller, the groups you select here must ha ve local
log on privileges to allo w authentication. For more information about
this privilege, refer toInstalling Remote Annex Network Software for
NT® included with your documentation set.
®
domain security. Users
9.When you have completed your Security setup, click on OK
to set the changes you made and close the dialog box.
Click on Cancel to close the dialog box without saving or
applying your changes.
Click on Apply to set your changes and leave the Server
Tools Options window open on your desktop.
Use this option if you want to make changes in any of the other
tabbed dialogs.
Creating a Remote Users Group
You can add or remove a new Remote Users Group in the Security tab
window within the Server Tools Options application. However, unless
this new group already exists, you must first create the ne w group and its
®
information via the Windows NT
operating system.
2-4
Remote Annex Server Tools for Windows NT®User Guide
Chapter 2 Selecting Server Tools Options
▼To add a new default group, choose the Create Remote Users Group
check box.
Remote Users Group appears automatically in the Remote Access
Groups list. If you find you do not need the group, you can delete itbefore you click on OK or Apply by selecting it and clicking on
Remove or by deselecting the Create Remote Users Group check
box.
To create a new Group:
1.Click on the Administrative Tools icon in the Windows NT
®
program group window.
The Administrative Tools window appears.
2.Click on the User Manager for Domains icon.
The User Manager for Domains dialog box appears.
3.Add the new Group and associated information.
For more information, see the Windows NT
®
documentation on
using the options in this window.
4.When you have completed adding your Group information,
click on the Security tab in the Server Tools Options window.
The Security dialog box opens.
5.Click on the Domain pull–down menu.
The list boxes Groups and Remote Access Groups become
active and list the group (s) you created in the above steps.
Remote Annex Server Tools for Windows NT®User Guide
2-5
Chapter 2 Selecting Server Tools Options
6.Select the newly created Group fr om the Groups list box and
click on Add.
The selected group appears in the Remote Access Groups list
box.
7.When you have completed your changes, click on OK to set
the changes you made and close the dialog box.
Click on Cancel to close the dialog box without saving or
applying your changes.
Click on Apply to set your changes and leave the Server
Tools Options window open on your desktop.
Use this option if you want to make changes in any of the other
tabbed dialogs.
Creating a RADIUS Authentication and Accounting
Server
To create a RADIUS Authentication or Accounting server:
1.Click on the Server Tools Options windows’s RADIUS
Servers tab.
The RADIUS Servers dialog box opens.
2.Click on New.
All information fields become active.
3.Enter the Host Name of the RADIUS server to be created.
2-6
Remote Annex Server Tools for Windows NT®User Guide
Chapter 2 Selecting Server Tools Options
4.Tab to the IP Address text field and enter the IP Address that
is associated with the Host Name.
Repeat step 4 to configure the Secret format, the Timeout
period, and the number of Retries (
Timeout, and Retries, see Chapter 4).
for more details on Secr et,
5.Click on Accept to apply the new server information or
Revert to cancel your changes.
Any fields can be modified before you click on Accept
or Revert. When Accept or Revert is chosen, the fields
become inactive and can only be reactivated for editing
by sele ting the server then choosing Modify.
6.Click on OK to save your changes and close the dialog box.
Click on Cancel to close the dialog box without saving or
applying your changes.
Click on Apply to set your changes and leave the Server
Tools Options window open on your desktop.
Use this option if you want to make changes in any of the other
tabbed dialogs.
Before you can select a Backup Server, you must create more than
one new RADIUS servers. Once you create a second RADIUS server ,
the first RADIUS server created appears in the Backup Server dropdown list.
Remote Annex Server Tools for Windows NT®User Guide
2-7
Chapter 2 Selecting Server Tools Options
Selecting Booting/Logging Options
TheBooting/Loggingtab window allo ws you to select log files, to choose
locations for load and dump files, and to choose directories, time formats
and network address formats for the log file.
▼To display this window, choose the Booting/Logging tab in the Server
Tools Options window.
2-8
Remote Annex Server Tools for Windows NT®User Guide
If you selectUse NT Event Log,your selections for time and network
address formats will appear in the acp_logfile and in the NT® Event
Log’s Detail window.
Chapter 2 Selecting Server Tools Options
To select options in the Booting/Logging window:
1.In the Directory for load and dump files field, accept the
default or enter a drive and a directory for the Remote
Annex system images and dump files.
This field automatically lists the drive on which you installed
Remote Annex Server Tools
for Windows NT
®
and the bfs
directory, where the system stores load and dump files.
If you enter a new directory , you can use the File Manager
to move Remote Annex software images to the new
directory. If you enter a new directory and do not move
the images, Remote Annexes will not be able to boot.
2.Select Use NT Event Log, Use acp_logfile, or Use RADIUS
Logging to choose a method for storing log messages.
You can log syslog messages generated at the Remote Annex as
well as security messages generated by erpcd or RADIUS:
•If you choose Use NT Event Log, the system stores
messages in the Applications portion of the standard
®
Windows NT
Event Log.
•If you choose Use acp_log file, the system stores
messages in the acp_logfile in the directory selected inthe Security dialog box. (You can see the acp_logfile
by double-clicking on the acp_logfile icon in the Bay
Networks program group window.)
•If you choose Use RADIUS logging, the system sends
messages in the RADIUS server.
RADIUS logging is not available (grayed–out) unless the
RADIUS security regime is selected in the Security
dialog box.
Remote Annex Server Tools for Windows NT®User Guide
2-9
Chapter 2 Selecting Server Tools Options
3.If you selected Use acp_logfile in the Booting/Logging dialog
box, in the Time Format box, select a format for time
listings.
You can choose:
•YY/MM/DD HH:MM:SS to display the date and time
•Use Seconds to list time in seconds since January 1,
4.If you selected Use acp_logfile or NT Event Log in the
Booting/Logging dialog box, in the Network Address Format
box, choose an IP address or Host Name format.
You can choose:
that an event occurred (e.g., 95/12/30 06:22:15).
1970.
•Use IP Address to place the Internet address of a Remote
Annex that generates logging messages in the log files.
•Use Host Name to include a Remote Annex name in the
log files instead of the Remote Annex’ s Internet address.
The time and address formats you choose will appear in
the acp_logfile or RADIUS logging. If you chose Use
NT Event Log, the format appears in the event log’s
Detail window.
Using the Event Viewer
Remote Annex Server Tools for Windows NT® uses the standard
®
Windows NT
Booting/Loggingdialog box, the Windo ws NT
will include syslog and security messages.
Event Viewer. If you selected Use NT Event Log in the
®
Application Event Log
2-10
Remote Annex Server Tools for Windows NT®User Guide
Chapter 2 Selecting Server Tools Options
▼T o see Windows NT
®
logs, double-click on theEvent Viewer icon in
Administrative Tools and select Application from the Log menu.
WARNING
Remote Annex Server Tools for Windows NT®User Guide
2-11
Chapter 2 Selecting Server Tools Options
The Windows NT® Event Log stores information in the following
columns:
•Anicon at the beginning of each line indicates the severity
of the message.
•Date stores the date that the event was logged in
Windows NT
®
.
•Time stores the time that the event was logged into
Windows NT
®
. The Event Log’s Detail window lists the
time an event occurred.
•Source lists the software that logged the event.
•For syslog messages from a Remote Annex or from the
network,
Annex_syslog appears.
•For messages generated by erpcd, the column displays
Annex_syslog.
•For security messages, the log entry reads
Annex_ACP.
•Category classifies events.
•Event contains a number generated by the Remote Annex to
identify each event.
•User displays
®
NT
does not use this column.
N/A. Remote Annex Server Tools for Windows
•Computer displays the name of the host on which you
2-12
Remote Annex Server Tools for Windows NT®User Guide
installed erpcd.
Y ou can display the ev ent log’sDetail window by double-clicking on
any line in the Windows NT® Event Log.
Configuring a RADIUS Server
TheRADIUS Servers tab dialog box allows you to create, modify , delete
and configure a RADIUS server and to set parameters such as IP Address
and Secret format.
▼To see this information, click on the Server Tools Options window’s
RADIUS Servers tab.
Chapter 2 Selecting Server Tools Options
First Time Use
The first time you open theRADIUS Servers dialog box after installation,
the information fields will be blank and inactive. You need to create and
configure the RADIUS servers that you will be using. Use the following
procedures to create, configure, modify , and delete your RADIUS servers
and associated parameters.
Remote Annex Server Tools for Windows NT®User Guide
2-13
Chapter 2 Selecting Server Tools Options
Creating and Configuring a RADIUS Server
To create and configure a new RADIUS Server:
1.Click on New.
All information fields become active.
2.Enter the Host Name in the text field.
3.Tab to the IP Address text field and enter the IP address that
is associated with the Host Name.
4.Repeat step 3 to configure the Secret format, the Timeout
period, and the number of Retries.
5.Click on Accept to apply the new server information or
Revert to cancel your changes.
Any fields can be modified before you click the Accept or
Revert buttons. When Accept or Revert is chosen, the fields
become inactive and can only be reactivated for editing by
selecting the server then choosing the Modify button.
6.Click OK to save your changes and close the Server Tools
Options window.
Click on Cancel to close the dialog box without saving or
applying your changes.
Click on Apply to set your changes and leave the Server
Tools Options window open on your desktop.
Use this option if you want to make changes in any of the other
tabbed dialogs.
Before you can select a Backup Server, you must create more than
onenew RADIUS servers. Once you create a second RADIUS server ,
the first RADIUS server created appears in the Backup Server dropdown list.
2-14
Remote Annex Server Tools for Windows NT®User Guide
Chapter 2 Selecting Server Tools Options
Modifying RADIUS Server Information
1.Select your desired RADIUS server from the RADIUS
Servers list box.
When you select your RADIUS server, the information fields on
the right side of the dialog box automatically fill in with the
appropriate information pertaining to the RADIUS server that
you selected. Click on Modify.
All information text fields become activ e, except the Host name.
2.Place your cursor in the desired information field to be
modified and enter the new information.
3.Click on Accept to save the modified information or
Revert to cancel your changes.
Any fields can be modified before you choose Accept or Revert.
When Accept or Revert is chosen, the fields become inactive
and can only be reactivated by choosing the Modify button.
4.Click OK to save your changes and close the Server Tools
Options window.
Click on Cancel to close the dialog box without saving or
applying your changes.
Click on Apply to set your changes and leave the Server
Tools Options window open on your desktop.
Use this option if you want to make changes in any of the other
tabbed dialogs.
Remote Annex Server Tools for Windows NT®User Guide
2-15
Chapter 2 Selecting Server Tools Options
Deleting RADIUS Server Information
1.Select the RADIUS Server to be deleted and click on Delete.
All information text fields remain inactive and a confirmation
dialog box appears.
2.Click OK to delete the RADIUS Server or Cancel to exit the
confirmation dialog box without deleting any server
information.
The confirmation dialog box closes.
3.Click OK to save your changes and close the Server Tools
Options window.
Click on Cancel to close the dialog box without saving or
applying your changes.
Click on Apply to set your changes and leave the Server
Tools Options window open on your desktop.
Use this option if you want to make changes in any of the other
tabbed dialogs.
2-16
Remote Annex Server Tools for Windows NT®User Guide
Displaying Version Information
The Version tab window provides the company and product name,
version number, and build number for the Remote Annex Server Tools
®
for Windows NT
▼To see this information, click on the Server Tools Options window’s
Version tab.
.
Chapter 2 Selecting Server Tools Options
Remote Annex Server Tools for Windows NT®User Guide
2-17
Chapter 2 Selecting Server Tools Options
2-18
Remote Annex Server Tools for Windows NT®User Guide
Chapter 3
Understanding Erpcd
Remote Annex Server Tools for Windows NT
remote procedure call daemon (erpcd) running on a Windows NT
server. Erpcd responds to all Remote Annex boot, dump, and ACP
security requests. ACP’s eservices file, stored in the \etc directory, lists
the services that erpcd provides. Eservices includes controls for:
•The block file server program (bfs) that sends boot files to a
Remote Annex and collects dump files from a Remote
Annex.
•The Access Control Protocol (ACP) program that provides
security when you define a
security server. See for additional information.
You can use the Remote Annex Administrator’s Guide for UNIX to
find additional information about erpcd, the acp_userinfo,
acp_keys, andacp_dialup files. However, Remote Anne x Server
T ools implementserpcd differently because it uses Windows NT
domain authentication.
This chapter describes the files you can edit. It includes:
Windows NT
®
uses the expedited
®
server as a
®
®
•Editing Files
•Using the acp_userinfo File
•Using the acp_keys File
•Using the acp_dialup File
Remote Annex Server Tools for Windows NT
®
User Guide
3-1
Chapter 3 Understanding Erpcd
Editing Files
You can edit the acp_userinfo, acp_dialup, and acp_keys files from the
Bay Networks program group window . For each file, there is an associated
icon in the program group window.
▼To open an individual file, such as the acp_userinfo file, from the Bay
Networks program group windo w, doub le-click on the associated icon
and the file will open in the Windows NT® Notepad editor.
Your changes take effect immediately. User names and group names are
not case-sensitive.
Using the acp_userinfo File
The acp_userinfo file stores information about the Remote Annex
commands and protocols that are available to users. When a user logs in
to the server, erpcd matches the login environment with acp_userinfo
entries and controls user access based on these entries.
Defining User Profiles
Defining user profiles is useful only when you want to restrict a user’s
privileges for remote access connections.
The acp_userinfo file allows you to control network access based on a
user’s login environment. When you create a profile, erpcd first
authenticates users and then attempts to match the user name with an
entry in theacp_userinfo file. If a profile matches the login en vironment,
erpcd downloads attribute information.
3-2
Remote Annex Server Tools for Windows NT®User Guide
Chapter 3 Understanding Erpcd
For example, if a user who belongs to the Engineering group requests
access to a Remote Annex port on Monday morning at 10 a.m. and a
profile excludes Engineering group members from using that Remote
Annex on Mondays between 9 and 11 a.m., the user cannot log in to the
port. In this case, Remote Annex Server Tools for Windows NT
®
authenticates the user’s W indo ws NT® name and password, matches the
current environment (the Remote Annex, port, day and time) to an entry
in acp_userinfo, and downloads instructions (or attributes) so that the
Remote Annex denies access to the user.
For more detailed information about profiles and for examples using
the na utility, please refer to the Remote Annex Administrator’sGuide for UNIX. Some terminology differs in this book, but ke yword
and attribute names and formats are identical in function.
User Profile Formats
The acp_userinfo file stores user profiles in the user ...end block format.
This format can include:
user to begin the block.
•
•One or more keywords that specify the user environment.
Entries must contain:
•A keyword, an equal sign (=) and a value, without spaces.
For an explanation of these keywords, refer to
Environment Keywords later in this chapter.
User
•A semicolon (;) to separate keyword/value statements.
•A backslash (\) at the end of a line if you continue the
entry on a second line.
Y ou cannot use each ke yword more than once in any user
profile. A line cannot exceed 80 characters.
Y ou cannot include spaces on either side of the equal sign,
the semicolon, or within the value, except in a value for
time.
Remote Annex Server Tools for Windows NT®User Guide
3-3
Chapter 3 Understanding Erpcd
Using Profile Environment Keywords
User profiles contain one or more keywords that define user login
conditions. Erpcd matches these conditions to environment conditions
listed in a user profile.
•The attributes that erpcd applies when all user profile
elements match the user’s login environment.
•
end to conclude the profile.
The acp_userinfo file can include as many user profiles as you need.
The matching process requires that all elements in a user profile match
the user’s login environment.
Since erpcd uses the first profile it finds that matches a user’s login
environment, you need to place profiles in the order in which you
want them to match.
Username and Group
Ke ywords
Theusername keyword specifies a single Windo ws NT® user . The group
keyword allo ws you to create a user profile for any member of a Windows
®
group.
NT
▼To use these keywords, enter username= or group= followed by a
user or group name.
If you do not enter a user or group name, the profile applies to all
users. You can use an asterisk as a wildcard following a partial name
or an asterisk alone to indicate that the profile applies for all users or
group members who meet the criteria.
If you do not enter a domain name, erpcd assumes the user is
registered in the domain in which Remote Annex Server Tools
Windo ws NT
®
is installed. If you create a profile for a user or group
for
in a different domain, you must enter the domain name, two
backslashes, and the user or group name (e.g.,
Marketing\\Russell).
3-4
Remote Annex Server Tools for Windows NT®User Guide
Chapter 3 Understanding Erpcd
time Keyword
protocol Keyword
The time keyword allo ws you to define a period of time during which a
profile’s attributes apply.
▼To use this keyword, type time= followed by one or more of the
following:
•A day of the week (e.g., Tuesday).
•A specific date, including the month and the date
August 1).
(e.g.,
•A range of hours in hh:mm format (e.g.,
06:30). You
must enter a start time and an end time. You can enter
a.m. or p.m. following each time.
If you do not enter a day and/or a date, erpcd applies the start and
end time every day of the week. If you omit
a.m. or p.m., you are
specifying time in the 24-hour format.
The protocol keyword defines a protocol by which a user can connect to
a Remote Annex.
▼T o define a protocol, type protocol= followed by slip, ppp, or cli.
annex and ports
Keywords
You cannot enter more than one protocol on a line. However, you
can repeat the
protocol= format and add a second or third profile.
The annex and ports keywords specify the Remote Annexes and ports
to which profile attributes will apply.
▼To list Remote Annexes and/or ports, type annex= and/or ports=
followed by one or more Remote Annex names or IP addresses and
one or more port numbers, respectively.
You can use an asterisk to specify a partial Remote Annex name or
IP address. In addition, you can enter individual port numbers
separated by commas or a range of port numbers using dashes (e.g.,
ports=1,3,6-22).
Remote Annex Server Tools for Windows NT®User Guide
3-5
Chapter 3 Understanding Erpcd
Understanding Profile Attributes
In each user profile, one or more attributes follow keywords and their
values. This section explains the attributes you can include.
To combine the annex and port keywords in one line, separate
keyword/value entries with a semicolon
annex= Annex 02, 245.132.88.22; ports=1,3,6-22). If
(e.g.,
you omit Remote Annex names or addresses and list one or more
ports, profile attributes will apply to all Remote Annexes.
accesscode
Theaccesscode attribute controls the text that a user enters when logging
in to a dial-back port. Before you can use the accesscode attribute, you
must define at least two modem pools (one for dial-in and one for dialout) in the acp_userinfo file. A modem pool groups asynchronous ports
on one or more Remote Annexes.
Modem pool definitions usually appear at the end of the acp_userinfo
file. To define a modem pool:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and type
pool inboundpool1).
3.Type
pool followed by a name for the modem pool (e.g.,
ports followed by one or more port numbers, @, and
one or more Remote Annex names or IP addresses.
You can separate port numbers with commas and/or enter a
range of numbers with dashes (e.g.,
ports 1,6-10@Annex01).
3-6
Remote Annex Server Tools for Windows NT®User Guide
Chapter 3 Understanding Erpcd
The acp_userinfo file can store one or more accesscode attributes in a
user profile. To create an accesscode entry:
1.Type
2.Type
accesscode followed by a code name.
For IPX clients, you must enter
phone_no followed by an actual phone number (e.g.,
phone_no 634-5789).
IPX for the access code.
If you do not enter a phone number, the system prompts the user
for it. You can enter
charge_back for IPX clients so that the
system prompts the user for a phone number, drops the
connection, and calls the user at that number.
3.Type
4.Type
5.Type
in_pool followed by the name of an inbound modem
pool (e.g.,
pool (e.g.,
end.
in_pool inboundpool1).
out_pool followed by the name of an outbound modem
out_pool outboundpool1).
job followed by one CLI command, its arguments, and
You do not need to enter a job specification.
6.Type
end.
clicmd
The clicmd attribute allows you to list CLI commands that erpcd will
execute if the profile matches. To use this attribute:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and type
clicmd.
3.Enter a single user or superuser CLI command or the name
of an existing macro defined for a Remote Annex.
Remote Annex Server Tools for Windows NT®User Guide
3-7
Chapter 3 Understanding Erpcd
4.Type end.
You can repeat the line you created in Steps 1-3 if you want to
use more than one CLI command. Erpcd executes CLI
commands in the order in which they appear.
climask
5.Add
clicmd...end following the last line that lists a CLI
command.
You can use this line only if you want to continue the CLI
session after erpcd executes the last CLI command.
You cannot use clicmd unless you set the cli_security parameter to
Y. You should not include the same CLI command in the clicmd and
climask entries.
The climask attribute limits the CLI commands a user can execute. To
use this attribute:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and type
climask.
3.Enter one or more CLI commands. If you enter more than
one command, separate commands with spaces.
4.Type
3-8
Remote Annex Server Tools for Windows NT®User Guide
end to conclude the climask entry.
Y ou can use include files in place of repeatedclimask entries. T o use
these files, type include and the file name. Include files must be
stored in the same directory as is the acp_userinfo file.
Chapter 3 Understanding Erpcd
When a user’s name and passw ord match the profile, erpcd sends this list
to the Remote Annex, which prevents the user from executing the
commands.
You cannot use climask unless you set the cli_security parameter to
Y. You should not include the same CLI command in the clicmd and
climask entries.
For detailed information about all CLI commands, please refer to the
Remote Annex Administrator’s Guide for UNIX.
deny
filter
The deny attribute prevents a user from connecting to a Remote Annex.
To use the command:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and type
If you include additional attributes in a profile that uses deny, the
profile will not execute additional attributes.
deny following a user name or group name.
When erpcd denies access to a Remote Annex, it generates a message in
the log file. For CLI users, the message appears on the screen.
The filter attribute sets network address restrictions for specific users or
groups. These restrictions apply to the port on which a user logs in.
To use the attribute:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
Remote Annex Server Tools for Windows NT®User Guide
3-9
Chapter 3 Understanding Erpcd
2.Go to the area of the file where entry information resides
and type
filter.
3.Enter a filter definition.
4.Type
end.
You can repeat the line you created in Steps 1-3 if you want to
use more than one filter. Erpcd executes filter attributes in the
order in which they appear.
Each filter definition includes categories for direction, scope, family,
criteria, and actions. You must separate each part of the filter definition
with a space.
•Direction applies the filter to incoming or outgoing packets.
You can enter
input or output. To apply a filter to incoming
as well as outgoing packets, you must create two separate
definitions.
•Scope controls how erpcd matches the filter definition. You
can enter
match the definition, or
include to apply the filter only to packets that
exclude to apply the filter only to
packets that do not meet the definition.
•Family, an optional part of the definition, specifies the
protocol to which the filter applies. Currently, the system
supports only
ip.
3-10
Remote Annex Server Tools for Windows NT®User Guide
Chapter 3 Understanding Erpcd
•Criteria includes the conditions for the filter. This section
uses a keyword followed by a value. You can enter:
•
dst_address (the packet’s destination address)
followed by an IP address.
dst_port (the destination port) followed by a port
•
number from 1-65535 or by a service name.
src_port (the source port number) followed by a port
•
number from 1-65535 or by a service name.
src_address (the packet’ s source address) followed by
•
an IP address.
address_pair for incoming or outgoing packets passing
•
between two addresses, followed by two IP addresses.
You must enter both addresses, separated by a space, on
the same line. If you use this keyword, you cannot use
dst_address or src_address.
•
port_pair for incoming or outgoing packets passing
between two ports or services, followed by a port number
or service name. If you use this keyword, you cannot use
dst_port or src_port.
•
protocol (the packet’ s transport protocol) followed by
a number from 1 to 65535 or by
T o match all addresses or port numbers, enter -1 or*
in place of an address or port number. For service
names, you can enter domain, finger, ftp, name,
or login. For the port numbers that correspond to
these service names, refer to the Remote AnnexAdministrator’s Guide for UNIX.
tcp, udp, or icmp.
Remote Annex Server Tools for Windows NT®User Guide
3-11
Chapter 3 Understanding Erpcd
•Actions specify a filter’s activity when its criteria match a
packet. You can enter one or more of the following actions:
•
discard discards the packet. If you use syslog, icmp,
netact with discard, the system discards the packet
or
after it takes those actions.
icmp discards the packet and sends an ICMP message
•
indicating that the destination is unreachable.
netact defines activity for a SLIP or PPP dynamic dial-
•
out line. When you use
netact in a filter that is enabled
on SLIP or PPP dynamic dial-out line, packets that match
the filter constitute activity on the line. If the line is not
netact discards the packet.
up,
•
no_start, used with include (in the Scope category),
specifies that packets defined as activity will not activ ate
a dynamic dial-out line, but will keep the line up and will
reset the net_inactivity timer parameter to
0.
route
•
syslog logs the event in the log files.
The route attribute defines the IP routes that a router can make available
through a Remote Annex when it dials in. You should use this attribute
when you do not want a router to incur overhead in running a routing
protocol itself. To use this attribute, you must:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and type
route.
3.Enter an IP address for the route’s destination.
4.Enter a subnet mask for the destination’s address.
3-12
Remote Annex Server Tools for Windows NT®User Guide
Chapter 3 Understanding Erpcd
5.Enter an IP address for the gateway that is the next hop for
the route.
If you enter an asterisk, the Remote Annex uses the port’s
remote address as the gateway.
6.If necessary , you can enter a number fr om 1 to 15 to indicate
the number of hops to the destination or -h to indicate that
the route is hardwired.
You can skip this step. You do not have to enter a number of
hops or
-h.
at_zone
7.Type
end.
The at_zone attribute lists AppleTalk zones on a network. To use this
attribute:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
1.Go to the area of the file where entry information resides
and type
at_zone.
2.Enter one or more zone names.
If you use more than one zone name, separate names using
spaces (e.g.,
at_zone zone1 zone2). Zone names use 1-32
characters; you cannot use non-printable characters. If you enter
a name that contains spaces, you must enclose the entire name
in double quotation marks.
3.Type
end.
Remote Annex Server Tools for Windows NT®User Guide
3-13
Chapter 3 Understanding Erpcd
at_connect_time
at_nve_filter
The at_connect_time attribute specifies the number of minutes that an
ARA connection can remain open. To use this attribute:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and type
at_connect_time followed by a number of
minutes.
The at_nve_filter attribute allows you to include or exclude users from
specific objects, network numbers, subzones, and zones. Y ou can specify
one at_nve_filter attribute for each user in a profile. To use this attribute:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and type
at_nve_filter.
3-14
3.Type
include or exclude.
4.Enter an object name followed by a colon (:).
5.Enter a network number or subzone name followed by @.
6.Enter a zone name.
7.Type
Remote Annex Server Tools for Windows NT®User Guide
end.
For object names, network numbers or subzone names, and zone
names, you can use an asterisk as a wildcard. All entries in steps 3,
4, and 5 are case-sensitive and can use up to 32 characters.
Chapter 3 Understanding Erpcd
at_password
The at_password attribute stores a password for each registered
®
AppleT alk user . Remote Annex Server T ools for W indows NT
uses this
password to authenticate all AppleTalk users. To use this attribute:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and type
at_password followed by a password using 1 to 9
characters.
You can include punctuation marks in a password. If you use
spaces and/or hexadecimal values, use the backslash (/)
preceding these characters.
If you want to allow AppleTalk guests access to the network, you
should use the na utility to set the at_guest parameter to Y. You can,
however, create an at_password attribute here using Guest (case
sensitive) as a user name.
chap_secret
Thechap_secret attribute defines the token used for authentication when
you use the CHAP protocol for PPP links. CHAP authenticates users
based on the user names in the acp_userinfo file. To create a token:
1.Open the acp_userinfo file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_userinfo file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and type
chap_secret following by the token.
Each token can use up to 32 alphanumeric characters. We
recommend that all tokens use at least 16 characters.
Remote Annex Server Tools for Windows NT®User Guide
3-15
Chapter 3 Understanding Erpcd
Using the acp_keys File
The acp_keys file stores Remote Annex names or IP addresses and
corresponding encryption keys. Erpcd uses the keys you define here to
create encryption keys that the security server and a Remote Annex use
to exchange messages. When the security server receives an encrypted
message from a Remote Annex, it matches the key with an associated
Remote Annex in the acp_keys file. If there is no match, the Remote
Annex and the server cannot communicate.
To create an entry in the acp_keys file:
1.Open the acp_keys file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_keys file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and enter one or more Remote Annex names or IP
addresses.
You can use an asterisk (wildcard) for any part of an IP
address. If you list more than one Remote Annex, you must
separate names or IP addresses using commas.
3.Type a colon to separate Remote Annex names or addresses
from the encryption key.
4.Enter an encryption key that uses up to 15 characters.
You cannot use spaces or tabs here. Encryption keys are
case-sensitive. For additional information, refer to
Creating
Encryption Keys on page 3-17.
3-16
Remote Annex Server Tools for Windows NT®User Guide
Chapter 3 Understanding Erpcd
For example, annex1, annex2: abcxyz is a simple entry that defines an
encryption key for two Remote Annex es. If you need to continue an entry
on a second line, use the backslash (/) at the end of the first line.
Erpcd first attempts to match complete IP address entries in the
acp_keys file. If it does not find an exact match, it searches entries
that contain wildcards. In either case, it uses the first key entry it finds.
Creating Encryption Keys
You must define encryption keys by setting the acp_key parameter for
each Remote Annex. If the key v alue is not the same in the acp_keys file
and for the acp_key parameter, the Remote Annex and the server cannot
communicate. In addition, you must set the enable_security parameter
Y to use any security feature.
to
To set up encryption keys:
1.Open the acp_keys file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_keys file opens in the Notepad editor.
2.Go to the area of the file where entry information resides
and enter Remote Annex names or IP addresses and
encryption keys in the acp_keys file.
3.Use the admin utility on the Remote Annex to set the acp_key
parameter for each Remote Annex you listed in theacp_keys
file.
Remote Annex Server Tools for Windows NT®User Guide
3-17
Chapter 3 Understanding Erpcd
4.Use the Services control panel to stop or pause erpcd.
5.Use the admin utility’s reset annex security command to reset
security for the Remote Annexes whose keys you added or
changed.
6.Use the Services control panel to restart erpcd.
Using the acp_dialup File
The acp_dialup file stores user names, Remote Annex names and
addresses, and port numbers. Erpcd matches Annex and user entries to
provide IP addresses for users dialing in to the network. It denies access
to users if it does not find a matching entry.
To use the information in acp_dialup, you must set the
dialup_addresses parameter to Y via the na utility. This allows a
Remote Annex to search the acp_dialup file for the remote client’s
user name and for local and remote addresses.
To create an entry in the acp_dialup file:
1.Open the acp_dialup file from the Bay Networks program
group window by double-clicking on the appropriate icon.
The acp_dialup file opens in the Notepad editor.
2.Go to the end of the file and enter a user name. If
authentication is performed with multiple domain
controllers, enter the domain name and the user name like
this:
domain-name\\user-name
3-18
Remote Annex Server Tools for Windows NT®User Guide
Chapter 3 Understanding Erpcd
3.Enter one or more port numbers followed by @ and one or
more Remote Annex names or IP addresses.
You can separate port numbers with commas and/or enter a
range of numbers with dashes (e.g.,
1,3,6-10@Annex01).
4.Enter a remote address followed by a local address.
You can use an asterisk (wildcard) for any part of an IP address.
You must use spaces to separate the user name, port number/
Remote Annex, Local Address, and Remote Address fields.
Using Local and Remote Addresses
If the acp_dialup file contains a matching user name and:
•The local and remote addresses exist in the file, the Remote
Annex uses those values.
•The acp_dialup file contains a remote address but not a
local address, the Remote Annex uses the remote address
from the file and the Remote Annex’s IP address for the
local address.
If the file does not contain a matching user name, the Remote Annexuses
values from the local_address and remote_address parameters.
•If both parameters contain addresses, the Remote Annex
uses these values.
•If both parameters are set to
0.0.0.0, the Remote Annex
negotiates for both addresses with the remote PPP client.
The connection is denied for a remote SLIP client.
•Iflocal_address contains a value and remote_address is set
0.0.0.0, the Annex uses the local address and negotiates
to
with the remote PPP client for the remote address. The
connection is denied for a remote SLIP client.
Remote Annex Server Tools for Windows NT®User Guide
3-19
Chapter 3 Understanding Erpcd
3-20
Remote Annex Server Tools for Windows NT®User Guide
Chapter 4
Using Security Features
Remote Annex Server Tools for Windows NT
®
Windows NT
features to protect your network from unauthorized access. T o use Remote
Annex Server Tools for Windows NT
•Use the
Manager for Domains to create groups, user names, and
passwords.
•Use the na utility to set security parameters on the Remote
Annex for the types of security you want.
You can use group authentication by selecting options in the Security
dialog box:
•Select Global Group Authentication.
•Select the groups whose members can be authenticated.
For more information on group authentication, see
This chapter summarizes most security features and explains the
relationship between Windows NT
security. It includes:
domain security and Remote Annex-based security
®
security features, you need to:
Windows NT
®
Administrative Tools/User
®
domain security and server-based
®
uses standard
Chapter 3.
Although this manual documents the differences between UNIX and
Windows NT
implementation is significantly different from the UNIX implementation.
Therefore to avoid confusion, all RADIUS for Windows NT
information is included in this chapter.
•Using Windows NT® Domain Security
•Setting Remote Annex Security Parameters
•RADIUS Security
® implementation, the RADIUS for Windows NT®
®
Remote Annex Server Tools for Windows NT
User Guide
®
4-1
Chapter 4 Using Security Features
Using Windows NT® Domain Security
When a user logs on to a Remote Annex, to one of its ports, or to a network,
the system performs authentication based on the security parameters you
set. Once you set the parameters that enable a type of security:
•The system checks the
Windows NT
®
user name and
password.
•The system performs additional authentication if you
selected Global Group Authentication and chose groups
for remote access in the Server Tools Options windows. If
the user name and password are valid, the system determines
whether the user is a member of any group you selected.
Support for Multiple Domains
Remote Annex Server Tools for Windows NT® can authenticate users
from domains other than the security server’ s default domain. To facilitate
®
this feature, the Windows NT
one-way trust relationship.
In essence, a trusting domain controller can be linked to one or more
trusted domain controllers. When a cross-domain authentication request
arrives at the (trusting) domain controller , the request is transferred to the
appropriate (trusted) domain controller. The trusted controller’s domain
security accounts manager database includes the user in question and
authenticates that user.
administrator must establish at least a
4-2
Remote Annex Server Tools for Windows NT®User Guide
Chapter 4 Using Security Features
Multiple Domain Authentication Setup Procedure
Follow these Windows NT® steps to facilitate support for multiple
domain authentication:
Windows NT® steps
Server Tools steps
1.Establish the appropriate trust relationship among
domains.
2.Load the Remote Annex Server Tools for Windows NT
® on
the trusting domain controller.
3.Define the user(s) in the trusted domain’s security accounts
manager database.
4.Add the trusted domain user(s) to a global group. Use the
trusted domain’s User Manager for Domain’s Utility.
5.Click on the Server Tools Options window.
6.Select the Security tab.
7.Use
Add and Remove to define (by domain and group) those
users who require authentication.
All Windows NT
®
users who require authentication services must be
defined to the Remote Annex Server Tools software. Those definitions
are accomplished in the following steps:
1.Add a valid entry(s) in the acp_userinfo file.
The user’s name must be defined in the acp_userinfo and acp_dialup
file in the format:
domain-name\\user-name
For example, a user named Stephen from the Marketing domain would
log on as
Workgroups
2.If the caller requires a dial-up address, add a valid entry(s)
in the acp_dialup file.
Marketing\\Stephen.Windows NT
®
, and Windows 95® use this format.
Remote Annex Server Tools for Windows NT®User Guide
®
, Windows for
4-3
Chapter 4 Using Security Features
Setting Remote Annex Security Parameters
The Remote Annex’s Access Control Protocol (ACP) provides serverbased security . When you define one network server as a security serv er,
you can use ACP software default settings or modify the software to create
a customized security policy for your network.This section includes:
•Security Requirements
•Types of Security
Security Requirements
Before you can use server-based security, you must use the na utility to:
•Set the enable_security parameter to
Y.
•Define one server as the primary security server by entering
its address in the pref_secure1_host parameter. You can
define a backup security server in the pref_secure2_host
parameter.
•If a Remote Annex queries the primary server and does
not receive a response within the time defined in the
network_turnaround parameter, it queries the backup
server.
•If the backup server does not respond within the time
specified, the Remote Annex broadcasts to the network for
another server running erpcd as long as the
security_broadcast parameter is set to
For instructions on using the na utility and detailed explanations for
each parameter, refer to the Remote Annex Administrator’s Guidefor UNIX.
Y.
4-4
Remote Annex Server Tools for Windows NT®User Guide
Chapter 4 Using Security Features
You can customize security features by editing several A CP files. These
files are maintained by the security server through Remote Annex Server
Tools for Windows NT
® program window.
•The acp_keys file includes encryption key information.
•The acp_dialup file contains user names and addresses for
The Remote Annex Administrator’s Guide for UNIX includes
detailed discussions about server-based security and examples using
thena utility. Y ou should use this guide for reference. Ho wever , some
instructions and examples refer to the acp_regime, acp_restrict,acp_group, and acp_password files. Remote Annex Server Tools
for Windows NT® servers does not use the acp_regime,acp_restrict, acp_group, or acp_password files. You should skip
the steps that discuss these files.
Types of Security
You can configure your system for several types of server -based security
by using the na utility to set security parameters. Once you set these
®
parameters, Remote Annex Server Tools for Windows NT
®
Windows NT
user names and passwords to authenticate users. This
section describes the type of server-based security that use W indows NT
domain security. It includes:
•PPP Security
•CLI Security
•Virtual CLI Security
•AppleTalk Security
•Port Server Security
uses
®
Remote Annex Server Tools for Windows NT®User Guide
4-5
Chapter 4 Using Security Features
PPP Security
Point-to-Point (PPP) provides a link between hosts that carry IP , IPX, and
ARA protocols. After PPP negotiates Link Control Protocol (LCP)
options, the hosts at either end of the link authenticate their identities
using PAP or CHAP security protocols.
You need to set certain parameters to enable each type of security
described here. Once you set parameters, each user will have to enter
a user name and password. Remote Annex Server T oolsfor Windo ws
®
will grant access only to those user names and passwords listed
NT
in any Windows NT® global group you selected in the RemoteAccess Groups tab window.
•PAP is a two-way handshake in which hosts exchange user
names and passwords in clear text.
•CHAP is a three-way handshake that uses a secret token
defined in the acp_userinfo file to authenticate users.
▼To configure Windows NT® security for PPP links, you must set the
ppp_security_protocol parameter.
•If you set ppp_security_protocol to pap, the system uses
Windows NT
®
user names and passwords for authentication.
•If you set ppp_security_protocol to chap–pap, the system
first requests CHAP security. If CHAP is not acknowledged,
it requests PAP.
CHAP does not use Windows NT® user names,
passwords, or remote access groups for authentication. It
authenticates based on user names from theacp_userinfo
file and the CHAP token.
4-6
Remote Annex Server Tools for Windows NT®User Guide
Chapter 4 Using Security Features
▼To log user access for PPP, set the slip_ppp_security parameter to Y.
If you want to set ppp_security_protocol andslip_ppp_security to
values other than the ones described here, the system will not use
Windo ws NT
refer to the Remote Annex Administrator’s Guide for UNIX for
information about system behavior with other parameter values.
®
user names and passwords for authentication. Please
CLI Security
The Remote Annex’s Command Line Interpreter (CLI) allows users to
connect to hosts, to move between established sessions, to modify port
characteristics, and to display statistics for the Remote Annex, hosts, and
the network. CLI also provides superuser commands for network
administration and management.
▼To configure server-based security for CLI connections, set the
cli_security parameter to
Y.
Virtual CLI Security
Virtual CLI (VCLI) connections allow network users access to CLI
commands. When a user enters a telnet command to connect to a Remote
Annex and requests the CLI at the port server prompt, the Remote Annex’ s
port server process creates a virtual CLI connection.
AppleTalk Security
Remote Annex Server Tools for Windows NT® authenticates AppleT alk
users via the acp_userinfo file. This file includes entries for usernames
and passwords, a guest profile for anonymous access, and an AppleTalk
connection timer.
▼To authenticate AppleTalk users, set the at_security parameter to Y.
Remote Annex Server Tools for Windows NT®User Guide
4-7
Chapter 4 Using Security Features
Port Server Security
The Remote Annex’s port server process allows it to accept telnet or
rlogin connection requests from network users, hosts, and applications.
When a user connects to a Remote Annex via telnet or rlogin and
responds to the port prompt by entering a port or rotary number, the
security server requires an Windows NT
password.
▼T o configure server-based security for port server connections, set the
When a user connects to a Remote Annex via telnet or rlogin and
responds to the port prompt by entering a port or rotary number, the
security server requires a Windo ws NT
port_server_security parameter to
®
domain user name and
Y.
®
domain user name and password.
▼To configure server-based security for VCLI connections, set the
vcli_security parameter to
Y.
Additional Security Types
Remote Annex Server T ools for W indows NT® supports port server, CLI,
®
VCLI, and PPP security using Windows NT
passwords. In addition, Remote Annex Server Tools for Windo ws NT
supports:
•Security Filters, ARA and Dial-back security defined in the
acp_userinfo file.
•Dial-up security defined in the acp_dialup file.
Remote Annex Server T ools for Windo ws NT
support local Remote Annex security and Proprietary IPX security in the
same way. Remote Annex Server Tools for Windows NT
support the following server-based security types (for more details, see
the Remote Annex Administrator’s Guide for UNIX):
domain user names and
®
and UNIX-based systems
®
does not
®
4-8
Remote Annex Server Tools for Windows NT®User Guide
RADIUS Security
RADIUS is an IETF- developed protocol that defines a communication
standard between a Network Access Server (NAS) and a host-based
communication server. RADIUS modes are as follows:
Chapter 4 Using Security Features
•Connection Security
•Password History and Aging
•Blacklisting
•Kerberos Authentication
•Using ACE/Server Software
•Using SafeWord AS Software
•RADIUS Authentication includes authentication of the
dial-up user to the RADIUS server , as well as authentication
of the RADIUS server to the NAS. RADIUS supports
authentication modes PAP and CHAP
Authentication Protocol)
.
(Challenge Handshake
•RADIUS Accounting, another IETF-developed protocol,
defines a communication standard between an NAS and a
host-based accounting server. It records duration of service,
packet throughput, and raw throughput.
•Although RADIUS Authorization is not supported in this
release, Authorization is addressed by the Access Control
Protocol (ACP). Authorization of the acp_userinfo,
acp_restrict, and acp_dialup files still apply to users that
are authenticated through RADIUS.
Remote Annex Server Tools for Windows NT®User Guide
4-9
Chapter 4 Using Security Features
RADIUS and ACP Protocol Operation
RADIUS and ACP servers work together to provide the user with a
standard means of communication between a Network Access Server and
a host-based server.
When or If...The...
the security profile matches the
Server Tools Options dialog box
RADIUS on/off toggle switch,
expedited remote procedure call
daemon (ERPCD)/ACP prompts the
Remote Annex for the user name and
password.
the user name and password are
entered correctly,
ERPCD/ACP sends a RADIUS Access-Request packet to the RADIUS server
(this packet contains the normal
RADIUS header and the Access-Request attributes).
the Access-Accept, Access-
ERPCD/ACP re-sends the packet.
Reject, or Access-Challenge
packet fails to arrive in the
specified amount of time,
no response is received,ERPCD/ACP sends the Access-
Request packet to the backup RADIUS
server, if configured in the Serv er Tools
Options dialog box.
ERPCD/ACP receives an
Access-Accept packet,
ERPCD/ACP considers the user
validated.
ERPCD/ACP receives an Access-
Reject or an unsupported AccessChallenge or the backup
RADIUS server also fails to
respond,
4-10
Remote Annex Server Tools for Windows NT®User Guide
ERPCD/ACP considers the user
invalidated.
Chapter 4 Using Security Features
RADIUS Authentication
RADIUS authentication supports the authentication modes PAP and
CHAP. This section covers the following topics:
•PPP and CHAP Support
•Access-Request Attributes
•Access-Accept and Access-Reject Attributes
PPP and CHAP Support
RADIUS requires PPP/CHAP enforcement to be in the RADIUS server .:
The...Then...
Remote Annex sends the ACP server
an ACP Authorization-Request
message containing the CHAP
information,
RADIUS server validates the
information and returns either an
Access-Accept or Access-Reject
message,
If the RADIUS on/off toggle switch in the Server Tools Options/
Security dialog box is set to off, the A CP server validates against the
chap_secret entry in the acp_userinfo file.
the ACP server determines if
RADIUS is to be used (set in
Server Tools Options dialog box)
and sends a request to the RADIUS
server containing the CHAP
information needed for validation.
the ACP server responds to the
Remote Annex with
REQ_GRANTED or
REQ_DENIED for authorization.
Remote Annex Server Tools for Windows NT®User Guide
4-11
Chapter 4 Using Security Features
Access-Request Attributes
ERPCD/ACP sends each Access-Request packet indicating ho w the user
has connected to the Annex. This information can be used by the server
as a hint or a restriction. The following section defines the available
access-request attributes:
User-Name
User-Password
CHAP-Password
NAS-IP-Address
NAS-Port-Type
Indicates the name of the user that the RADIUS server will authenticate.
An unterminated ASCII string identical to the user name that ERPCD/
ACP retrieves via the user name prompt. You can specify up to 31
alphanumeric characters.
Specifies the password of the user that the RADIUS server will
authenticate.
Specifies the response value provided by a CHAPuser in response to the
password challenge.
Indicates the IP address of the Annex authenticating the user or sending
an Accounting packet.
Specifies the Remote Annex port handling the user session. This value
corresponds to the physical port type. Supported port types:
•Async (0)
•ISDN Sync (2)
•ISDN Async V.120 (3)
•Virtual (5)
4-12
Remote Annex Server Tools for Windows NT®User Guide
Chapter 4 Using Security Features
NAS-Port
Framed-Protocol
Specifies the port number to which the user has connected.
NAS–Port number example:
nxxx (decimal)
n=Description
0Serial interface port
2Virtual (VCLI, FTP)
3Dial-out
4Ethernet (outbound)
Although not an attribute, CHAP-Challenge appears in the
Authenticator of the RADIUS header.
Specifies the link level protocol type allo wed to the user. Supported values
are:
•PPP
•SLIP
Service-T ype
Specifies the type of service the user is to receive. Supported types of
service are:
•Login
•Framed
•NAS–Prompt
•Outbound
•Administrative
Remote Annex Server Tools for Windows NT®User Guide
4-13
Chapter 4 Using Security Features
Access-Accept and Access-Reject Attributes
Attributes included in the RADIUS Access-Accept and Access-Reject
packets are ignored by ERPCD/ACP in this version. However, ERPCD/
ACP does instruct the Remote Annex to display an y text sent in a ReplyMessage attribute as long as the user is a CLI or port server user.
RADIUS Accounting
RADIUS Accounting defines a communication standard between a NAS
and a host-based accounting server . It records duration of service, packet
throughput and raw throughput. This section covers the follo wing topics:
•RADIUS Accounting Process
•Accounting-Request Attributes
In order to utilize RADIUS Accounting, you must select the UseRADIUS Logging radio button in the Booting/Logging dialog box.
4-14
Remote Annex Server Tools for Windows NT®User Guide
Chapter 4 Using Security Features
RADIUS Accounting Process
The following table describes the RADIUS accounting process:
When or If...The...
the Remote Annex sends an ACP
Audit-log to the server,
ERPCD/ACP receives a login or
logout log request,
The ERPCD/ACP server receives
the RADIUS Accounting-Response,
security profile for the ACP
Authorization-Request must match
the Security dialog box RADIUS
Regime On/Off toggle switch
setting.
On = RADIUS security active.
Off = NT security active.
ERPCD/ACP sends an AccountingRequest packet to the RADIUS
Accounting server.
ERPCD/ACP returns the ACP audit
log verification PDU to the Remote
Annex.
Accounting-Request Attributes
ERPCD/ACP sends each Accounting-Request packet with the follo wing
attributes:
Acct-Status-Type
Marks whether the Accounting packet sent to the RADIUS server is the
beginning or end of a dial-up session.
•Start (1) - ERPCD/ACP login events
•Stop (2) - ERPCD/ACP logout events
•Accounting-on (7) - ACP logging connection
becomes active
•Accounting-off (8) - A CP audit logging connection becomes
inactive
Remote Annex Server Tools for Windows NT®User Guide
Specifies how many seconds the RADIUS client has been trying to send
a specific Accounting packet.
Specifies how many octets have been received during the session.
Specifies how many octets have been sent during the session.
A unique numeric string identified with the session reported in the packet.
Specifies how the user is authenticated. Always set to RADIUS.
Specifies how many packets have been received during the session.
Specifies how many packets have been sent during the session.
Specifies the elapsed session time as calculated in RADIUS.
All attributes that are included in the Access-Request packet are also
included in the Accounting-Request packet.
RADIUS Configuration Management
4-16
Configuring the RADIUS Authentication and Accounting server inv olves
setting parameters to define the server’s operating and administrative
attributes. This section covers the following topics:
•The RADIUS Servers dialog box:
•RADIUS Servers
•Host Name
•IP Address
•Secret Format
•Response Timeout and Number of Retries Format
•Backup Server
Remote Annex Server Tools for Windows NT®User Guide
Chapter 4 Using Security Features
Default Values
If there is no configuration record for a RADIUS server, the following
default values are used:
RADIUS Authentication Server and Accounting Server
•RADIUS Authentication Server is the host name of the
RADIUS Authentication server.
•Accounting Server is the host name of the RADIUS
Accounting server.
If no Accounting server is specified, it defaults to the A CP serv er. If
no RADIUS server is specified, the RADIUS server defaults to the
ACP server.
Secret Format
The format for secret is an ASCII string or a he xadecimal string. The
hexadecimal string format always starts with0x followed by a string
of bytes, with each two hexadecimal digits indicating one byte. The
maximum limit is 16 in ASCII, or the hexadecimal equivalent.
Each entry in the erpcd.conf file must be contained on one line. Any
amount of white space can exist between keywords, keyword/value
pairs, and semi-colon delimeters. No white space can exist between
the keyword and “=” or the value and “=”.
Remote Annex Server Tools for Windows NT®User Guide
radius server host=132.245.66.11;secret=spikesecret;timeout=5;retries=5;backup=132.245.33.17
radius server host=132.245.33.17;secret=mysecretmysecret;timeout=6;retries=10
radius server host=132.245.33.60;secret=nottimesec;temeout=4;retries=10;backup=132.245.66.18
radius server host=132.245.66.18;secret=hpposecret;timeout=8;retries=12
Response Timeout and Number of Retries Format
The values of Response Timeout and Number of Retries is set in the
RADIUS Servers dialog box.
timeoutThe number of seconds to wait for a response before sending
a retry.
retriesThe number of times to retry before fail-over to the backup
server, or authentication is discontinued.
Fail-over occurs only if host is the original primary server.
This entry must be on one line.
4-18
Remote Annex Server Tools for Windows NT®User Guide
Chapter 4 Using Security Features
Backup Server
The host name or Internet address of the backup RADIUS server or
RADIUS Accounting server can be configured using the RADIUS
Server’s dialog box:
1.From the Server Tools Options dialog box, click on the
Security tab.
2.Select the RADIUS radio button to enable the RADIUS
security server.
If you do not select this option, your security server will default
to native Windows NT
® security.
3.From the Server Tools Options dialog box, click on the
RADIUS Servers tab.
4.Select the Backup Server down arrow to select the backup
RADIUS server or RADIUS accounting server.
IfNoneis displayed in the Backup Server drop–down list,
see Chapter 2, Configuring a RADIUS Server, for more
information on creating a new RADIUS server.
Fail-over Algorithm Process
The following table describes the fail-over algorithm process for
authentication and accounting.
When or If...The...
a user is to be authenticated,RADIUS server first polled is specified
in the Server Tools Options dialog box.
an Access-Request packet is sent
to the RADIUS server,
the time expires,ERPCD/ACP retries the request
(continued on next page)
ERPCD/ACP waits the specified
timeout value (4 seconds by default)
for the response packet.
Remote Annex Server Tools for Windows NT®User Guide
4-19
Chapter 4 Using Security Features
When or If...The...
the maximum number of retries
(10 by default) is reached without
a response from the server,
no response is received from the
backup server,
an accounting fail-over occurs, the
server remains the same until,
both the accounting primary
server and backup fail,
Backup Security
If you configure port server, CLI, VCLI, and PPP security to use W indows
NT
available, the Remote Annex can use its locally-stored password
parameters to restrict user access. These parameters settings serve as
backup security .To use backup security , you must set the parameters listed
in the following table.
attempt to authenticate against the
primary server fails and ERPCD/ACP
attempts to authenticate against the
backup server (if defined).
user is rejected.
failure of the backup server.
the acp_logfile records RADIUS
accounting.
®
domain names and passwords and the ACP security server is not
For:Back-up Security uses:
Port Serverport_password
Incoming Portport_password
VCLIvcli_password
4-20
Remote Annex Server Tools for Windows NT®User Guide
For additional information about back-up security and settings for
these parameters, please refer to the Remote Annex Administrator’sGuide for UNIX.
RADIUS Dictionary File
Included on the distribution kit is a reference RADIUS dictionary file
which will be placed in the security files area. The erpcd server does not
use this file, it is provided as documentation and a conv enience. This file
defines keywords, types, and values for RADIUS attributes and their
corresponding code points. The file is in a format that is used as input by
some RADIUS servers to parse messages, and write text output files.
Customers may have existing dictionaries with dif ferences in the keyword
names, and may want to ev aluate the impact to their databases and output
reports.
The file that we provide includes the latest IETF definitions of the
RADIUS protocol at the time of release. It includes all attributes and
values that are needed to support our Remote Annex and erpcd
implementation. It is not necessary that our definitions be used directly ,
but other dictionaries may have to be extended to cover our usage.
Chapter 4 Using Security Features
This file may be used as a reference to add or change existing RADIUS
dictionaries as need be. Since it is in the format of some of the popular
RADIUS servers, in some cases it may be used as a direct replacement.
Howev er, the network manager should review the dependencies and make
a decision on how to apply the differences.
Remote Annex Server Tools for Windows NT®User Guide
4-21
Chapter 4 Using Security Features
The following is a partial example of the some of the dictionary contents:
ATTRIBUTEUser-Name1string
ATTRIBUTE Password2string
ATTRIBUTECHAP- Password3string
ATTRIBUTENAS-IP-Address4ipaddr
ATTRIBUTENAS-Port5integer
ATTRIBUTEService-Type6integer
ATTRIBUTEFramed-Protocol7integer
ATTRIBUTEFramed-IP-Address8ipaddr
<...>
#Framed Protocols
VALUEFramed-ProtocolPPP1
VALUEFramed-ProtocolSLIP2
VALUEFramed-ProtocolARAP3
VALUEFramed-ProtocolGandalf-SL/MLP4
VALUEFramed-ProtocolIPX/SLIP5
# User Service Types
VALUEService-TypeLogin-User1
VALUEService-TypeFramed-User2
VALUEService-TypeCallback-Login-User3
VALUEService-TypeCallback-Framed-User4
VALUEService-TypeOutbound-User5
VALUEService-TypeAdministrative-User6
VALUEService-TypeNAS-Prompt7
VALUEService-TypeAuthenticate-Only8
VALUEService-TypeCallback-NAS-Prompt9
<...>
4-22
Remote Annex Server Tools for Windows NT®User Guide
Appendix A Browsing for Resources
on a Microsoft Network
Browsing is locating network resources in a Domain or workgroup.
Domains and workgroups are Microsoft's logical grouping of computers
and other resources into managed groups. Browsing is implemented by
accessing Browsers, which are computers that maintain resource lists for
the Domain, rather than trying to directly locate the resource. Therefore
locating a resource becomes a question of locating a Browser. This
location process becomes a problem in subnetted TCP/IP networks
because the location process utilizes UDP broadcasts which are generally
not passed through routers between subnets. IPX is not a problem because
the datagram location mechanisms used are not generally blocked by
routers. Howev er, in mixed protocol environments, the browser will use
TCP/IP. This discussion assumes a TCP/IP only network. Some points
of location and discovery of Browsers are different for other protocols.
This discussion assumes that WINS is not available. The WINS solution
is outlined at the end of the document.
Browser Definition
Browsers are distributed on the network based on the domain, subnet,
and number of workstations. The Browsers are assigned through a
weighted election process that allows replacement of Browsers when they
fail or are shutdown. This can make Bro wsers dif ficult to locate because
they may not always be on the same machine.
Microsoft now provides a Windows Internet Naming Service
(WINS) for the Windows NT
the problems with locating Browsers.
®
server that eliminates many of
Remote Annex Server Tools for Windows NT
®
User Guide
A-1
Appendix A Browsing for Resources on a Microsoft Network
The Primary Domain Controller (PDC) which provides authentication
for the Domain, serves as the Domain Master Browser (DMB). The DMB
has the responsibility of keeping track of and coordinating all the Master
Browsers in the Domain as well as correlating information from other
domains. The PDC wins the DMB election because it is heavily weighted
by being the PDC.
Master Browsers
Subnets
Master Browsers (MB) are located on each subnet and are responsible
for tracking resources on the subnet. They provide updated subnet
resource lists to the DMB and receive domain resource lists from the
DMB. When a MB first comes up, it broadcasts on the subnet asking all
resources to identify themselves. Resources are required to reply within
30 seconds. New resources should announce their presence to the MB.
The MB also exchanges lists with the DMB. This exchange is repeated
every 15 minutes and when new resources announce themselves on the
subnet. Resources are removed from the list when they either announce
their departure or they fail to respond 3 times to the 15 minute update
query (45 minutes).
There should be one MB for each subnet. If the number of active stations
on a subnet exceeds 32, a backup browser is selected for each 32 stations.
The MB is responsible for keeping the backup browser’s browse list up
to date. When a station wants to access a Browser for the first time, it
receives a list (explained below) of all the available browsers on its subnet.
The station caches the location of up to 3 browsers and accesses them in
the future in a random pattern. The browse request load is thereby spread
among the available browsers.
A-2
Remote Annex Server Tools for Windows NT® User Guide
Appendix A Browsing for Resources on a Microsoft Network
Configuration and
Election Process
Browsers are selected through configuration and an election process. It
is possible to set a station to be a MB. This only gives it additional weight
in the election process. Another weight in the election process is the type
®
of operating system running (Microsoft Windows NT
Windo ws for Workgroups). An election is held between all potential MBs
, Windows 95,
to select the MB for the subnet. This process can be affected by such
things as boot speed (after a power failure) and is a very dynamic process.
Except for the DMB, it is not always possible to statically determine the
address of a MB. If the current MB shuts down or certain other conditions
occur, a new MB election can be triggered, although in general, once a
MB has been selected, it remains the MB, even if other stations may no w
be a better weighted choice.
Locating Browsers
The client station maintains a cache of IP addresses and important
services and will first (a)check its cache for browsers. If the cache does
not contain any browsers, the next step is to (b)generate a NetBIOS o ver
IP broadcast to try to locate a MB on its subnet. If the subnet MB responds,
the client will send a directed query to the MB to get a list of browsers
on the subnet. The MB returns a list of browsers on the Domain/subnet
being queried. The client caches up to 3 browsers as previously
mentioned. The broadcast time out occurs if there is no MB on the client’s
subnet. There is no way to direct a client to a MB outside its subnet.
Therefore, if there is no MB on the subnet, a client on that subnet can not
browse. If the client can not find the MB after 3 attempts, a Force Election
broadcast is issued to force election of a new MB for the subnet. Howe ver,
a station on a slow link (remote access) is prevented from being a Browser .
So even if the remote access client is capable of acting as a Browser, the
link type prevents it. A remote access client calling into a subnet with no
MB will be unable to browse the network.
Remote Annex Server Tools for Windows NT® User Guide
A-3
Appendix A Browsing for Resources on a Microsoft Network
The WINS Solution
WINS is a service that runs on a Windo ws NT® server . It is provided with
®
Windo ws NT
services without broadcasts because WINS queries are directed
datagrams. The current version of WINS, along with some client updates,
also assists with browsing across subnets that do not contain Browsers.
A WINS server can provide the location of the PDC which is also the
DMB to a client. When the PDC comes up, it registers a couple of special
names with WINS. These names consist of the domain name followed
by characters <1B> and <1D> (ex. eng<1B> and eng<1D>). These
special names are associated with the IP address of the DMB. When a
client attempts to browse on a subnet with no MB, the client first does a
broadcast to locate the MB, which fails. The client also directs a
NameQuery to WINS asking for the special version of the domain name
followed by <1B>. WINS returns the IP address of the DMB. The client
can then query the DMB for the browse list for the domain.
3.5 or greater. WINS primary function is to pro vided name
Clients
A-4
The following clients can use the enhanced WINS browse capability (are
WINS aware):
•Windows NT
®
•Windows 95
•Windows for Workgroups - with latest drivers
Requires VREDIR.386 included on Windows NT
Requires Microsoft TCP/IP 32 drivers (32 bit TCP/IP)
Remote Annex Server Tools for Windows NT® User Guide
®
3.5 server
Appendix A Browsing for Resources on a Microsoft Network
Required
Configuration Details
The following configuration details are required to make the browsing
operation work correctly:
®
•The PDCs of all domains should be Windows NT
server
Version 3.5 or later.
•All stations must use WINS to allow services to be recorded
properly.
•The client should disable the ability to be a browse master.
This will prevent the client from browsing except when the
user asks for a browse list. This reduces delays caused by
broadcasting for the MB in the background.
•For Windows 95:
–Control panel - Networks - File and Print Sharing for
Note that this is only necessary on clients that will encounter
browsing problems because their broadcast queries will not be
routed correctly. If a master browser exists on the subnet, the
disabling will not be necessary.
Remote Annex Server Tools for Windows NT® User Guide
A-5
Appendix A Browsing for Resources on a Microsoft Network
Remote Annex Example
The Remote Annex forwards IP broadcasts from a remote access client
to the network that the Annex is on. If that network is a subnet that has
no PCs capable of being a master browser, the remote client must be
configured to use WINS to be able to browse Microsoft resources.
Another possible option might be to configure the router to pass IP
broadcasts, but this is probably not desirable.
Number of PCs on the
Subnet
Another issue to consider is the number of PCs on the subnet that can act
as master browsers. The number and type of machines may give
unpredictable behavior for a remote access client. Consider for example,
a remote client that is not configured to use WINS. During the day, the
subnet dialed into has several W indows 95 stations that can act as master
browsers. The PDC and other resources are on a different subnet. When
the client dials in during the day, a broadcast finds one of the Windows
95 systems and browsing works as expected. However, it is company
policy to shut down PCs at night, so when everyone goes home all
Windows 95 machines are shut down. Now the remote client dials in,
broadcasts to the subnet, but no master browsers are a vailable. Browsing
works during the day, but not at night. WINS would overcome this
problem by finding the DMB when the Windo ws 95 machines were not
available.
Note also that the ip_forward_broadcast parameter on the Annex
controls broadcast traffic from the ethernet to the remote client. It has no
effect on broadcasts generated by the client for the ethernet. Client to
ethernet broadcasts are on and can not be configured off. Replies to the
client browser broadcasts are directed datagrams and will not be affected
by the ip_forward_broadcast setting.
A-6
Remote Annex Server Tools for Windows NT® User Guide
Appendix A Browsing for Resources on a Microsoft Network
Resource Visibility
Resolve a Name to an
IP Address
The problem of resource visibility becomes especially important when
the remote “client” is another network that may have resources to be
shared. The remote network should have a machine capable of acting as
a MB. A MB locates resources by broadcasts on its subnet. If there is no
MB on the remote net, there must be one on the network the Annex is on
and the ip_forward_broadcast parameter should be Y to allow the MB
request to reach the resource. WINS will also be useful in this
environment to assure reliable communication between all the browser
components.
Additional Information
When a client tries to resolve a name to an IP address it follows the
following steps:
1.Check internal cache of resolved names.
2.Ask WINS (if enabled).
3.Broadcast to resolve name.
Preload PDC Address
Example
4.Check LMHOSTS file.
Preloading the cache at start-up with the address of the PDC may simplify
the authentication process, even if WINS is configured. It may be required
if WINS is not used. This is done by adding an entry to the client’slmhosts
file.
NT:\Winnt35\System32\Drivers\Etc\lmhosts
Windows 95:\windows\lmhosts
555.555.55.555 servername #PRE #DOM:dept #net
group’s DC
This gives the IP address (555.555.55.555) of the PDC (servername).
Remote Annex Server Tools for Windows NT® User Guide
A-7
Appendix A Browsing for Resources on a Microsoft Network
•#DOM:dept indicates that server name is a domain
controller for the dept domain
•#PRE indicates this entry is preloaded into the cache at startup, this will allow the address to be found when the cache is
searched and eliminate the WINS query and/or broadcast
Workgroups and
Domains
Windows 95 allows specification of a workgroup name (Control Panel Networks - Identification - Workgroup). Users should be aware that
workgroups and domains are very similar concepts. Domain membership
is used for authentication but resource visibility and access can be limited
by workgroup membership. If you log in to the domain but are specified
to be a member of a workgroup other than the domain, resources may not
be visible to you depending on how those resources are configured.
A-8
Remote Annex Server Tools for Windows NT® User Guide
Index
A
Access Control Protocol. See ACP
access security
features, for Windows NT® server 1-2
accesscode attribute 3-6
Accounting Server selection 2-3
ACP 3-1, 4-20
acp_dialup file 2-2, 3-18, 4-5, 4-8