Creating the LDAP Server Profile
When you configure AsyncOS to use LDAP directories, you create an LDAP server profile to store the information about the LDAP server.
Procedure
Step 1 | [New Web Interface Only] On the Security Management appliance, click | ||
Step 2 | Choose Management Appliance > System Administration > LDAP. | ||
Step 3 | Click Add LDAP Server Profile. | ||
Step 4 | Enter a name for the server profile in the LDAP Server Profile Name text field. | ||
Step 5 | Enter the host name for the LDAP server in the Host Name(s) text field. You can enter multiple host names to configure the LDAP servers for failover or load-balancing. Separate multiple entries with commas. For more information, see Configuring AsyncOS to Work With Multiple LDAP Servers. | ||
Step 6 | Select an authentication method. You can use anonymous authentication or specify a user name and passphrase.
| ||
Step 7 | Select the LDAP server type: Active Directory, OpenLDAP, or Unknown or Other. | ||
Step 8 | Enter a port number. The default port is | ||
Step 9 | Enter a base DN (distinguishing name) for the LDAP server. If you authenticate with a user name and a passphrase, the user name must include the full DN to the entry that contains the passphrase. For example, a user with an email address of
| ||
Step 10 | Under Advanced, select whether to use SSL when communicating with the LDAP server. | ||
Step 11 | Enter the cache time-to-live. This value represents the amount of time to retain caches. | ||
Step 12 | Enter the maximum number of retained cache entries. | ||
Step 13 | Enter a maximum number of simultaneous connections. If you configure the LDAP server profile for load balancing, these connections are distributed among the listed LDAP servers. For example, if you configure 10 simultaneous connections and load balance the connections over three servers, AsyncOS creates 10 connections to each server, for a total of 30 connections. For more information, see Load Balancing.
| ||
Step 14 | Test the connection to the server by clicking the Test Server(s) button. If you specified multiple LDAP servers, they are all tested. The results of the test appear in the Connection Status field. For more information, see Testing LDAP Servers. | ||
Step 15 | Create spam quarantine queries by selecting the check box and completing the fields. You can configure the quarantine end-user authentication query to validate users when they log in to the end-user quarantine. You can configure the alias consolidation query so that end-users do not receive quarantine notices for each email alias. To use these queries, select the “Designate as the active query” check box. For more information, see Configuring LDAP Queries. | ||
Step 16 | Test the spam quarantine queries by clicking the Test Query button. Enter the test parameters and click Run Test. The results of the test appear in the Connection Status field. If you make any changes to the query definition or attributes, click Update.
| ||
Step 17 | Submit and commit your changes. Active Directory server configurations do not allow authentication through TLS with Windows 2000. This is a known issue with Active Directory. TLS authentication for Active Directory and Windows 2003 does work.
|