Create IPv6 Network Settings on a Primary or Replica Instance
On the Amazon Web Services virtual appliance, the Hyper-V virtual appliance, and the VMware virtual appliance, you can create IPv6 network settings to support IPv6-compliant agents. The Azure virtual appliance only supports IPv4 network settings.
AM supports the TCP agent protocol. By default, AM port 5500 supports IPv4- and IPv6-compliant agents. For all other services and ports, IPv4 is supported. Configuring IPv6 in the Operations Console does not enable its use for communications between the primary instance and replica instances.
Procedure
In the Operations Console, click Administration > Network > Appliance Network Settings.
Click Edit Network Settings.
Under IPv6 Settings, check Enable for IPv6.
In the IPv6 Address field, enter a valid IPv6 address, for example, 2001:0db8:85a3:0000:0000:8a2e:0370:7335.
In the IPv6 Prefix field, enter a prefix length, for example, 64.
Click Next.
The Operations Console displays a review page.
Select Yes, change the network settings, and click Change Network Settings.
AM restarts services.
After you finish
- Update the DNS server with the new IP address.
- RSA RADIUS uses the new IPv6 network settings and the existing IPv4 network settings to listen for RADIUS clients on ports 1645 and 1812. To specify that RSA RADIUS should only use the IPv4 network settings, see Prevent RSA RADIUS from Using IPv6 Network Settings on RADIUS Server Ports.
Related Articles
Change the Hostname of a Primary or Replica Instance in Azure 187Number of Views Primary or Replica Instance Network Settings Updates 146Number of Views ITIM Collector fails with 'java.net.BindException: Address already in use' error in RSA Identity Governance & Lifecycle 62Number of Views Enable or disable Authentication on Primary and Replica servers. 60Number of Views Changing Internal IP address on the Crossovers in a LogSmart Environment 36Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators