4-9
VPN 3000 Series Concentrator Getting Started
78-15733-03
Chapter 4 Using the Command-Line Interface for Quick Configuration
Configuring Authentication
To bypass this step and continue quick configuration, enter
6
. If you enabled IPSec tunneling protocol,
skip to the
“Configuring the IPSec Group” section on page 4-14
; otherwise skip to the
“Changing the
Admin Password” section on page 4-17
.
Configuring Internal Authentication Server and User Database
The VPN Concentrator internal authentication server lets you enter a maximum of 100 groups and users
(combined) in its database, which is adequate for a small user base. For larger numbers of users, we
recommend using an external authentication server.
To use the internal server, you must create a database with at least one user, each with a user name and
password, and—if you specified per-user address assignment—an IP address and subnet mask. To do so,
follow these steps:
Step 1
You selected the VPN concentrator internal authentication server, and the system prompts you to add
users to the internal authentication server database. When you start quick configuration, the user
database is empty.
Current Users
-------------------------------------------------------------------------
No Users
-------------------------------------------------------------------------
1) Add a User
2) Delete a User
3) Continue
Quick -> _
At the cursor, enter
1
to add a user.
Step 2
The system prompts you to enter the user name. To be authenticated, the user must log in from the client
using this name.
> User Name
Quick -> _
At the cursor, enter a unique user name; for example, simonz. The maximum is 32 characters,
case-sensitive.
Step 3
The system prompts you to enter the password for this user. To be authenticated, the user must log in
from the client using this password. Each user name and password combination must be unique.
> Password
Quick -> _
At the cursor, enter the user password; for example, 9se7pt14. It must be at least 8 characters long; the
maximum is 32 characters, case-sensitive. The system displays only asterisks.
Step 4
The system prompts you to verify the password for this user.
Verify -> _
At the cursor, re-enter the user password. The system displays only asterisks.
If you specified per-user address assignment, continue with the next two steps. Otherwise, skip them.