ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
Virtual Private Networking Using IPsec
6-23
v1.0, July 2008
•
IPsec Host.
If you want authentication by the remote gateway, enter a User Name and
Password to be associated with this IKE policy. If this option is chosen, the remote gateway
must specify the user name and password used for authenticating this gateway.
Configuring XAUTH for VPN Clients
Once the XAUTH has been enabled, you must establish user accounts in the User Database to be
authenticated against XAUTH, or you must enable a RADIUS-CHAP or RADIUS-PAP server.
To enable and configure XAUTH:
1.
Select
VPN > IPsec VPN
from the main/submenu.
2.
Click the
IKE Policies
tab and the IKE Policies
screen displays.
3.
You can add
XAUTH
to an existing IKE Policy by clicking
Edit
adjacent to the policy to be
modified or you can create a new IKE Policy incorporating
XAUTH
by clicking
Add.
4.
In the
Extended Authentication
section check the
Edge Device
radio box to use this firewall
as a VPN concentrator where one or more gateway tunnels terminate. You then must specify
the authentication type to be used in verifying credentials of the remote VPN gateways. (Either
the User Database or RADIUS Client must be configured when XAUTH is enabled.)
Note:
If a RADIUS-PAP server is enabled for authentication, XAUTH will first check the
local User Database for the user credentials. If the user account is not present, the
firewall will then connect to a RADIUS server.
Note:
If you are modifying an existing IKE Policy to add
XAUTH
, if it is in use by a
VPN policy, the VPN policy must be disabled before you can modify the IKE
Policy.
Figure 6-11