Setting Up Remote VPN Access for Users
404
Nokia IP60 Security Appliance User Guide
a)
Click
Clear Expired
.
A confirmation message appears.
b)
Click
OK
.
The expired users are deleted.
Setting Up Remote VPN Access for Users
If you are using your IP60 appliance as a SecuRemote Remote Access VPN Server, as an internal VPN
Server, or as an L2TP VPN Server, you can allow users to access it remotely through their Remote Access
VPN Clients (a Check Point SecureClient, Check Point SecuRemote, an L2TP VPN Client, or another
Nokia IP60 appliance).
To set up remote VPN access for a user
1.
Enable your VPN Server, using the procedure
Setting Up Your Nokia IP60 Appliance as a
VPN Server
on page 347.
2.
Add or edit the user, using the procedure
Adding and Editing Users
on page 399.
You must select the
VPN Remote Access
option.
Using RADIUS Authentication
You can use Remote Authentication Dial-In User Service (RADIUS) to authenticate both IP60 appliance
users and Remote Access VPN Clients trying to connect to the IP60 appliance.
Note:
When RADIUS authentication is in use, Remote Access VPN Clients must
have a certificate.
When a user tries to log on to the Nokia IP60 Portal, the IP60 appliance sends the entered user name and
password to the RADIUS server. The server then checks whether the RADIUS database contains a
matching user name and password pair. If so, then the user is logged on.
By default, all RADIUS-authenticated users are assigned the set of permissions specified in the Nokia IP60
Portal's
RADIUS
page. However, you can configure the RADIUS server to pass the IP60 appliance a specific
set of permissions to grant the authenticated user, instead of these default permissions. This is done by
configuring the RADIUS Vendor-Specific Attribute (VSA) with a set of attributes containing permission
information for specific users. If the VSA is configured for a user, then the RADIUS server passes the VSA
to the IP60 appliance as part of the response to the authentication request, and the gateway assigns the user
permissions as specified in the VSA. If the VSA is not returned by the RADIUS server for a specific user,
the gateway will use the default permission set for this user.
In addition, you can configure the RADIUS server to pass the IP60 appliance a Secure HotSpot session
timeout value. When the RADIUS server's Session-Timeout Attribute is configured, HotSpot users will be
logged off after the specified session timeout has elapsed.
Summary of Contents for IP60 - Security Appliance
Page 1: ...Part No N450000643 Rev 001 Published February 2008 Nokia IP60 Security Appliance User Guide ...
Page 4: ...4 Nokia IP60 Security Appliance User Guide ...
Page 10: ......
Page 12: ......
Page 38: ......
Page 58: ......
Page 108: ......
Page 268: ......
Page 482: ......