RADIUS/ACE Services
Issue 4 May 2005
125
Settings
RADIUS attempts before assuming failure - Integer from 1 to 10 indicating the number of
attempts the security gateway makes before timing out with a failure. The default is 3.
RADIUS time-out before assuming failure - Time in seconds from 10 to 500. This value is the
total number of seconds that the security gateway waits for a response from any specified
RADIUS server before timing out with a failure. The default is 6 seconds.
RADIUS concepts
For additional user authentication, the VSUs support the Remote Authentication Dial-In User
Services (RADIUS) protocol, thus providing stronger Client authentication and accounting
mechanisms via third-party products such as Ascend Access Control™ and RSA Security ACE/
Server™ AccessManager.
Using RADIUS, remote users must pass the RADIUS server’s authentication mechanism in
order to connect to a corporate network. This authentication process is summarized as follows:
●
First, the user initiates communication with a VPN member.
●
The VPN traffic is processed by VPNremote and then sent to the target security gateway.
●
The security gateway identifies then incoming traffic as new VPN traffic and initiates a
request to the RADIUS server for user authentication requirements.
●
The RADIUS server responds to the security gateway indicating authentication is required.
●
The security gateway challenges the user to provide the required authentication
information.
●
The user enters the required authentication information via a prompt displayed by
VPNremote. This challenge response is sent back to the security gateway.
●
The security gateway forwards the challenge response to the RADIUS server.
●
The RADIUS server decides if the user has met the challenge, and if so, informs the
security gateway that the user is authorized. The RADIUS server also forwards the user
configuration details, known as user attributes, to the security gateway. These attributes
specify VPN-specific information, including the cryptographic keys used for encryption.
●
The security gateway then allows VPN traffic to flow between the VPNremote Client and
the VPN members.
Two methods of user authentication—simple passwords and “one-time” passwords based on
two-factor authentication mechanisms—can be used to meet a variety of security, cost, and
convenience requirements. All RADIUS implementations support standard password
authentication, and many can be used in conjunction with RSA Security ACE/Server for
SecurID™ Token requirements.
Содержание 3.7
Страница 1: ...VPNmanager Configuration Guide Release 3 7 670 100 600 Issue 4 May 2005...
Страница 4: ......
Страница 20: ...Preface 20 Avaya VPNmanager Configuration Guide Release 3 7...
Страница 32: ...Overview of implementation 32 Avaya VPNmanager Configuration Guide Release 3 7...
Страница 53: ...Preferences Issue 4 May 2005 53 Figure 16 Tunnel End Point Policy...
Страница 54: ...Using VPNmanager 54 Avaya VPNmanager Configuration Guide Release 3 7...
Страница 244: ...Using advanced features 244 Avaya VPNmanager Configuration Guide Release 3 7...
Страница 292: ...Upgrading firmware and licenses 292 Avaya VPNmanager Configuration Guide Release 3 7...