ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Virtual Private Networking Using IPsec Connections
7-41
v1.0, January 2010
server in the network when a user requests access to network resources. During the establishment
of a VPN connection, the VPN gateway can interrupt the process with an XAUTH request. At that
point, the remote user must provide authentication information such as a user name and password
or some encrypted response using his user name and password information. The gateway then
attempts to verify this information first against a local user database (if RADIUS-PAP is enabled)
and then by relaying the information to a central authentication server such as a RADIUS server.
To configure primary and backup RADIUS servers:
1.
Select
VPN
>
IPSec VPN
from the menu. The IPsec VPN submenu tabs appear with the IKE
Policies screen in view.
2.
Click the
RADIUS Client
submenu tab.
The RADIUS Client screen displays.
Figure 7-24
Содержание ProSecure
Страница 6: ...v1 0 January 2010 vi ...
Страница 16: ...ProSecure Unified Threat Management UTM Appliance Reference Manual xvi v1 0 January 2010 ...
Страница 34: ...ProSecure Unified Threat Management UTM Appliance Reference Manual 1 16 Introduction v1 0 January 2010 ...
Страница 114: ...ProSecure Unified Threat Management UTM Appliance Reference Manual 4 28 LAN Configuration v1 0 January 2010 ...
Страница 468: ...ProSecure Unified Threat Management UTM Appliance Reference Manual E 2 Related Documents v1 0 January 2010 ...