
246
Limiting user access
Configuring users for internal authentication
3
In the User Account Properties dialog box, on the VPN tab, do the following:
4
If the drop-down list does not contain any user groups, on the Groups tab, do one of the following:
On the VPN tab, in the Select a primary IKE user group drop-down list, select the group.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the tool bar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
6
After creating an IKE-enabled user account, you can use it in the following ways:
■
Add it to a rule for authentication
■
Use it as the remote endpoint in a Client VPN tunnel
■
Use it as the basis for a clientless VPN role
IKE enabled
To make the user an IKE-enabled user, check
IKE enabled
.
When this option is checked, the user can be used as the remote endpoint of a VPN
tunnel.
Phase 1 ID
If you checked IKE enabled, in the Phase 1 ID text box, type the Phase 1 ID for the
first key tunnel negotiations with the local security gateway.
This entry must match the Phase 1 ID used in the security gateway network entity
properties dialog box.
Authentication Method Under Authentication Method, do one of the following:
■
To give the user permission to use certificates for authentication, check
Certificate
.
■
To give the user permission to use a shared secret to authenticate, check
Shared
secret
, and then type the shared secret in the text box.
The shared secret must be at least 20 characters in length.
Reveal
To display the shared secret, click
Reveal
. When you click Reveal, the shared secret
appears in clear text and the button becomes a Hide button.
Generate
To generate a shared secret, click
Generate
.
Select a primary IKE
user group from the list
of user groups that
include this user
Select a primary IKE user group from the drop-down list.
This drop-down list contains the names of all the groups of which this user is a
member.
To select an existing user group
for the user
Click the
+
button.
In the Select User Group dialog box, select a user group.
Click
OK
.
To create a new user group for
the user
Click the
+
button.
In the Select User Group dialog box, click the
+
button.
In the User Group Properties dialog box, on the General tab, in the User
group name text box, type a name for the user group.
Click
OK
.
In the Select User Group dialog box, select the group, and then click
OK
.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...