18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 10: Setting Up Authentication<br />

Authentication overview<br />

Authentication<br />

overview<br />

274<br />

In general, authentication refers to a process that validates a person’s identity<br />

before he or she is allowed to log into a network server. Depending on the<br />

authentication method used, a person must provide a user name and valid<br />

password and/or a special passcode or personal identification number (PIN)<br />

before being logged on to a server. If a user enters an invalid password,<br />

passcode, or PIN the log in request is denied.<br />

There are two basic <strong>Sidewinder</strong> <strong>G2</strong> authentication scenarios: proxy<br />

authentication and <strong>Sidewinder</strong> <strong>G2</strong> administrator authentication. The following<br />

sections describe each scenario.<br />

Proxy authentication<br />

You can configure the <strong>Sidewinder</strong> <strong>G2</strong> to authenticate network users trying to<br />

connect from one side <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong> to another via a Web, SOCKS5,<br />

Telnet, or FTP proxy. You can authenticate proxy use for internal-to-external,<br />

external-to-internal, and internal-to-internal connections.<br />

• Internal-to-external authentication<br />

You can authenticate internal users whenever they try to access a<br />

SOCKS5, Telnet, FTP server, or Web access through the <strong>Sidewinder</strong> <strong>G2</strong>.<br />

While internal users are generally thought to be trusted, authenticating<br />

internal-to-external proxy connections provides an extra level <strong>of</strong> security<br />

and allows you to closely track who is using each Internet service and how<br />

long they are using it. (See Chapter 20 for information on <strong>Sidewinder</strong> <strong>G2</strong><br />

reporting.) For example, you might use this information for internal accounting.<br />

Note that if you do not authenticate internal-to-external proxies, you<br />

can still track Internet usage, but the tracking is done for each machine<br />

address only (not for individual users).<br />

• External-to-internal authentication<br />

You can authenticate SOCKS5, Telnet, FTP, or Web access from the Internet<br />

to hosts on an internal network. For example, an internal network may<br />

have Telnet, FTP, or Web servers that users at another location need to<br />

access via the Internet. In most, if not all cases, your <strong>Sidewinder</strong> <strong>G2</strong> should<br />

be configured to authenticate all external-to-internal proxy connections.<br />

• Internal-to-internal authentication<br />

When your <strong>Sidewinder</strong> <strong>G2</strong> is configured with two Ethernet cards for two<br />

internal networks, you can authenticate SOCKS5, Telnet, FTP, and Web<br />

access from one internal network to a second internal network.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!