18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Administrator authentication<br />

Chapter 10: Setting Up Authentication<br />

Authentication overview<br />

When you log into the <strong>Sidewinder</strong> <strong>G2</strong>, you are authenticated using either<br />

standard UNIX password authentication or a stronger form <strong>of</strong> authentication,<br />

such as SafeWord PremierAccess. If standard UNIX password authentication<br />

is used, the password you provide is maintained in the user database, and the<br />

<strong>Sidewinder</strong> <strong>G2</strong> checks the database to validate your password. Dynamic<br />

passwords, called passcodes, or challenge/response information generated for<br />

stronger authentication methods are not stored on the <strong>Sidewinder</strong> <strong>G2</strong>. Instead,<br />

they are located on the associated authentication server. (Strong<br />

authentication is described in the next section.) The default administrator<br />

authentication method is configured in the Firewall Accounts window. For<br />

information on configuring the default administrator authentication method, see<br />

“Setting up and maintaining administrator accounts” on page 43.<br />

Administrators can use Telnet or SSH to access a <strong>Sidewinder</strong> <strong>G2</strong> via a<br />

command line interface. By default, standard UNIX password authentication is<br />

used to validate this type <strong>of</strong> remote login attempt.<br />

Note: Secure Computing recommends using a strong authentication method for<br />

login attempts from a remote server.<br />

Weak versus strong authentication<br />

Secure Computing uses the terms “weak” and “strong” when referring to the<br />

level <strong>of</strong> security provided by an authentication method. The differences are<br />

discussed in the following section.<br />

Weak authentication<br />

A weak authentication method merely requires a user to enter the same<br />

password each time he or she logs on. The “standard” UNIX password process<br />

is considered to be a weak authentication method. If someone “sniffs” the<br />

password <strong>of</strong>f the phone line or network as it is transmitted, they can<br />

conceivably use that password to break into the system. Because your internal<br />

network is thought to be “trusted,” this type <strong>of</strong> authentication is generally used<br />

for authenticating internal-to-external proxy connections.<br />

275

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!