18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring a VPN client<br />

Chapter 14: Configuring Virtual Private Networks<br />

<strong>Sidewinder</strong> <strong>G2</strong> VPN overview<br />

To establish an encrypted session between a laptop or desktop computer with<br />

the <strong>Sidewinder</strong> <strong>G2</strong> and gain access to a trusted network, the user needs to<br />

install a VPN client. For details on installing and configuring your VPN client,<br />

consult your product documentation.<br />

In many cases the VPN client will be S<strong>of</strong>tRemote ® . Secure Computing and<br />

SafeNet partner to make that VPN client available from Secure Computing.<br />

When you order your S<strong>of</strong>tRemote client s<strong>of</strong>tware from Secure Computing, you<br />

receive a copy <strong>of</strong> the VPN <strong>Administration</strong> <strong>Guide</strong> available. This guide is also<br />

available at www.securecomputing.com/goto/manuals. It provides detailed<br />

instructions for implementing a VPN using a <strong>Sidewinder</strong> <strong>G2</strong> and S<strong>of</strong>tRemote.<br />

Extended Authentication for VPN<br />

The Extended Authentication (XAUTH) option provides an additional level <strong>of</strong><br />

security to your VPN network. In addition to the normal authentication checks<br />

inherent during the negotiation process at the start <strong>of</strong> every VPN association,<br />

Extended Authentication goes one step further by requiring the person<br />

requesting the VPN connection to validate their identity. The Extended<br />

Authentication option is most useful if you have travelling employees that<br />

connect remotely to your network using laptop computers. If a laptop computer<br />

is stolen, without Extended Authentication it might be possible for an outsider<br />

to illegally access your network. This is because the information needed to<br />

establish the VPN connection (the self-signed certificate, etc.) is saved within<br />

the VPN client s<strong>of</strong>tware. When Extended Authentication is used, however, a<br />

connection will not be established until the user enters an additional piece <strong>of</strong><br />

authentication information that is not saved on the computer—either a onetime<br />

password, passcode, or PIN. This additional level <strong>of</strong> authentication<br />

renders the VPN capabilities <strong>of</strong> the laptop useless when in the hands <strong>of</strong> a thief.<br />

Implementing Extended Authentication on the <strong>Sidewinder</strong> <strong>G2</strong> is a simple two<br />

step process.<br />

1 Specify the authentication method(s) that are available on your <strong>Sidewinder</strong><br />

<strong>G2</strong> See “Supported authentication methods” on page 277 for information on<br />

supported methods.<br />

Do this by selecting VPN Configuration > ISAKMP Server, then enabling<br />

the desired methods in the Available Authentication Methods field. See<br />

“Configuring the ISAKMP server” on page 402 for details.<br />

399

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!