18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring password<br />

information on the<br />

Authentication tab<br />

Configuring VPN Security Associations<br />

Password—Select this option if you and the remote end want to use<br />

a password to verify the key exchange. The same password must<br />

be used on both ends <strong>of</strong> this association. See “Configuring<br />

password information on the Authentication tab” on page 13-57 for<br />

detailed information.<br />

Certificate + Certificate Authority—Select this option if you want to<br />

use one or more trusted CAs and Remote Identities to validate the<br />

certificate <strong>of</strong> the remote end. This method is commonly used by<br />

organizations that have many remote users who must access<br />

resources behind the <strong>Sidewinder</strong> <strong>G2</strong>. See “Entering Certificate +<br />

Certificate Authority information on the Authentication tab” on<br />

page 13-59 for detailed information.<br />

Single certificate—Select this option if you want to validate the<br />

remote end using a self-signed certificate generated by the<br />

<strong>Sidewinder</strong> <strong>G2</strong>, or using a certificate generated by a CA server.<br />

This method is commonly used by organizations that have a small<br />

number <strong>of</strong> people that travel but need secure access to your<br />

network. See “Entering Single Certificate information on the<br />

Authentication tab” on page 13-61 for detailed information.<br />

Manual—Select this option if you want to exchange session keys<br />

manually (for example over the phone). See “Entering Manual<br />

information on the Authentication tab” on page 13-62 for detailed<br />

information.<br />

The first three methods are automatic methods, meaning the session<br />

keys are managed automatically between the <strong>Sidewinder</strong> <strong>G2</strong> and the<br />

remote end. The ISAKMP server must be enabled on the <strong>Sidewinder</strong><br />

<strong>G2</strong> in order to automatically generate and exchange session keys. See<br />

“Configuring the ISAKMP server” on page 13-11 for information. The<br />

remote end <strong>of</strong> the VPN must also support ISAKMP.<br />

With the manual method, matching session keys must be entered<br />

manually at the <strong>Sidewinder</strong> <strong>G2</strong> remote end. Each <strong>of</strong> these<br />

authentication methods are described in the following sections.<br />

The password information tabs in the Authentication window are<br />

used to define password authentication for this VPN association. The<br />

password is used to authenticate both peers in a potential VPN<br />

association. To configure password information, follow the steps<br />

below.<br />

Note: Password-based authentication should only be used with fixed IP-configured VPN<br />

or with extended authentication.<br />

Configuring Virtual Private Networks 13-57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!