Authentication Rules - D-Link DFL-1600 User Manual

Network security firewall
Hide thumbs Also See for DFL-1600:
Table of Contents

Advertisement

136
HTTPS
– Authentication via secure web browsing. Similar to HTTP agent
except that Host & Root Certificates are used to establish SSL
connection to the firewall.
(refer to
22.3 SSL/TLS
XAUTH
– Authentication during IKE negotation in IPsec VPN (if the IPSec
tunnel has been configured to require XAUTH authentication).
(refer to
22.1.4 IKE
PPP
– Authentication when PPTP/L2TP tunnels are set up (if the
PPTP/L2TP tunnel has been configured to require user
authentication).
(refer to
9.4.1
17.2.4

Authentication Rules

A user authentication rule specifies:
From where (i.e. receiving interface, source network) users are allowed
to authenticate to the firewall;
Which agent will be used by the firewall to prompt users the
authentication request.
Where is the location of the database that the firewall consults to
perform the authentication, either in a local registry or from the
external server;
Different timeout restrictions to logout the authenticated users
automatically.
When using XAUTH agent, there is no need to specify the receiving
interface, or source network, as this information is not available at the
XAUTH phase. For the same reason, only one XAUTH user authentication
rule can be defined. XAUTH is only used to set up IPsec VPN tunnels.
(HTTPS))
XAuth)
PPP, and
22.2 PPTP/
Note
D-Link Firewalls User's Guide
Chapter 17. User Authentication
L2TP)

Advertisement

Table of Contents
loading

Table of Contents