Abstract
Authentication is necessary when utilizing client-to-site or remote-access virtual private network (VPN) connections to ensure only authorized users are able to access resources inside the network. VPN-1/Firewall (FW)-1 next-generation provides with several different authentication schemes and user authentication methods, and one of them should be chosen to suit the organization's needs. This chapter describes the various options and provides some examples of the way they might be implemented into the current security policy structure. Some of the options available for authenticating users are SecurID, RADIUS, TACACS, operating system (OS) password, and VPN-1/FW-1 authentication. This chapter covers several authentication options in the policy. SecurlD is a two-factor authentication method that means two pieces of information are required before access is granted: a password and a token. Authentication via OS password means that FW-1 will refer to the user's account in the operating system for authentication.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Check Point Next Generation with Application Intelligence Security Administration
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.