Extended Authentication (Xauth) - THOMSON SpeedTouch 608WL Configuration Manual

Wireless business dsl router ipsec configuration guide
Hide thumbs Also See for SpeedTouch 608WL:
Table of Contents

Advertisement

Chapter 6
Advanced Features
What is ...
How does it work
176

6.3 Extended Authentication (XAuth)

Extended Authentication, commonly referred to as the XAuth protocol, allows for
performing extra user authentication. A typical practical example is the mixed use
of IKE tunnel negotiation using preshared key as authentication method and on top
of that doing Extended Authentication.
The VPN client functionality built in the SpeedTouch™ supports the (optional) use
of XAuth. It acts as a XAuth client. In order to use this functionality, it needs to be
connected to a remote IPSec gateway capable of handling the XAuth protocol.
The VPN server functionality built in the SpeedTouch™ also supports the use of
XAuth as an XAuth server. It uses an internal list of authorized users.
SpeedTouch
620
After the Phase 1 negotiation has been successful (1), the remote IPSec gateway will
request the XAuth username and password (2). Typically, the remote IPSec device
will now contact a RADIUS server (3) to check for the credentials. If the XAuth
authentication is successful, Phase 2 tunnel setup (4) will be initiated.
The VPN server in the SpeedTouch™ uses an internal list of authorized
users. It does not need a RADIUS server to check the credentials.
In the CLI, the XAuth settings are found in the VPNCLIENT and VPNSERVER
command groups.
Phase 1
negotiation
XAuth
authentication
Phase 2
negotiation
Black network
Remote IPSec
gateway
RADIUS
authentication
RADIUS
server
E-DOC-CTC-20051017-0169 v0.1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Speedtouch 620

Table of Contents