Using Xauth For User Authentication - ZyXEL Communications ZyWall 35 Support Notes

Zyxel zywall 35: user guide
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 Support Notes

Using xAuth for User Authentication

IKE Extended Authentication (Xauth) is a draft RFC developed by the Internet Engineering Task Force
(IETF) based on the Internet Key Exchange (IKE) protocol. The Xauth feature is an enhance to the
existing Internet Key Exchange (IKE) Protocol feature. Xauth allows authentication methods to perform
user authentication in a separate phase after the IKE authentication phase 1 exchange. The Xauth feature
is an extension to the IKE feature, and does not replace IKE authentication.
Before Xauth, IKE only supported authentication of the device, not authentication of the user using the
device. With Xauth, IKE can now authenticate the user using the device after the device has been
authenticated during normal IKE authentication.
Since remote users may use the same pre-shared key for device authentication, it may have some problem
once the key is compromised. Otherwise, an extra authentication would be more.
228
All contents copyright (c) 2006 ZyXEL Communications Corporation.

Advertisement

Table of Contents
loading

Table of Contents