Configure Xauth For Vpn Clients - NETGEAR ProSafe SRX5308 Reference Manual

Gigabit quad wan ssl vpn firewall
Hide thumbs Also See for ProSafe SRX5308:
Table of Contents

Advertisement

Note:
If a RADIUS-PAP server is enabled for authentication, XAUTH first
checks the local user database for the user credentials. If the user
account is not present, the VPN firewall then connects to a RADIUS
server.

Configure XAUTH for VPN Clients

Once the XAUTH has been enabled, you need to establish user accounts in the user
database to be authenticated against XAUTH, or you need to enable a RADIUS-CHAP or
RADIUS-PAP server.
Note:
You cannot modify an existing IKE policy to add XAUTH while the
IKE policy is in use by a VPN policy. The VPN policy needs to be
disabled before you can modify the IKE policy.
To enable and configure XAUTH:
1.
Select VPN > IPSec VPN. The IPSec VPN submenu tabs display, with the IKE Policies
screen in view (see
2.
In the List of IKE Policies table, click the Edit table button to the right of the IKE policy for
which you want to enable and configure XAUTH. The Edit IKE Policy screen displays. This
screen shows the same fields as the Add IKE Policy screen (see
3.
In the Extended Authentication section of the screen, complete the settings as explained the
following table:
Table 41. Extended authentication settings
Setting
Select one of the following radio buttons to specify whether or not Extended Authentication (XAUTH) is
enabled, and, if enabled, which device is used to verify user account information:
• None. XAUTH is disabled. This the default setting.
• Edge Device. The VPN firewall functions as a VPN concentrator on which one or more gateway
tunnels terminate. The authentication modes that are available for this configuration are User
Database, RADIUS PAP, or RADIUS CHAP.
• IPSec Host. The VPN firewall functions as a VPN client of the remote gateway. In this configuration
the VPN firewall is authenticated by a remote gateway with a user name and password combination.
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
Figure 104
on page 160).
Description
Virtual Private Networking Using IPSec Connections
173
Figure 105
on page 161).

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents