D-Link DFL-2500 User Guide - Page 153

Authentication Components

Page 153 highlights

134 Chapter 17. User Authentication • normal users accessing the network • PPPoE/PPTP/L2TP users - using PPP authentication methods • IPsec & IKE users - the entities authentication during the IKE negotiation phases (Implemented by Pre-shared Keys or Certificates. Refer to 22.1.4 IKE Integrity & Authentication.) • IKE XAuth users - extension to IKE authentication, occurring between negotiation phase 1 and phase 2 • user groups - group of users that are subject to same regulation criterion 17.2 Authentication Components D-Link firewalls can either use a locally stored database, or a database on an external server to provide user authentication. 17.2.1 Local User Database(UserDB) The Local User Database is a built-in registry inside D-Link firewalls, containing the profiles of the legal users and user groups. Users' names and passwords can be configured into this database, and the users having same privileges can be grouped up to ease the administration. One user can be stored as a member into more than one group, any change made to the group propagates to each group member. Passwords are stored in the configuration using reversible cryptography. This is in order to be compatible with various challenge-response authentication methods such as CHAP, and so forth. When the local user database is enabled, the firewall consults its internal user profiles to authenticate the user before approving any user's request. 17.2.2 External Authentication Server In a larger network topology, it is preferable to have one central database within a dedicated server or a cluster of servers to handle all the D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

134
Chapter 17. User Authentication
normal users accessing the network
PPPoE/PPTP/L2TP users
– using PPP authentication methods
IPsec & IKE users
– the entities authentication during the IKE negotiation phases
(Implemented by
Pre-shared Keys
or
Certificates
. Refer to
22.1.4
IKE Integrity & Authentication
.)
IKE XAuth users
– extension to IKE authentication, occurring between negotiation
phase 1 and phase 2
user groups
– group of users that are subject to same regulation criterion
17.2
Authentication Components
D-Link firewalls can either use a locally stored database, or a database on
an external server to provide user authentication.
17.2.1
Local User Database(UserDB)
The
Local User Database
is a built-in registry inside D-Link firewalls,
containing the profiles of the legal users and user groups. Users’ names and
passwords can be configured into this database, and the users having same
privileges can be grouped up to ease the administration.
One user can be stored as a member into more than one group, any change
made to the group propagates to each group member. Passwords are stored
in the configuration using
reversible cryptography
. This is in order to be
compatible with various challenge-response authentication methods such as
CHAP
, and so forth.
When the local user database is enabled, the firewall consults its internal
user profiles to authenticate the user before approving any user’s request.
17.2.2
External Authentication Server
In a larger network topology, it is preferable to have one central database
within a dedicated server or a cluster of servers to handle all the
D-Link Firewalls User’s Guide