D-Link DFL-2500 User Guide - Page 154

Authentication Agents

Page 154 highlights

17.2. Authentication Components 135 authentication information. When there are more than one firewall in the network and thousands of users added or removed constantly, the administrator will not have to configure and maintain separate databases of authorized user profiles on each firewall. Instead, the external server can validate the username/password against its central database, which is easily administered. D-Link firewalls support the use of RADIUS(Remote Authentication Dial-in User Service) Server to offer external authentication feature. RADIUS is currently the most prevalent standard for remote authentication. As the protocol defines, it uses PPP to transfer the username/password message between RADIUS client and the server, and hence, applies the same authentication schemes as PPP, like PAP and CHAP. Originally developed for dial-up remote access, RADIUS is now supported by VPN, wireless access points, and other network access types. A RADIUS client, i.e. D-Link firewall, sends user credentials and connection parameter information in the form of a RADIUS message to a RADIUS server. The RADIUS server maintains all the users and user groups profiles. It authenticates and authorizes the RADIUS client request, and sends back a RADIUS message response. RADIUS authentication messages are sent as UDP messages via UDP port 1812. One or more external servers can be defined in the firewall to improve the availability of the RADIUS system. To provide security for RADIUS messages, a common shared secret is configured on both the RADIUS client and the server. The shared secret enables basic encryption of the user's password when the RADIUS message is transmitted from the RADIUS client to the server, and is commonly configured as a relatively long text string. It can contain up to 100 characters and is case sensitive. 17.2.3 Authentication Agents Four different agents built in the firewall can be used to perform username/password authentication. They are: • HTTP - Authentication via web browsing. Users surf on the firewall and login either through a HTML form or a 401 Authentication Required dialog. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

17.2. Authentication Components
135
authentication information. When there are more than one firewall in the
network and thousands of users added or removed constantly, the
administrator will not have to configure and maintain separate databases of
authorized user profiles on each firewall. Instead, the external server can
validate the username/password against its central database, which is easily
administered. D-Link firewalls support the use of
RADIUS(Remote
Authentication Dial-in User Service) Server
to offer external authentication
feature.
RADIUS is currently the most prevalent standard for remote
authentication. As the protocol defines, it uses PPP to transfer the
username/password message between RADIUS client and the server, and
hence, applies the same authentication schemes as PPP, like
PAP
and
CHAP
. Originally developed for dial-up remote access, RADIUS is now
supported by VPN, wireless access points, and other network access types.
A RADIUS client, i.e. D-Link firewall, sends user credentials and
connection parameter information in the form of a RADIUS message to a
RADIUS server. The RADIUS server maintains all the users and user
groups profiles. It authenticates and authorizes the RADIUS client request,
and sends back a RADIUS message response. RADIUS authentication
messages are sent as UDP messages via UDP port 1812. One or more
external servers can be defined in the firewall to improve the availability of
the RADIUS system.
To provide security for RADIUS messages, a common
shared secret
is
configured on both the RADIUS client and the server. The shared secret
enables basic encryption of the user’s password when the RADIUS message
is transmitted from the RADIUS client to the server, and is commonly
configured as a relatively long text string. It can contain up to 100
characters and is case sensitive.
17.2.3
Authentication Agents
Four different agents built in the firewall can be used to perform
username/password authentication. They are:
HTTP
– Authentication via web browsing. Users surf on the firewall and
login either through a HTML form or a 401
Authentication Required
dialog.
D-Link Firewalls User’s Guide