Quick Reference Guide

Table Of Contents
86 | Chapter 5: Virtual Private Networking Using IPsec
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
Auth. Authentication Algorithm used for the VPN tunnel. The default setting using the
VPN Wizard is SHA1. (This setting must match the remote VPN.)
Encr. Encryption algorithm used for the VPN tunnel. The default setting using the VPN
Wizard is 3DES. (This setting must match the remote VPN.)
Action. Allows you to access individual policies to make any changes or modifications.
Configuring Extended Authentication (XAUTH)
When connecting many VPN clients to a VPN firewall, an administrator may want a unique
user authentication method beyond relying on a single common preshared key for all clients.
Although the administrator could configure a unique VPN policy for each user, it is more
convenient for the VPN firewall to authenticate users from a stored list of user accounts.
XAUTH provides the mechanism for requesting individual authentication information from the
user, and a local User Database or an external authentication server, such as a RADIUS
server, provides a method for storing authentication information centrally in the local network.
You can enable XAUTH when adding or editing an IKE Policy. Two types of XAUTH are
available:
Edge Device. If this is selected, the VPN firewall is used as a VPN concentrator where
one or more gateway tunnels terminate. If this option is chosen, you must specify the
authentication type to be used in verifying credentials of the remote VPN gateways: User
Database, RADIUS-PAP, or RADIUS-CHAP.
IPsec Host. If you want authentication by the remote gateway, enter a User Name and
Password to be associated with this IKE policy. If this option is chosen, the remote
gateway must specify the user name and password used for authenticating this gateway.
Note: If a RADIUS-PAP server is enabled for authentication, XAUTH first
checks the local User Database for the user credentials. If the user
account is not present, the VPN firewall then connects to a RADIUS
server.
Configuring XAUTH for VPN Clients
When the XAUTH is enabled, you must establish user accounts on the User Database to be
authenticated against XAUTH, or you must enable a RADIUS-CHAP or RADIUS-PAP server.
Note: You cannot modify an existing IKE policy to add XAUTH while the
IKE policy is in use by a VPN policy. The VPN policy must be
disabled before you can modify the IKE policy.