In This Section: |
The encryption properties of the users participating in a Remote Access community are set by default. If you must modify the encryption algorithm, the data integrity method and/or the Diffie-Hellman group, you can either do this globally for all users or configure the properties per user.
To modify the user encryption properties globally:
The Encryption Properties window opens.
To configure encryption policies for specific users:
The IKE Phase 2 Properties window is displayed.
Note - Instruct the users to create or update the site topology
For Remote users, the IKE settings are configured in Global Properties > Remote Access > VPN Authentication and Encryption.
Note - IKEv2 is not supported for Remote Access.
For more information about IPsec and IKE, see the R80.20 Site to Site VPN Administration Guide.
Remote Access functionality includes a flexible user management scheme. Users are managed in a number of ways:
Internal |
A Security Gateway can store a static password in its local user database for each user configured in the Security Management Server. No additional software is needed. |
LDAP |
An open industry standard that is used by multiple vendors. Check Point products integrate LDAP with the Check Point User Directory. When you manage the users externally on the LDAP server, changes are reflected on SmartDashboard. gateways query the User Directory data for authentication. |
RADIUS |
When employing RADIUS as an authentication scheme, the gateway forwards authentication requests by remote users to the RADIUS server. The RADIUS server, which stores user account information, authenticates the users. The RADIUS protocol uses UDP for communications with the Security Gateway. RADIUS Servers and RADIUS Server Group objects are defined in SmartDashboard. |
SecurID Token Management ACE/Server |
Developed by RSA Security, SecurID requires users to have both, a token authenticator and a PIN or password. Token authenticators generate one-time passwords that are synchronized to an RSA ACE/Server, and may come in the form of hardware or software. Hardware tokens are key-ring or credit card-sized devices, while software tokens reside on the PC or device from which the user wants to authenticate. All tokens generate a random, one-time-use access code that changes every minute or so. When a user attempts to authenticate to a protected resource, that one-time-use code must be validated by the ACE/Server. |
|
Note - When employing SecurID as an authentication scheme, the Security Gateway forwards authentication requests by remote users to the ACE/Server. ACE manages the database of RSA users and their assigned hard or soft tokens. The VPN module acts as an ACE/Agent 5.0, which means that it directs all access requests to the RSA ACE/Server for authentication. For agent configuration see ACE/Server documentation.
|
The differences between user management on the internal database, and the User Directory: