F-5
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
AppendixF Cisco Secure ACS and Virtual Private Dial-up Networks VPDN Process
Figure F-7 NAS Authenticates Tunnel with ACS
7. After authenticating, the tunnel is established. Now the actual user
(mary@corporation.us) must be authenticated. See Figure F-8.
Figure F-8 VPDN Tunnel is Established
8. The HG now authenticates the user as if the user dialed directly in to the HG.
The HG might now challenge the user for a password. The Cisco Secure ACS
at RSP can be configured to strip off the @ and domain before it passes the
authentication to the HG. (The user is passed as mary@corporation.us.) The
HG uses its ACS to authenticate the user. See FigureF-9 on page F-6.
S6651
Username = home_gate
Password = CHAP_stuff
Corporation
VPDN user
User = mary@corporation.us
ACS
RSP
ACS
CHAP response
S6652
Corporation
VPDN user
User = mary@corporation.us
ACS
RSP
ACS