Using RADIUS Servers for Authentication and Authorization

If you are already using SafeWord for Citrix or SafeWord RemoteAccess in your configuration to authen- ticate using the Web Interface, you need to do the following:

Install and configure the SafeWord IAS Agent

Configure the IAS RADIUS server to recognize the Firebox SSL VPN Gateway as a RADIUS client

Configure the Firebox SSL VPN Gateway to send RADIUS authentication requests to the IAS RADIUS server

To install and configure the IAS Agent and the IAS RADIUS server, see the SafeWord for Citrix or SafeW- ord Remote Access product documentation.

If you are not currently using SafeWord for Citrix or SafeWord RemoteAccess, you should first install one of these servers following the product documentation.

To configure the Firebox SSL VPN Gateway to send RADIUS authentication requests to the IAS RADIUS server, follow the instructions in “Using RADIUS Servers for Authentication and Authorization” on page 69.

To configure the IAS RADIUS realm

1Click the Authentication tab.

2In Realm Name, type a name for the authentication realm that you will create, select One Source, and then click Add.

3In Select Authentication Type, in Authentication Type, select RADIUS Authentication and click OK.

4On the Authentication tab, in Server IP Address, type the IAS RADIUS server IP address.

5In Server Port, type the IAS RADIUS server port. The default port numbers are 1812 and 1645.

6In Server Secret, type a RADIUS share secret.

Note

Make sure you use a strong shared secret. A strong shared secret is one that is at least eight characters and includes a combination of letters, numbers, and symbols.

7If there is a secondary IAS RADIUS server, configure the settings for the server in Secondary Radius

Server.

The RADIUS port number and the RADIUS server secret configured on the Firebox SSL VPN Gateway must match those configured on the IAS RADIUS server.

Using RADIUS Servers for Authentication and Authorization

You can configure the Firebox SSL VPN Gateway to authenticate user access with one or more RADIUS servers. For each RADIUS realm that you use for authentication, you can configure both primary and sec- ondary RADIUS servers. If the primary RADIUS server is unavailable, the Firebox SSL VPN Gateway attempts to authenticate against the secondary RADIUS server for that realm.

If a user is not located on the RADIUS servers or fails authentication, the Firebox SSL VPN Gateway checks the user against the user information stored locally on the Firebox SSL VPN Gateway if the Enable Local Database lookup check box is selected on the Settings tab of the realm.

The Firebox SSL VPN Gateway software also includes RADIUS authorization, which is configured using Remote Access Policy in Microsoft Internet Authentication Service (IAS). During configuration of the Firebox SSL VPN Gateway, the following information needs to be provided:

• Vendor ID is the vendor-specific code number that was entered in IAS.

Administration Guide

69

Page 79
Image 79
WatchGuard Technologies SSL VPN manual Using Radius Servers for Authentication and Authorization

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.