Using RSA SecurID for Authentication

Note

Note: If you are configuring double-source authentication, click Two Source and then click Add. For more information about configuring double-source authentication, see “Configuring Double-Source Authentication” on page 85.

4In IP address type the IP address of the RADIUS IAS server.

5 In Port, type the port number.

6 In Server secret, type the node secret of the RADIUS IAS server. 7 Select Use the password one time and click Submit

Configuring NTLM Authentication and Authorization

You can configure the Firebox SSL VPN Gateway to use Windows NT LAN Manager (NTLM) authentica- tion to authenticate users against the user database on a Windows NT 4.0 domain controller.

If a user is not located in the user database on the Windows NT 4.0 domain controllers, or fails authenti- cation, the Firebox SSL VPN Gateway can check for the user name in the Local Users list on the Firebox SSL VPN Gateway and authenticate the user against the local list if Use the local user database on the Firebox SSL VPN Gateway check box is selected on the Settings tab.

A Windows NT 4.0 domain controller maintains domain user accounts in a database on the Windows NT

4.0server. A domain user account includes a user name and password and other information about the user.

To configure NTLM authentication, you create an NTLM authentication realm that includes the address and port that the Firebox SSL VPN Gateway uses to connect to the Windows NT 4.0 domain controller. You also specify a time-out value in which an authentication attempt to the server must complete.

When a user logs on to the Firebox SSL VPN Gateway, the user enters the user name and password main- tained in the domain user account on the Windows NT 4.0 server.

The Firebox SSL VPN Gateway connects to the Windows NT 4.0 server and passes these credentials to the server. The server authenticates the user.

To configure NTLM authentication

1Click the Authentication tab.

2Under Add an Authentication Realm, in Realm name, type a name for the authentication realm.

If your site has multiple authentication realms, you might use a name that identifies the NTLM realm for which you specify settings. Realm names are case-sensitive and can contain spaces.

Note

Note: If you want the Default realm to use NTLM authentication, remove the Default realm as described in “To remove and create a Default realm” on page 70.

3Select One Source and click Add.

4In Select Authentication Type, in Authentication type, choose NTLM authentication and click OK.

The Realm dialog box opens.

5Click the Authentication tab.

6In IP Address or FQDN, type the IP address of the Windows NT 4.0 domain controller.

7In Port, type the port number on which the Windows NT 4.0 domain controller listens for the NTLM

authentication connection.

The default port entry for NTLM authentication connections is 139.

Administration Guide

83

Page 93
Image 93
WatchGuard Technologies SSL VPN manual Configuring Ntlm Authentication and Authorization, To configure Ntlm authentication

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.