Cisco VPN 3000 Betriebsanweisung Seite 219

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 502
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 218
Configuration | User Management | Base Group
12-13
VPN 3000 Concentrator Series User Guide
These choices specify the allowable authentication protocols in order from least secure to most secure.
PAP = Password Authentication Protocol. This protocol passes cleartext username and password
during authentication and is not secure. We strongly recommend that you not allow this protocol
(the default).
CHAP = Challenge-Handshake Authentication Protocol. In response to the server challenge, the
client returns the encrypted [challenge plus password], with a cleartext username. It is more secure
than PAP, and is allowed by default.
EAP = Extensible Authentication Protocol. This protocol is allowed by default. It supports -MD5
(MD5-Challenge) authentication, which is analogous to the CHAP protocol, with the same level of
security.
MSCHAPv1 = Microsoft Challenge-Handshake Authentication Protocol version 1. This protocol is
similar to, but more secure than, CHAP. In response to the server challenge, the client returns the
encrypted [challenge plus encrypted password], with a cleartext username. Thus the server stores
and comparesonly encrypted passwords, rather than cleartext passwords as in CHAP. This
protocol also generates a key for data encryption by MPPE (Microsoft Point-to-Point Encryption).
This protocol is allowed by default. If you check
Required under PPTP Encryption below, you must
allow one or both
MSCHAP protocols and no other.
MSCHAPv2 = Microsoft Challenge-Handshake Authentication Protocol version 2. This protocol is
even more secure than MSCHAPv1. It requires mutual client-server authentication, uses
session-unique keys for data encryption by MPPE, and derives different encryption keys for the
send and receive paths. This protocol is not allowed by default. The VPN Concentrator internal user
authentication server supports this protocol, but external authentication servers do not. If you check
Required under PPTP Encryption below, you must allow one or both MSCHAP protocols and no other.
PPTP Encryption
Check the boxes for the data encryption options that apply to PPTP clients.
Required = During connection setup, PPTP clients must agree to use Microsoft encryption (MPPE)
to encrypt data or they will not be connected. This option is not checked by default. If you check
this option, you must also allow only
MSCHAPv1 and/or MSCHAPv2 under PPTP Authentication
Protocols
above, and you must also check 40-bit and/or 128-bit here. Do not check this option if you
use NT Domain user authentication; NT Domain authentication cannot negotiate encryption.
Require Stateless = During connection setup, PPTP clients must agree to use stateless encryption to
encrypt data or they will not be connected. With stateless encryption, the encryption keys are
changed on every packet; otherwise, the keys are changed after some number of packets or
whenever a packet is lost. Stateless encryption is more secure, but it requires more processing.
However, it might perform better in a lossy environment (where packets are lost), such as the
Internet. This option is not checked by default. Do not check this option if you use NT Domain user
authentication; NT Domain authentication cannot negotiate encryption.
40-bit = PPTP clients are allowed to use the RSA RC4 encryption algorithm with a 40-bit key. This
is significantly less secure than the
128-bit option. Microsoft encryption (MPPE) uses this algorithm.
This option is checked by default. If you check
Required, you must check this option and/or the
128-bit option.
128-bit = PPTP clients are allowed to use the RSA RC4 encryption algorithm with a 128-bit key.
Microsoft encryption (MPPE) uses this algorithm. This option is checked by default. If you check
Required, you must check this option and/or the 40-bit option. The U.S. government restricts the
distribution of 128-bit encryption software.
Seitenansicht 218
1 2 ... 214 215 216 217 218 219 220 221 222 223 224 ... 501 502

Kommentare zu diesen Handbüchern

Keine Kommentare