1.5 Strong Security Features

    Table of contents
    You are currently comparing two old versions - only when you are comparing against the latest version can you revert. Return to version archive.

    Combined revision comparison

    Comparing version 02:58, 2 Mar 2013 by yagi with version 00:36, 3 Mar 2013 by yagi.

    ...

    User authentication methods that can be used include the following. For details see #2.2User Authentication#..

    • Anonymous authentication
      Anonymous authentication allows connection as long as at least the user name is known, and is used when establishing widely offered Virtual Hub service, etc. It is not usually used for businesses, etc.
    • Password Authentication
      Standard password authentication is the method of conducting user authentication by user name and password and is the method for which security can be most easily maintained. Users can also change the password themselves using VPN Client. The password is hashed when typed in and because password confirmation is conducted by challenge and response when authenticating, the password and hash data do not flow on the network.
    • RADIUS server authentication
      Method of user authentication using RADIUS authentication server already owned by company, etc.
    • NT domain and Active Directory authentication
      Method of user authentication using Windows NT main controller or Active Directory of user database of Windows Server 2000 / Server 2003 already owned by company, etc.
    • Certificate authentication (PKI authentication)
      Method of user authentication whereby those connected to VPN are identified by mathematically calculating whether or not those connected have a private key by having those connected to VPN present a client certificate to VPN Server. Because a fixed character string such as password is not used, it is the most secure method of user authentication.
     

    ...

    Server certificate verification is conducted by the connection source software side such as cascade connected VPN Server or VPN Bridge or VPN Client connected to remote VPN Server by usual method. For details on server certificate verification, see #4.4.5#,4.4 Making Connection to VPN Server, etc.

    ...

     

    For information on how to use the user authentication function using a smart card, see #4.6Using and Managing Smart Cards#..

    ...

    Version from 02:58, 2 Mar 2013

    This revision modified by yagi (Ban)

    ...

    User authentication methods that can be used include the following. For details see #2.2#.

    • Anonymous authentication
      Anonymous authentication allows connection as long as at least the user name is known, and is used when establishing widely offered Virtual Hub service, etc. It is not usually used for businesses, etc.
    • Password Authentication
      Standard password authentication is the method of conducting user authentication by user name and password and is the method for which security can be most easily maintained. Users can also change the password themselves using VPN Client. The password is hashed when typed in and because password confirmation is conducted by challenge and response when authenticating, the password and hash data do not flow on the network.
    • RADIUS server authentication
      Method of user authentication using RADIUS authentication server already owned by company, etc.
    • NT domain and Active Directory authentication
      Method of user authentication using Windows NT main controller or Active Directory of user database of Windows 2000 / Server 2003 already owned by company, etc.
    • Certificate authentication (PKI authentication)
      Method of user authentication whereby those connected to VPN are identified by mathematically calculating whether or not those connected have a private key by having those connected to VPN present a client certificate to VPN Server. Because a fixed character string such as password is not used, it is the most secure method of user authentication.

    ...

    Server certificate verification is conducted by the connection source software side such as cascade connected VPN Server or VPN Bridge or VPN Client connected to remote VPN Server by usual method. For details on server certificate verification, see #4.4.5#, etc.

    ...

    For information on how to use the user authentication function using a smart card, see #4.6#.

    ...

    Version as of 00:36, 3 Mar 2013

    This revision modified by yagi (Ban)

    ...

    User authentication methods that can be used include the following. For details see 2.2User Authentication.

    ...

    Server certificate verification is conducted by the connection source software side such as cascade connected VPN Server or VPN Bridge or VPN Client connected to remote VPN Server by usual method. For details on server certificate verification, see 4.4 Making Connection to VPN Server, etc.

    ...

    For information on how to use the user authentication function using a smart card, see 4.6Using and Managing Smart Cards.

    ...