Netgear FVS318N – Prosafe Wireless N VPN Firewall Manual De Referencia
Two-Factor Authentication
406
ProSAFE Wireless-N 8-Port Gigabit VPN Firewall FVS318N
example of two-factor authentication is a bank (ATM) card that has been issued by a bank
institute:
institute:
•
The PIN to access your account is something you know.
•
The ATM card is something you have.
You need to have both of these factors to gain access to your bank account. Similar to the
way ATM cards work, access to the corporate networks and data can also be strengthened
using a combination of multiple factors such as a PIN and a token (hardware or software) to
validate the users and reduce the incidence of online identity theft.
way ATM cards work, access to the corporate networks and data can also be strengthened
using a combination of multiple factors such as a PIN and a token (hardware or software) to
validate the users and reduce the incidence of online identity theft.
NETGEAR Two-Factor Authentication Solutions
NETGEAR has implemented two two-factor authentication solutions from WiKID. WiKID is
the software-based token solution. So instead of using only Windows Active Directory or
LDAP as the authentication server, administrators now can use WiKID to perform two-factor
authentication on NETGEAR SSL and VPN firewall products.
the software-based token solution. So instead of using only Windows Active Directory or
LDAP as the authentication server, administrators now can use WiKID to perform two-factor
authentication on NETGEAR SSL and VPN firewall products.
The WiKID solution is based on a request-response architecture where a one-time passcode
(OTP), which is time-synchronized with the authentication server, is generated and sent to
the user after the validity of a user credential has been confirmed by the server.
(OTP), which is time-synchronized with the authentication server, is generated and sent to
the user after the validity of a user credential has been confirmed by the server.
The request-response architecture is capable of self-service initialization by end users,
dramatically reducing implementation and maintenance costs.
dramatically reducing implementation and maintenance costs.
Here is an example of how WiKID works:
To use WiKID (for end users):
1.
Launch the WiKID token software, enter the PIN that has been provided (something the
user knows), and click Continue to receive the OTP from the WiKID authentication
server:
user knows), and click Continue to receive the OTP from the WiKID authentication
server:
Figure 233.
2.
A one-time passcode (something the user has) is generated.