Netgear FVS318N – Prosafe Wireless N VPN Firewall 参照マニュアル
Two-Factor Authentication
405
ProSAFE Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Why Do I Need Two-Factor Authentication?
In today’s market, online identity theft and online fraud continue to be one of the fast-growing
cybercrime activities used by many unethical hackers and cybercriminals to steal digital
assets for financial gains. Many companies and corporations are losing millions of dollars
and running into risks of revealing their trade secrets and other proprietary information as a
result of these cybercrime activities. Security threats and hackers have become more
sophisticated, and user names, encrypted passwords, and the presence of firewalls are no
longer enough to protect the networks from being compromised. IT professionals and
security experts have recognized the need to go beyond the traditional authentication
process by introducing and requiring additional factors in the authentication process.
NETGEAR has also recognized the need to provide more than just a firewall to protect the
networks. NETGEAR has implemented a more robust authentication system known as
two-factor authentication (2FA or T-FA) to help address the fast-growing network security
issues.
cybercrime activities used by many unethical hackers and cybercriminals to steal digital
assets for financial gains. Many companies and corporations are losing millions of dollars
and running into risks of revealing their trade secrets and other proprietary information as a
result of these cybercrime activities. Security threats and hackers have become more
sophisticated, and user names, encrypted passwords, and the presence of firewalls are no
longer enough to protect the networks from being compromised. IT professionals and
security experts have recognized the need to go beyond the traditional authentication
process by introducing and requiring additional factors in the authentication process.
NETGEAR has also recognized the need to provide more than just a firewall to protect the
networks. NETGEAR has implemented a more robust authentication system known as
two-factor authentication (2FA or T-FA) to help address the fast-growing network security
issues.
What Are the Benefits of Two-Factor Authentication?
•
Stronger security. Passwords cannot efficiently protect the corporate networks because
attackers can easily guess simple passwords or users cannot remember complex and
unique passwords. One-time passcode (OTP) strengthens and replaces the need to
remember complex password.
attackers can easily guess simple passwords or users cannot remember complex and
unique passwords. One-time passcode (OTP) strengthens and replaces the need to
remember complex password.
•
No need to replace existing hardware. Two-factor authentication can be added to
existing NETGEAR products through a firmware upgrade.
existing NETGEAR products through a firmware upgrade.
•
Quick to deploy and manage. The WiKID solution integrates seamlessly with the
NETGEAR SSL and VPN firewall products.
NETGEAR SSL and VPN firewall products.
•
Proven regulatory compliance. Two-factor authentication has been used as a
mandatory authentication process for many corporations and enterprises worldwide.
mandatory authentication process for many corporations and enterprises worldwide.
What Is Two-Factor Authentication?
Two-factor authentication is a security solution that enhances and strengthens security by
implementing multiple factors of the authentication process that challenge and confirm the
users’ identities before they can gain access to the network. There are several factors that
are used to validate the users to make sure that you are who you say you are. These factors
are:
implementing multiple factors of the authentication process that challenge and confirm the
users’ identities before they can gain access to the network. There are several factors that
are used to validate the users to make sure that you are who you say you are. These factors
are:
•
Something you know—for example, your password or your PIN.
•
Something you have—for example, a token with generated passcode that is six to eight
digits in length.
digits in length.
•
Something you are—for example, biometrics such as fingerprints or retinal prints.
This appendix focuses on and describes only the first two factors, something you know and
something you have. This security method can be viewed as a two-tiered authentication
approach because it typically relies on what you know and what you have. A common
something you have. This security method can be viewed as a two-tiered authentication
approach because it typically relies on what you know and what you have. A common