Netgear FVS318N – Prosafe Wireless N VPN Firewall 参照マニュアル

ページ / 426
Two-Factor Authentication
405
ProSAFE Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Why Do I Need Two-Factor Authentication?
In today’s market, online identity theft and online fraud continue to be one of the fast-growing 
cybercrime activities used by many unethical hackers and cybercriminals to steal digital 
assets for financial gains. Many companies and corporations are losing millions of dollars 
and running into risks of revealing their trade secrets and other proprietary information as a 
result of these cybercrime activities. Security threats and hackers have become more 
sophisticated, and user names, encrypted passwords, and the presence of firewalls are no 
longer enough to protect the networks from being compromised. IT professionals and 
security experts have recognized the need to go beyond the traditional authentication 
process by introducing and requiring additional factors in the authentication process. 
NETGEAR has also recognized the need to provide more than just a firewall to protect the 
networks. NETGEAR has implemented a more robust authentication system known as 
two-factor authentication (2FA or T-FA) to help address the fast-growing network security 
issues. 
What Are the Benefits of Two-Factor Authentication?
Stronger security. Passwords cannot efficiently protect the corporate networks because 
attackers can easily guess simple passwords or users cannot remember complex and 
unique passwords. One-time passcode (OTP) strengthens and replaces the need to 
remember complex password. 
No need to replace existing hardware. Two-factor authentication can be added to 
existing NETGEAR products through a firmware upgrade.
Quick to deploy and manage. The WiKID solution integrates seamlessly with the 
NETGEAR SSL and VPN firewall products.
Proven regulatory compliance. Two-factor authentication has been used as a 
mandatory authentication process for many corporations and enterprises worldwide.
What Is Two-Factor Authentication?
Two-factor authentication is a security solution that enhances and strengthens security by 
implementing multiple factors of the authentication process that challenge and confirm the 
users’ identities before they can gain access to the network. There are several factors that 
are used to validate the users to make sure that you are who you say you are. These factors 
are:
Something you know—for example, your password or your PIN.
Something you have—for example, a token with generated passcode that is six to eight 
digits in length.
Something you are—for example, biometrics such as fingerprints or retinal prints.
This appendix focuses on and describes only the first two factors, something you know and 
something you have. This security method can be viewed as a two-tiered authentication 
approach because it typically relies on what you know and what you have. A common