Netgear FVS336Gv2 – ProSafe Dual WAN Gigabit Firewall with SSL & IPSec VPN 참조 매뉴얼

다운로드
페이지 691
Manage Users, Authentication, and VPN
 Certificates 
488
ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 
Configure Authentication Domains, Groups, and User 
Accounts
The following sections provide information about configuring authentication domains, groups, 
and user accounts:
Manage Authentication Domains
The following sections provide information about managing authentication domains:
WiKID
WiKID Systems is a PAP or CHAP key-based two-factor authentication method that 
functions with public key cryptography. The client sends an encrypted PIN to the WiKID 
server and receives a one-time passcode with a short expiration period. The client logs in 
with the passcode. See 
about WiKID authentication.
NT Domain
A network-validated domain-based authentication method that functions with a Microsoft 
Windows NT Domain authentication server. This authentication method is superseded by 
Microsoft Active Directory authentication but is supported to authenticate legacy 
Windows clients.
Active Directory
A network-validated domain-based authentication method that functions with a Microsoft 
Active Directory authentication server. Microsoft Active Directory authentication servers 
support a group and user structure. Because the Active Directory supports a multilevel 
hierarchy (for example, groups or organizational units), this information can be queried to 
provide specific group policies or bookmarks based on Active Directory attributes. 
Note:
A Microsoft Active Directory database uses an LDAP organization schema.
LDAP
A network-validated domain-based authentication method that functions with a 
Lightweight Directory Access Protocol (LDAP) authentication server. LDAP is a standard 
for querying and updating a directory. Because LDAP supports a multilevel hierarchy (for 
example, groups or organizational units), this information can be queried to provide 
specific group policies or bookmarks based on LDAP attributes.
Table 9.  External authentication protocols and methods (continued)
Authentication
Protocol or Method
Description