Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Some VPN clients and VPN gateway devices such as CISCO and Checkpoint The majority of main stream VPN products, such as Cisco and Checkpoint etc, support RADIUS Challenge/Response authentication mode. When a user attempts to logon, the Radius server will send a challenge code to the Radius client and prompts the user to enter the response code. To support Challenge/Response, you will need to create a logon procedure with two logon steps.

Image Removed

We can utilize this feature to implement a two-step verification process for VPN logins.

The 2-step logon process will be as below:

  1. Step 1: The VPN client will ask the user to enter their static password
  2. Step 1: The users enters a static password
  3. The server checks the validity of the user’s static password.
  4. Step 2: If the server verifies successfully verified the user's static password, then it generates a challenge code, sends it to the user, then prompts will prompt the user to enter the response2nd credential.The user will use their token to generate a response code by entering the challenge code, and enters it to continue.
  5. Step 2: The user enters the 2nd credential, such as one-time password, to continue.
  6. The server checks the validity of the user’s 2nd credential.

In DualShield, you will need to create a logon procedure with two logon steps.

Image Added


NOTES

If you have a logon procedure with two or more logon steps, and you place more than one authenticator (including an on-demand password in a logon step), then the order of the authenticators is significant.

...