Preview

One Time password protection

Good Essays
Open Document
Open Document
3022 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
One Time password protection
ZyWALL OTPv2
Support Notes
Revision 1.00
September, 2010
Written by CSO

ZyXEL – ZyWALL OTPv2 Support Notes

Table of Contents
1. Introduction....................................................................................................................................................... 3
2. Server Installation ............................................................................................................................................. 7
2.1 Pre-requisites .......................................................................................................................................... 7
2.2 Installations walk through ..................................................................................................................... 7
3. OTP Authentication to an OTP-protected Network via SSL VPN over ZyWALL USG ................................. 11
3.1 ZyWALL USG Configurations ................................................................................................................ 12
3.2 SafeWord Server Configurations ......................................................................................................... 15
3.3 Verify OTP via Login from the Remote PC .......................................................................................... 19
4. OTP Authentication to an OTP-protected Network via IPSec VPN Client over the ZyWALL USG ............ 20
4.1 ZyWALL USG Configurations ................................................................................................................ 21
4.2 SafeWord Server Configurations ......................................................................................................... 24
4.3 ZyWALL IPSec VPN Client Configurations .......................................................................................... 28
4.4 Verify OTP via Login from the VPN Client

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Munasinghe, K. S. and Shahrestani, S.A.,“Analysis of Multiple Virtual Private Network Tunnels over Wireless LANs,” in Proceedings of the 3rdInternational Business Information Management Conference (IBIMA 2004), pp. 206-211, December 2004b.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    To define the authentication and encryption settings for remote access VPN clients, the following remote access network policy is created in Network Policy Server (NPS):…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    For this you need to edit the /etc /network/interfaces file and you need to add the…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    6. When dealing with RADIUS and TACACS+ for authentication methods, what protocols are used at Layer 4 for each of these techniques?…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    During the connection establishment process, the two computers involved in a VPN connection authenticate each other and select a VPN protocol.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Labs for Your Health

    • 263 Words
    • 2 Pages

    Overview|In Exercise 17.2, you examine the parameters you can use to configure the VPN connection you created in Exercise 17.1. Because the VPN server will at first have only a limited number of connections, you must prevent users from remaining connected when they are not actually using the network.|…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 1 2 NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 3 Oral Assessments Skills Assessment Interview • 15% of the course total The questionnaire consists of • 15 sets of questions • 3 questions in each set…

    • 4261 Words
    • 28 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 292 Words
    • 2 Pages

    What was the DHCP allocated source IP host address for the student VM, DHCP Server, and IP default gateway router?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ayam

    • 334 Words
    • 2 Pages

    Information technology Telecommunications and information exchange between system Local and metropolitan area networks Specific requirements .Token Ring Access Method and Physical Layer Specification.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Tp Link Essey

    • 1218 Words
    • 5 Pages

    This article describes how to manually configure a TP-LINK Router for broadband DSL that uses PPPoE (Point-to-Point Protocol over Ethernet) for authentication.…

    • 1218 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Currently, the relationship between OTT with still a push-pull operators. On the one hand, operators need OTT as a reason to use for customers to use data access, which is currently the operator, must continue to invest to develop a network with high investment. On the other hand, OTT require operators to acquire customers and access to services, but this time…

    • 327 Words
    • 1 Page
    Satisfactory Essays

Related Topics