A security device can connect to one or more external authentication (auth) servers on which you store user accounts. When the security device receives a connection request that requires authentication verification, the device requests an authentication check from the external auth server specified in the policy, Layer 2 Tunneling Protocol (L2TP) tunnel configuration, or Internet Key Exchange (IKE) gateway configuration. The security device then acts as a relay between the user who requests authentication and the auth server that grants authentication.
A security device treats each auth server as an object that it can reference in policies, IKE gateways, and L2TP tunnels.
The Auth Server List table lists the auth servers configured on the device. It also provides the following information about each server:
ID: Indicates the unique identification number of the auth server.
Name: Indicates the name of the auth server.
Server IP/Name: Indicates the IP address or domain name of the auth server.
Type: Indicates the type of auth server—local, RADIUS, SecurID, LDAP, or TACACS+.
Acct Type: : Indicates the types of users the auth server supports—auth, L2TP, XAuth, 802.1X, IKEv2EAP, or admin by itself.
Configure: Click Edit to modify the auth server, or click Remove to delete it.
To configure an auth server, click New. For more information, see Auth Server Configuration.
Note: An asterisk (*) in the first column of the Auth Server List table indicates the auth servers in use.