Auth Servers List

A security device can connect to one or more external authentication (auth) servers on which you store user accounts. When the security device receives a connection request that requires authentication verification, the device requests an authentication check from the external auth server specified in the policy, L2TP tunnel configuration, or IKE gateway configuration. The security device then acts as a relay between the user requesting authentication and the auth server granting authentication.

A security device treats each auth server as an object that it can reference in policies, IKE gateways, and L2TP tunnels.

Viewing the Auth Server List

This table lists the auth servers configured on the device. The list also provides information that uniquely identify each one:

ID: Indicates the unique identification number of the auth server.

Name: Indicates the name of the auth server.

Server IP/Name: Indicates the IP address or domain name of the auth server.

Type: Indicates the type of the auth server—Local, RADIUS, SecurID, or LDAP.

Acct Type: Indicates the types of users the auth server services—Auth, L2TP, XAuth, 802.1X, or Admin by itself.

Configure: Click Edit to modify the auth server, or click Remove to delete it.

To configure an auth server, click New. For more information, see Auth Server Configuration.

Note: An asterisk (*) in the very first column of the table indicates which auth servers are in use.