Defender EAP Agent Installation and Configuration Guide



Similar documents
Defender 5.7. Remote Access User Guide

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

External Authentication with Windows 2008 Server with Routing and Remote Access Service Authenticating Users Using SecurAccess Server by SecurEnvoy

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

Defender Configuring for Use with GrIDsure Tokens

Experiment # 6 Remote Access Services

Routing and Remote Access Service

How to setup a VPN on Windows XP in Safari.

Off Site Access PPD IT How to Guides December 2010

RSA SecurID Ready Implementation Guide

Outlook 2010 Setup Guide (POP3)

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

For paid computer support call

RSA ACE/Agent 5.5 for Windows Installation and Administration Guide

Configuring the OfficeConnect Secure Gateway for a remote L2TP over IPSec connection

Check Point FW-1/VPN-1 NG/FP3

SafeWord Domain Login Agent Step-by-Step Guide

NAS 322 Connecting Your NAS to a VPN

Configuring Network Load Balancing with Cerberus FTP Server

Setting up a VPN connection Windows XP

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

Cisco VPN Concentrator Implementation Guide

QUANTIFY INSTALLATION GUIDE

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Contents. VPN Instructions. VPN Instructions... 1

How to Secure a Groove Manager Web Site

Global VPN Client Getting Started Guide

AirStation VPN Setup Guide WZR-RS-G54

INTRODUCTION... 2 Windows Windows Mac OS X Ubuntu Advanced routing Windows Mac OS X Ubuntu...

KETS Enterprise VPN. Client Installation and Configuration Guide. Version 2.3

7.1. Remote Access Connection

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Defender Token Deployment System Quick Start Guide

Shellfire L2TP-IPSec Setup Windows XP

Enabling VPN on your VPS

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Configuring Microsoft RADIUS Server and Gx000 Authentication. Configuration Notes. Revision 1.0 February 6, 2003

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

HOTPin Integration Guide: DirectAccess

LPR for Windows 95/98/Me/2000/XP TCP/IP Printing User s Guide. Rev. 03 (November, 2001)

This chapter describes how to set up and manage VPN service in Mac OS X Server.

To install the SMTP service:

Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC

Windows Live Mail Setup Guide

Connecting to the FILTER Virtual Private Network (VPN)

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Sophos UTM. Remote Access via PPTP Configuring Remote Client

Global VPN Client Getting Started Guide

VPN PPTP Application. Installation Guide

Setup Guide for Exchange Server

Setting up DCOM for Windows XP. Research

Installation Instruction STATISTICA Enterprise Small Business

Setting up Your Acusis Address. Microsoft Outlook

Purple Sturgeon Standard VPN Installation Manual for Windows XP

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

DP-313 Wireless Print Server

Set Up Setup with Microsoft Outlook 2007 using POP3

NovaBACKUP xsp Version 15.0 Upgrade Guide

VPN Overview. The path for wireless VPN users

How To Configure Apple ipad for Cyberoam L2TP

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

DI-804HV with Windows 2000/XP IPsec VPN Client Configuration Guide

Palomar College Dial-up Remote Access

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

Creating client-server setup with multiple clients

Promap V4 ActiveX MSI File

University Computing & Telecommunications Virtual Private Networking: How To/Self- Help Guide Windows 8.1 Operating System.

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Installing Policy Patrol on a separate machine

Basic Exchange Setup Guide

Install MS SQL Server 2012 Express Edition

ing from The E2 Shop System address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Multi-factor Authentication using Radius

ZyWALL OTPv2 Support Notes

WatchGuard Mobile User VPN Guide

Cloud Services ADM. Agent Deployment Guide

Iridium Extreme TM Satellite Phone. Data Services Manual

LRDC Computing Services

Installing the Microsoft Network Driver Interface

Using the ECM VPN with Windows 7

NETWRIX EVENT LOG MANAGER

Configuration Guide. Remote Backups How-To Guide. Overview

Quest Soft Token for Windows Mobile User Guide

FaxCore Ev5 -To-Fax Setup Guide

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

CruzNet Secure Set-Up Instructions for Windows Vista

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS

LOAD BALANCING 2X APPLICATIONSERVER XG SECURE CLIENT GATEWAYS THROUGH MICROSOFT NETWORK LOAD BALANCING

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

APSCN VPN Instructions for VPN Setup on Windows and MAC OS

ECA IIS Instructions. January 2005

Transcription:

Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections leverage the IP connectivity of the Internet using a combination of tunneling and encryption to securely connect two remote points, such as a remote worker and their office base. Extensible Authentication Protocol (EAP) is a general protocol for authentication that also supports multiple authentication methods, such as token cards, Kerberos, one-time passwords, certificates, public key authentication and smart cards. Defender utilizes the EAP protocol to integrate its two-factor authentication into the existing user authentication process. Defender EAP Agent The Defender EAP Agent supports Microsoft Remote Access Clients and Servers for both dial-up and VPN (PPTP and L2TP/IPSec) (implemented as an extension to PPP). The Defender EAP Agent is installed on the VPN Server and VPN Client machine. System Requirements Microsoft Windows Operating System: Microsoft Windows 2003, 2008, 2008 R2 Server running RRAS/Network Policy Server Microsoft Windows 7 Microsoft Windows XP Microsoft Windows Vista 32 and 64-bit platforms are supported. 1

Installing the Defender EAP Agent This section describes how to install the Defender EAP Agent on your VPN server and VPN Client. Installing on the RRAS Server or Network Policy Server (VPN Server) 1. To install the Defender EAP Agent on the Windows Server, select Defender EAP Agent from the Components tab of the Defender Autroun or run Defender5_EAP_Install.exe. You must restart your machine to complete the installation. 2. Select Next. The License Agreement dialog is displayed. 2

3. Accept the License Agreement before continuing. Select Next to display the Install Location dialog. 4. Either accept the default location or use the Browse button to select a different location. Select Next to continue. 5. The installation will continue and the Installation Complete dialog is displayed on completion. Ensure that Create a VPN connection with Defender is not selected. Select Finish. 6. Restart the server to complete the installation. 3

Installing on the Windows Client 1. To install the Defender EAP Agent on your Windows client, select Defender EAP Agent from the Components tab of the Defender Autroun or run Defender5_EAP_Install.exe. You must restart your machine to complete the installation. 2. Select Next. The License Agreement dialog is displayed. 3. Accept the License Agreement before continuing. Select Next to display the Install Location dialog. 4

4. Either accept the default location or use the Browse button to select a different location. Select Next to continue. 5. The Installation will continue and the Installation Complete dialog displayed on completion. To create a VPN connection that will be automatically configured to use Defender EAP ensure that Create a VPN connection with Defender now is selected. 6. Select Finish to run the VPN Connection wizard or Cancel if you wish to create the connection at a later date. 7. Select Next to continue. 5

8. Enter a display name for this connection and select Next to continue. 9. Enter the IP Address or Name of the server that you will be connecting to, then select Next. 10. The VPN Connection wizard is now complete, select Finish. 11. Restart the workstation to complete the installation. Configuring the RRAS Server or Network Policy The following examples describe the configuration settings required for Defender EAP. A network policy must be configured allowing VPN access to your network. Windows Server running RRAS only To configure the RRAS Server, follow the instructions below. Please note that configuration instructions for RRAS Server 2008 may differ slightly from the instructions provided below. 6

Server Configuration - Stage 1 1. From Administrative Tools, select the Routing and Remote Access Administration option. The Routing and Remote Access page is displayed: 2. Right click the required server name, then select Properties. 3. Select the Security tab. 4. Select Authentication Methods. 5. Select EAP Methods. 6. Select Defender 5.x. 7. Select OK to return to the Routing and Remote Access page. Server Configuration - Stage 2 1. From the Routing and Remote Access page: 2. Select Remote Access Policies. 7

3. From the right hand window pane, right click the required policy and select Properties. 4. Select Edit Profile, then select the Authentication tab. 5. Select EAP Methods, then select Add. 6. Select Defender 5 from the list and select OK. 7. Click Edit. 8. In the IP Address field, type the IP Address of the server hosting your Defender Security Server. 9. In the Port field, type the port number that is defined on your Access Node. 10. In the Shared Secret field, specify the shared secret defined on your Access Node. 11. Select OK. 12. Restart the RRAS service. The RRAS server configuration is now complete. Windows Server running Network Policy Server To configure a server such as Windows 2008 where Network Policy server is running please follow the instructions below. 1. Select the network policy that will be used by your users and view the Properties dialog. 2. Select the Constraints tab and then Authentication Methods. 3. Select Add. 8

4. From the Add EAP dialog select Defender 5. 5. Select OK. 6. Highlight Defender 5 within the EAP Types table and select Edit. 7. Enter the address of the DSS that will be used to authenticate your users, together with the Port and Shared Secret that correspond to the access node that will be used. 9

Configuring the VPN Client This section describes how to configure the Microsoft VPN Client. This procedure must be performed on the connection object, not a short-cut to the connection. 1. Access the Properties pages for your VPN Connection, then select the Security tab. 2. Select Advanced (custom settings). 3. Select Settings. The Advanced Security Settings dialog is displayed: 4. In the Logon Security section, click Use Extensible Authentication Protocol (EAP). 5. Select Defender 5 from the list of providers. 6. Select OK to close any open dialog boxes. Your VPN Client configuration is now complete. 10

Authenticating When you attempt to access information via your VPN, the Defender authentication dialog box is displayed: In the Response field, type the response displayed on your token. Select OK. If authentication is successful, you are allowed access to the network. 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Quest, Quest Software, the Quest Software logo are trademarks and registered trademarks of Quest Software, Inc. in the United States of America and other countries. Other trademarks and registered trademarks are property of their respective owners. 11