Home > Articles > Cisco Network Technology > IP Communications/VoIP > IPSec Authentication and Authorization Models

IPSec Authentication and Authorization Models

Chapter Description

This chapter covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client.

From the Book

IPSec VPN Design

IPSec VPN Design

$53.59 (Save 20%)

Summary

This chapter covered IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You learned about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client. You also saw how EzVPN greatly simplifies configuration for IPSec clients and allows central configuration of the IPSec policies. You explored the use of digital certificates and PKI, which are becoming increasingly popular for scalable IPSec deployments for both remote access and site-to-site VPNs.

For more information on Security, visit our Security Reference Guide or sign up for our Security Newsletter