How To: Choose a VPN Auth Protocol

| | No TrackBacks
VPN, or Virtual Private Networking services in Microsoft Windows supports a number of authentication protocols such as EAP-TLS, mS-CHAPv2 and so on. Since the security of VPN must be superior, you should choose the protocol that best matches your environment.

EAP-TLS assumes using smart cards, or your network has a CA (certificate authority) issuing user certificates.

MS-CHAPv2 assumes using password-based authentication method, hence you will need to make use of Group Policy and other means to force using strong passwords.

Less secure protocols such as MS-CHAP, CHAP, PAP and so on should only be used if backward compatibility must be provided. Proper monitoring is also advised in such cases to prevent accounts compromising or at least providing means to detect such attempts as soon as possible.

No TrackBacks

TrackBack URL: /blog/mt-tb.cgi/27

blog comments powered by Disqus

About this Entry

This page contains a single entry by Konstantin Boyandin published on December 10, 2009 1:10 PM.

Warning Signs of a Rogue DHCP Server was the previous entry in this blog.

Enforcing Group Policy is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.