If the RADIUS server is not configured to accept the device as a client, the server discards the Access-Request message and does not send a message back. The RADIUS server makes sure that the Access-Request message is from a known client (the Firebox).
#CAN I USE CHECKPOINT VPN CLIENT TO GET ACCESS TO MY SERVER PASSWORD#
The password is always encrypted in the Access-Request message. The device uses the RADIUS shared secret in the message. The device creates a message called an Access-Request message and sends it to the RADIUS server.The device reads the user name and password. The user tries to authenticate, either through a browser-based HTTPS connection to the device over port 4100, or through a connection using Mobile VPN with IPSec.When the Firebox uses RADIUS for an authentication attempt: If the RADIUS server is properly configured to have the device as a client, RADIUS sends an accept or reject message back to the device (the Network Access Server). (The RADIUS client is sometimes called the Network Access Server or NAS.) When a user tries to authenticate, the device sends a message to the RADIUS server. RADIUS is a client-server protocol, with the Firebox as the client and the RADIUS server as the server. RADIUS is now used in a wide range of authentication scenarios. RADIUS is a protocol that was originally designed to authenticate remote users to a dial-in access server.