


When the Secure Domain Logon (SDL) feature is enabled, after the user enters the OS user name and password (but before the connection to the domain controller is started), the User Authentication window appear. When a Remote Access client user logs on to a domain controller, the user has not yet entered credentials, and so the connection to the domain controller is not encrypted. If Password caching is enabled, in Cache password for, select the amount of minutes it is cached for. In Enable password caching, select an option. For these schemes, this feature should not be implemented. If the user's authentication scheme implement one-time passwords (for example, SecurID), then passwords cannot be cached, and the user will be asked to re-authenticate when the authentication time-out expires. Password caching is possible only for multiple-use passwords. In other words, the user will not be aware that re-authentication has taken place. If password-caching is enabled, clients will supply the cached password automatically and the authentication will take place transparently to the user. When the timeout expires, the user will be asked to authenticate again. In Re-authenticate user every, select a number of minutes between re-authentications. To set the length of time between re-authentications:įrom the navigation tree, click Remote Access> Endpoint Security VPN.

Increasing the re-authentication intervalįor Connect Mode, the countdown to the timeout begins from the time that the Remote Access client is connected. Multiple authentication can be reduced by: The problem is finding the correct balance between convenience and security. At the same time, these multiple authentications are an effective means of ensuring that the session has not been hijacked (for example, if the user steps away from the endpoint computer for a period of time). Users consider multiple authentications during the course of a single session to be a nuisance. Authentication Timeout and Password Caching The Problem When the topology is updated, the name resolution data will be automatically transferred to the dnsinfo entry of the userc.C file and then to its LMHOSTS file. LMHOSTSĮnter the relevant information (see below) the $FWDIR/conf/dnsinfo.C file on the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources., and install the policy. Otherwise, clients resolve the NT domain name using either LMHOSTS or WINS. If clients are configured in Connect Mode and Office Mode, clients automatically resolve the NT domain name using dynamic WINS. Remote Access Advanced Configuration Domain Controller Name Resolution
