Authentication Methods

Authentication is implemented using digital signatures. Digital signatures are most commonly created by taking some message text, such as information unique to a device or person, along with a key, through a hashing function. The digital signature is like the signature that you would use to sign a check, your fingerprint, or a retinal scan of your eye: it’s something unique to you and no one else. Digital signatures are used to implement non-repudiation in VPNs: being able to prove, with certainty, the identity of a device.

The last part of this chapter on VPN technologies will cover authentication methods: how two peers can recognize that when they establish a connection to each other, they are really connecting to the ...

Get The Complete Cisco VPN Configuration Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.