Description
Authentication Proxy Action with Client
Following the login attempt, the authentication proxy
action can vary depending on whether JavaScript is
enabled in the browser. If JavaScript is enabled, and
authentication is successful, the authentication proxy
displays a message indicating the status of the
authentication as shown in the Authentication Proxy
Login Status Message figure, in the How the
Authentication Proxy Works module. After the
authentication status is displayed, the proxy
automatically completes the HTTP connection.
If JavaScript is disabled, and authentication is
successful, the authentication proxy generates a popup
window with additional instructions for completing
the connection. See the Authentication Proxy Login
Status Message with JavaScript Disabled figure, in
the Secure Authentication module.
If authentication is unsuccessful in any case, the user
must log in again from the login page.
Authenticating the user at the client
When to Use the Authentication Proxy
The following are some situations in which you can use the authentication proxy:
•
You want to manage access privileges on an individual (per-user) basis using the services provided by
the authentication servers instead of configuring access control based on host IP address or global access
policies. Authenticating and authorizing users from any host IP address also allows network administrators
to configure host IP addresses using DHCP.
•
You want to authenticate and authorize local users before permitting access to intranet or Internet services.
•
You want to authenticate and authorize remote users before permitting access to local services.
•
You want to control access for specific extranet users. For example, you might want to authenticate and
authorize the financial officer of a corporate partner with one set of access privileges while authorizing
the technology officer for that same partner to use another set of access privileges.
•
You want to use the authentication proxy in conjunction with VPN client software to validate users and
to assign specific access privileges.
•
You want to use the authentication proxy in conjunction with AAA accounting to generate
“
start
”
and
“
stop
”
accounting records that can be used for billing, security, or resource allocation purposes, thereby
allowing users to track traffic from the authenticated hosts.
Applying Authentication Proxy
Apply the authentication proxy in the inbound direction at any interface on the router where you want per-user
authentication and authorization. Applying the authentication proxy inbound at an interface causes it to
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1419
Information About Web-Based Authentication
Summary of Contents for Catalyst 2960 Series
Page 96: ......
Page 196: ......
Page 250: ......
Page 292: ......
Page 488: ......
Page 589: ...P A R T VI Cisco Flexible NetFlow Configuring NetFlow Lite page 509 ...
Page 590: ......
Page 619: ...P A R T VII QoS Configuring QoS page 539 Configuring Auto QoS page 645 ...
Page 620: ......
Page 750: ......
Page 1604: ......
Page 1740: ......
Page 2105: ...P A R T XII Configuring Cisco IOS IP SLAs Configuring Cisco IP SLAs page 2025 ...
Page 2106: ......
Page 2118: ......
Page 2164: ......