Page 92 NETWORK ACCESS RULES
using names of friends, family, pets, etc. The password should consist of random
characters, such as “a*$#7fe2j%42”. The password is case sensitive.
4. Choose the privileges to be enabled for the user by selecting one or both check-
boxes. Two options are available:
A.
Remote Access
This option provides unrestricted access to the LAN from a remote location on the
Internet. Only
Standard
mode supports Remote Access. If NAT is enabled, VPN
client remote access is recommended.
B.
Bypass Filters
This option provides unrestricted access to the Internet from the LAN, bypassing
Web, News, Java, and ActiveX blocking.
5. Click
Update User
.
Note
: The SonicWALL supports up to 100 users.
Edit User Settings
To change a user’s password or privileges, highlight the name in the
Current User
List
, make the changes and click
Update User
. To delete a user, highlight the name
and click
Remove User
.
Establishing an Authenticated User Session
In order to establish an
Authenticated User Session
, a user must enter the
SonicWALL LAN IP Address into the
Location
or
Go to
field in their Web browser.
Note
: The Web browser used to establish an authenticated session must support Java
and JavaScript.
The user sees the SonicWALL authentication window, asking for their user name and
password. After completing these fields and clicking
Login
, their password is verified
using MD5 authentication. The password is never sent "in the clear" over the Internet,
preventing password theft.
Note
: User names are not case sensitive (“john” is equivalent to “JOHN” or “John”),
but passwords are case sensitive (“password” is not the same as “Password”).
Once authenticated, remote users are able to access all IP resources on the LAN, and
users on the LAN are able to bypass the
Content Filter Lists
. The connection closes
if user inactivity on the connection exceeds the configured time-out period. If the
connection is closed, the remote user needs to re-authenticate.
Note
:
Authenticated Sessions
create a log entry when established. However, user
activity is not logged.
integrated_manual.book Page 92 Wednesday, June 13, 2001 6:21 PM