NOTE:
You can only bind one Web Filtering profile to a firewall rule.
7.
Click
OK
.
Configuring Authentication for Firewall Rules
You can authenticate the identity of the user who is generating the network traffic. When
you enable authentication in the rule, the user must authenticate future network traffic
by supplying a user name and password in an initial, separate HTTP, FTP, or Telnet
connection. If the user fails to authenticate using one of these services or provides incorrect
credentials, the authentication requirement for the rule is not met and the network traffic
is denied. (Typically, when you enable authentication, you also use the permit action.)
NOTE:
You cannot enable authentication for a rule that includes the DNS/53
service object.
Configuring Authentication
Authentication enables you to control which RAS users can connect to the protected
network and how they can connect. When you select an authentication server, you must
also configure the users that authentication server authenticates.
Select the authentication mechanism:
•
No Authentication—Use this option to enable the specified RAS users to connect
without authentication.
•
Authentication—Use for RAS users that use HTTP, FTP, or Telnet services to connect
to the protected network. You can select an access profile as an authentication option
from the Access Profile drop-down list box .
•
Web Authentication—Use for RAS users using HTTP to connect to the protected
network.
•
Infranet Authentication—Use this option to enable specified RAS users to connect
using a Juniper Networks Infranet Controller.
An unauthenticated user trying to access a UAC protected resource via HTTP, is usually
redirected to a URL of an authenticating IC. The redirect URL is a global parameter
specified per controller. On devices running ScreenOS 6.2 or later, you can additionally
configure a redirect URL per policy, ensuring that traffic is efficiently handled.
•
If you define a policy-based redirect URL, and enable redirect in the policy,
unauthenticated HTTP traffic matching the policy is redirected to the policy-based
redirect URL even if a global redirect URL is configured.
•
If you do not define a policy-based redirect URL, and redirect is enabled in the policy,
unauthenticated HTTP traffic matching the policy is redirected to the global redirect
URL.
461
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...