108
C
HAPTER
7: S
ETTING A
P
OLICY
Changing Passwords and Privileges
To change a user’s password or privileges:
1
Highlight the name in the scrollable box.
2
Make the changes.
3
Click
Update User
.
Deleting a User
To delete a user, highlight the name and click
Remove User
.
To configure a user’s machine to support privileged users see
“Establishing an Authenticated Session” below.
Establishing an
Authenticated
Session
Authenticated Sessions allow a user on the Internet to access the LAN
without restrictions, or allow a user on the LAN to access the Internet
without restrictions, bypassing the Web Site Filters.
Make sure that the Web browser software being used to establish an
authenticated session support Java, JavaScript or ActiveX scripting.
To establish an Authenticated Session, you point your Web browser at the
Firewall’s LAN IP Address. This process is identical to the administrator
login.
A dialog box is displayed, asking you for the user name and password.
After filling in these boxes and clicking
Login
, the password is verified
using MD5 authentication. The password is never sent ”in the clear” over
the Internet, preventing password theft and replay attacks.
Once authenticated, remote users can access all IP resources on the LAN,
and users on the LAN can bypass the Web Site Filter. The connection
closes if user inactivity on the connection exceeds the configured
time-out period. In that case, the remote user must re-authenticate. If it
seems like authentication is failing for no reason, make sure that the Caps
Lock key on the keyboard is not on.
NAT must not be enabled for remote authenticated access.
DUA1611-0AAA02.book Page 108 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...