1-3
Security policy server
Server that interacts with portal clients and access devices for security authentication and resource
authorization.
The above five components interact in the following procedure:
1) When an unauthenticated user enters a website address in the address bar of the IE to access the
Internet, an HTTP request is created and sent to the access device, which redirects the HTTP
request to the web authentication homepage of the portal server. For extended portal functions,
authentication clients must run the portal client.
2) On the authentication homepage/authentication dialog box, the user enters and submits the
authentication information, which the portal server then transfers to the access device.
3) Upon receipt of the authentication information, the access device communicates with the
authentication/accounting server for authentication and accounting.
4) After successful authentication, the access device checks whether there is corresponding security
policy for the user. If not, it allows the user to access the Internet. Otherwise, the client, the access
device and the security policy server communicates to perform security authentication of the user,
and the security policy server authorizes the user to access resources depending on the security
authentication result.
z
Since a portal client uses an IP address as its ID, ensure that there is no Network Address
Translation (NAT) device between the authentication client, access device, portal server, and
authentication/accounting server when deploying portal authentication. This is to avoid
authentication failure due to NAT operations.
z
Currently, only a RADIUS server can serve as the remote authentication/accounting server in a
portal system.
z
Currently, security authentication requires the cooperation of the iNode client.
Portal Authentication Modes
Portal authentication supports two modes: non-Layer 3 authentication and Layer 3 authentication.
Non-Layer 3 authentication
Non-Layer 3 authentication falls into two categories: direct authentication and Re-DHCP authentication.
z
Direct authentication
Before authentication, a user manually configures an IP address or directly obtains a public IP address
through DHCP, and can access only the portal server and predefined free websites. After passing
authentication, the user can access the network resources. The process of direct authentication is
simpler than that of re-DHCP authentication.
z
Re-DHCP authentication
Before authentication, a user gets a private IP address through DHCP and can access only the portal
server and predefined free websites. After passing authentication, the user is allocated a public IP
address and can access the network resources. No public IP address is allocated to those who fails
Содержание S7902E
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45 ...
Страница 598: ...ii ...
Страница 1757: ...4 9 ...
Страница 1770: ...6 4 ...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface ...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20 ...