•
User—Select the User object that represents the user you want to authenticate.
•
User Group—Select the User Group object that represents the users you want to
authenticate.
•
Group Expression—Select the Group Expression object.
•
Allow Any—Use this option to authenticate any user or user group.
To authenticate RAS users with Authentication, you must include HTTP, FTP, or Telnet
service objects in the Service column of the rule. You can include other services as well,
or select any to specify all services. To make a connection to the destination IP address
in the rule, the RAS user first initiates an HTTP, FTP, or Telnet connection to the destination
address; the security device intercepts the request packet and responds with a login
prompt for user credentials.
•
If the destination address is a subnet, the remote user must authenticate for each IP
address in that subnet.
•
If the source address supports multiple remote user accounts (such as a Unix host
running Telnet) OR is located behind a NAT device that uses a single IP address for all
NAT assignments, only the first remote user from that source address must initiate
and authenticate an HTTP, FTP, or Telnet connection. All subsequent remote users
from that source address do not need to authenticate, and can pass matching network
traffic to the destination address.
To authentication RAS users with Web Authentication, you must include HTTP service
object in the Service column of the rule. To make a connection to the destination address
in the rule, the RAS user first initiates an HTTP connection to the Web Authentication
server. The security device responds with a login prompt for user credentials.
Configuring Antivirus for Firewall Rules
To configure Antivirus protection for a firewall rule:
•
None—No Antivirus protection enabled.
•
Use External AV Server—Uses an external antivirus scanner. Select an external policy
object that defines an external scanner.
•
Use Scan Manager—Scan Manager is an embedded scanning engine. To use Scan
Manager, the security device you install the policy on must be a NetScreen-5GT or
NetScreen-Hardware Security Client device running ScreenOS 5.0 - 5.2. If you install
a policy that uses Scan Manager on a different device, the device executes and
processes traffic according to the rule, but does not detect viruses using the embedded
scanning engine.
•
Use Scan Manager with Profile—Scan Manager is an embedded scanning engine. This
setting tells the device to use the global profile specified. This setting only works for
devices running ScreenOS 5.3.
•
Use ICAP Profile
—ICAP is a method of redirecting traffic to an ICAP-capable server
running AV software. This feature is available on devices running ScreenOS 5.4 and
higher.
Copyright © 2010, Juniper Networks, Inc.
456
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...