Juniper Firewall user authentication Illustrated tutorial

Source: Internet
Author: User
Tags auth ftp firewall

Today just learn to juniper firewall in the user authentication, so today we take a look at the Juniper Firewall user authentication.

User classification for Juniper firewalls:

1, Admin User: Administrator users

2, Auth User: Authenticated Users

3, IKE user:ike The first phase of user certification

4, XAuth user:ike1.5 phase of the user's certification

5, L2TP User: For L2TP users of the certification

6, 802.1X: Used to do 802.1x certification.

Juniper Firewall users are divided into the above five types. Each user is their own graph, Admin user can not be used to do auth user authentication. Unlike Cisco's users, a user can be used for a variety of businesses.

Juniper user authentication is divided into two types:

One is based on the firewall authentication, the other is the web-based authentication

Here today we'll just introduce auth User: How to use Authenticated users.

firewall authentication requires a traffic matching policy to trigger a login session: the policy must allow Telnet, FTP, or HTTP.

Once the certification passes, all traffic for the matching policy will be passed

You can think that firewall authentication is an online authentication. The user must produce a Web session, Telnet session, or FTP session that matches the authentication policy. At that time, the user was prompted to enter a username/password. Once the certification is passed, all traffic allowed by this policy will be allowed to pass.

If the user does not authenticate, the traffic will not be allowed to pass even if the matching policy is not made. For example, your authentication policy allows ping, an authenticated user to attempt to ping, so that the address and service are matched and the authentication process does not occur, so traffic is discarded. The user then uses a Web browser session to pass through the firewall, authenticate, and then ping. At this point, the ping will be allowed.

Click "Objects>> Users>> The "new" button in the top right corner of the local to clear and add a new user.

The first step: User name to enter the username.

Step Two: User Password: Enter the password. Confirm Password: Enter a confirmation password.

Step Three: Authentication User: Select the type of our account. Because we are here to talk about certification, so we have to select the authenticated user.

The fourth step: Enter OK later click "OK".

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.