Restricting users to the internet via usernames

Source: Internet
Author: User

Restricting users to the internet via usernames

U Case Requirements

How do I use the TMG firewall to restrict users to the Internet through usernames?

U Knowledge Tips

In the TMG firewall in addition to the IP address can restrict users to the Internet, but also through the user name limit users to the Internet, the user needs to be authenticated. In general, the following two cases are divided.

? Workgroup Environment

If TMG is not joined to a Windows domain, the user will need to be authenticated using a mirrored account, which is to create a user account with exactly the same user name and password on the TMG and the client, and TMG authenticates the user.

? Windows domain environment

If TMG is joined to a Windows domain, it is possible to restrict the accounts or groups that already exist in the ad directly, and the ad authenticates the user.

Here's how to add TMG to a Windows domain, in the following steps.

(1) Create a new group in AD, the group is named "Allow Internet users", and then add the user account that needs to allow Internet access to the group, as shown in 2.1.

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image002 "border=" 0 "alt=" clip_image002 "src=" http://s3.51cto.com/wyfs02/M00/77/8B/ Wkiom1zpf1syaedaaaavbonak1w268.jpg "" 237 "height=" 244 "/>

Figure 2.1 Creating a new group

(2) Create a new user set in TMG, the user set name is "Allow Internet users", 2.2 is shown.

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image004 "border=" 0 "alt=" clip_image004 "src=" http://s3.51cto.com/wyfs02/M01/77/8B/ Wkiom1zpf1xtiwruaaa27sstjjs425.jpg "" 244 "height=" 178 "/>

Figure 2.2 Creating a new user set

(3) In the Users window, click the Add button, and then select Windows Users and groups, click the Next button, 2.3.

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image006 "border=" 0 "alt=" clip_image006 "src=" http://s3.51cto.com/wyfs02/M00/77/8A/ Wkiol1zpf1bgu4wwaaapmtrjwjc486.jpg "" 244 "height=" 175 "/>

Figure 2.3 Entering the rule name

(4) In the window shown in 2.4, select the new group in AD "Allow Internet users", then click the "OK" button, 2.5, and then click the "Next" button to complete the creation of the user set.

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image008 "border=" 0 "alt=" clip_image008 "src=" http://s3.51cto.com/wyfs02/M02/77/8B/ Wkiom1zpf1bxuw5haaaqoi3jjuc195.jpg "" 244 "height=" "/>

Figure 2.4 Selecting a user or group

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image010 "border=" 0 "alt=" clip_image010 "src=" http://s3.51cto.com/wyfs02/M00/77/8B/ Wkiom1zpf1fqln9maaanrij2pyq059.jpg "" 244 "height=" 177 "/>

Figure 2.5 Completing the Add user

(5) Create a new access rule in TMG, add the new user set "Allow Internet users" on the "User set" page of the New Access Rule Wizard, delete the original user set "All users", 2.6, and then click the "Next" button to complete the creation of the access rule.

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image012 "border=" 0 "alt=" clip_image012 "src=" http://s3.51cto.com/wyfs02/M00/77/8A/ Wkiol1zpf1jam8akaaat9b4xdxs021.jpg "" 244 "height=" 184 "/>

Figure 2.6 Selecting a user set

(6) If you want to enable user authentication, the client must be configured as a Web proxy or TMG Firewall client, and SecureNAT does not support authentication. In this case, the client is configured as a Web proxy client, as shown in 2.7.

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image014 "border=" 0 "alt=" clip_image014 "src=" http://s3.51cto.com/wyfs02/M01/77/8B/ Wkiom1zpf1mijzdzaaa91a-30ea733.jpg "" 244 "height=" 184 "/>

Figure 2.7 Setting up a time plan

(7) On the client page, you will be asked to enter a user name and password to continue, as shown in 2.8. After correctly entering the "Allow Internet users" group in the account and password, you can browse the Web page, if you do not enter a valid user name and password, there will be 2.9 error page shown.

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image016 "border=" 0 "alt=" clip_image016 "src=" http://s3.51cto.com/wyfs02/M02/77/8B/ Wkiom1zpf1qhva8maaaq34bhg0i935.jpg "" 244 "height=" 184 "/>

Figure 2.8 Asking for a user name and password

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image018 "border=" 0 "alt=" clip_image018 "src=" http://s3.51cto.com/wyfs02/M01/77/8B/ Wkiom1zpf1ugoxekaaa3-ac6jzw402.jpg "" 244 "height=" 184 "/>

Figure 2.9 Error message

(8) Using account Zhangsan on the client computer to log on to the domain and then browse the Web page, the user can browse the Web page, as shown in 2.10.

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; padding-left:0px; padding-right:0px; border-top:0px; border-right:0px; padding-top:0px "title=" clip_image020 "border=" 0 "alt=" clip_image020 "src=" http://s3.51cto.com/wyfs02/M00/77/8A/ Wkiol1zpf1yrkurwaaafgziyzha634.jpg "" 244 "height=" 184 "/>

Figure 2.10 Normal web browsing

Restricting users to the internet via usernames

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.