HP X Unified Security Platform Series Instrukcja Użytkownika Strona 268

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 333
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 267
Chapter 9 Authentication
252 X Family LSM User’s Guide V 2.5.1
STEP 1
A user logs on to the device to gain access to network resources.
To access network services through the device Firewall, the user opens up a standard Web
browser and logs in using the LAN IP address of the device via HTTPS.
When prompted, the user enters a username and password.
STEP 2
The device authenticates the user (checks that the user is listed in the database and that the
username and password are correct). Two methods are available for user authentication:
Using a RADIUS authentication server. The preferred method, for large networks.
Using the local X family database. This can be used if no RADIUS server is available,
typically for small networks.
STEP 3
If no matching username and password can be located in the database, the firewall denies the
login request.
If a matching user is found, the firewall applies the privileges associated with the privilege
group to which the user belongs.
STEP 4
When a user requests a network service in another security zone, the device applies the rele-
vant firewall rule for the type of service or application being requested:
If a firewall rule is restricted to authenticated users and the user requesting the service is not
in a privilege group that requires Firewall Rule Authentication, firewall rule matching skips to
the next firewall rule in the table looking for a match.
For more detailed information on user authentication, refer to the Concepts Guide.
RADIUS
The X family supports user authentication via Remote Authentication Dial-In User Service
(RADIUS). Radius authentication may be used in place of the embedded user database within TOS,
and may be used for all authenticated access for Local Users.
The following activities may be authenticated using RADIUS:
•VPN client dialup
Inter-site VPN access
Internet access
Web filtering bypass
You can view and manage the RADIUS configuration parameters from the RADIUS page
(Authentication > Radius).
Configure RADIUS
STEP 1
From the LSM menu, select Authentication > RADIUS.
STEP 2
On the RADIUS page, check Enable RADIUS authentication to use remote user authentica-
tion.
STEP 3
To specify the activities managed by RADIUS authentication, check User Authentication
and/or VPN Client Access.
Przeglądanie stron 267
1 2 ... 263 264 265 266 267 268 269 270 271 272 273 ... 332 333

Komentarze do niniejszej Instrukcji

Brak uwag