Pass-through firewall user authentication occurs when the client is trying to access a destination on another zone using FTP, Telnet, or HTTP. After authenticating successfully, the firewall acts as a proxy for an FTP, Telnet, or HTTP server so that it can first authenticate the user before allowing access to the actual FTP, Telnet, or HTTP server behind the firewall. See Figure 24.
Before You Begin |
---|
|
Figure 24: Configuring Pass-Through Firewall Authentication
To configure pass-through firewall authentication, use either the J-Web or CLI configuration editor.
This topic covers: