[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Configuring for Pass-Through Authentication

Pass-through firewall user authentication occurs when the client is trying to access a destination on another zone using FTP, Telnet, or HTTP. After authenticating successfully, the firewall acts as a proxy for an FTP, Telnet, or HTTP server so that it can first authenticate the user before allowing access to the actual FTP, Telnet, or HTTP server behind the firewall. See Figure 24.

Before You Begin

  1. Establish basic connectivity. (See the Getting Started Guide for your device.)
  2. Read Understanding Authentication Schemes.
  3. Read Firewall User Authentication Overview.

Figure 24: Configuring Pass-Through Firewall Authentication

Image auth-passthrough.gif

 

To configure pass-through firewall authentication, use either the J-Web or CLI configuration editor.

This topic covers:


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]