[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

pass-through

Syntax

pass-through {
default-profile profile-name;
(ftp | http | telnet) {
banner {
fail string;
login string;
success string;
}
}
}

Hierarchy Level

[edit access firewall-authentication]

Release Information

Statement introduced in Release 8.5 of JUNOS software.

Description

Configure pass-through firewall user authentication, when a host or user from one zone needs to access a protected resource in another zone. A user must use an FTP, Telnet, or HTTP client to access the IP address of the protected resource and get authenticated by the firewall. The device uses FTP, Telnet, and HTTP to collect username and password information. Subsequent traffic from the user or host is allowed or denied based on the result of this authentication. After the user is authenticated, the firewall proxies the connection.

This statement is supported on J-series and SRX-series devices.

Options

The remaining statements are explained separately.

Usage Guidelines

For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.

Required Privilege Level

access—To view this statement in the configuration.

access-control—To add this statement to the configuration.


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]