interface. These clients will want HTTP access to hosts on a network
server_net
on the
If2
interface.
Clients connections will be authenticated using the identity awareness feature. The only
usernames that will be allowed are
user1@mydomain
and
user2@mydomain
.
It is also assumed that the D-Link
Authentication Agent
software has already been installed on a
single external Windows domain server and is configured with the IPv4 address defined by the
address book object
aa_server_ip
and the pre-shared key defined by the
aa_server_key
PSK
object.
It is assumed that the domain has only one server.
Command-Line Interface
Define an
Authentication Agent
object that describes the external server:
gw-world:/> add AuthAgent IPAddress=aa_server_ip
PSK=aa_server_key
Name=my_auth_agent
Assign the permitted usernames to the network object for client IPs:
gw-world:/> add Address IP4Address client_net
UserAuthGroups=user1@mydomain,user2@mydomain
Create an
IP Policy
which allows access and uses
client_net
as the source network.
gw-world:/main> add IPPolicy
SourceInterface=If1
SourceNetwork=client_net
DestinationInterface=If2
DestinationNetwork=server_net
Service=http-all
Name=client_to_server
Action=Allow
Web Interface
Define the
Authentication Agent
object that describes the external server:
1.
Go to:
Policies > Authentication > Authentication Agents > Add > Authentication Agent
2.
Now enter:
•
Name: my_auth_agent
•
IP Address: aa_server_ip
•
Pre-shared key: aa_server_key
3.
Click OK
Assign the permitted usernames to the network object for client IPs:
1.
Go to: Objects > Address Book > client_net
2.
Select the User Authentication tab
Chapter 8: User Authentication
643
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...