Configuring Pass-Through Firewall Authentication
To configure the device for pass-through firewall
authentication as shown in above, follow
these steps:
- Create IP addresses for the interfaces on the device.
- Create an access profile, FWAUTH, for FWClient1 and specify a password, pwd.
- Add the FWAUTH profile for pass-through firewall authentication and define a success banner for Telnet sessions.
- Create security zones.
- user@host# set security zones security-zone UT-ZONE host-inbound-traffic system-services all
- user@host# set security zones security-zone UT-ZONE interfaces ge-0/0/1.0 host-inbound-traffic protocols all
- user@host# set security zones security-zone T-ZONE host-inbound-traffic system-services all
- user@host# set security zones security-zone T-ZONE interfaces fe-5/0/0.0 host-inbound-traffic protocols all
- Assign a security policy, policy1, to the zones.
- user@host# set security policies from-zone UT-ZONE to-zone T-ZONE policy policy1 match source-address any
- user@host# set security policies from-zone UT-ZONE to-zone T-ZONE policy policy1 match destination-address any
- user@host# set security policies from-zone UT-ZONE to-zone T-ZONE policy policy1 match application junos-telnet
- user@host# set security policies from-zone UT-ZONE to-zone T-ZONE policy policy1 then permit firewall-authentication pass-through client-match FWclient1
- Use Telnet to autheticate firewall user, FWClient1, to host2.
- If you are finished configuring the device, commit the configuration.
No comments:
Post a Comment