[Contents] [Prev] [Next] [Index] [Report an Error]

Pass-Through Authentication

When a user attempts to initiate an HTTP, an FTP, or a Telnet connection request that has a policy requiring authentication, the Juniper Networks device intercepts the request and prompts the user to enter a name and password. Before granting permission, the device validates the username and password by checking them against those stored in the local database or on an external authentication server. See Figure 22.

Figure 22: Policy Lookup for a User

Image auth_user_pol_ref.gif

  1. A client user sends an FTP, an HTTP, or a Telnet packet to 1.2.2.2.
  2. The Juniper Networks device intercepts the packet, notes that its policy requires authentication from either the local database or an external authentication server, and buffers the packet.
  3. The Juniper Networks device prompts the user for login information through FTP, HTTP, or Telnet.
  4. The user replies with a username and password.
  5. The Juniper Networks device either checks for an authentication user account on its local database or it sends the login information to the external authentication server as specified in the policy.
  6. Finding a valid match (or receiving notice of such a match from the external authentication server), the Juniper Networks device informs the user that the login has been successful.
  7. The Juniper Networks device forwards the packet from its buffer to its destination IP address 1.2.2.2.

After a Juniper Networks device authenticates a user at a particular source IP address, it subsequently permits traffic—as specified in the policy requiring authentication through pass through—from any other user at that same address. This might be the case if the user originates traffic from behind a NAT device that changes all original source addresses to a single translated address.


[Contents] [Prev] [Next] [Index] [Report an Error]