Pass-through firewall user authentication occurs when the client is trying to access a destination on another zone using FTP, Telnet, or HTTP. After authenticating successfully, the firewall acts as a proxy for an FTP, Telnet, or HTTP server so that it can first authenticate the user before allowing access to the actual FTP, Telnet, or HTTP server behind the firewall. See Figure 145.
|
Before You Begin |
|---|
|
Figure 145: Configuring Pass-Through Firewall Authentication

To configure pass-through firewall authentication, use either the J-Web or CLI configuration editor.
This topic covers: