[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
Pass-Through Authentication
When a user attempts to initiate an HTTP, an FTP, or
a Telnet connection request that has a policy requiring authentication,
the Juniper Networks device intercepts the request and prompts the
user to enter a name and password. Before granting permission, the
device validates the username and password by checking them against
those stored in the local database or on an external authentication
server. See Figure 143.
Figure 143: Policy Lookup for a User

- A client user
sends an FTP, an HTTP, or a Telnet packet to 1.2.2.2.
- The Juniper Networks device intercepts the packet, notes
that its policy requires authentication from either the local database
or an external authentication server, and buffers the packet.
- The Juniper Networks device prompts the user for login
information through FTP, HTTP, or Telnet.
- The user replies with a username and password.
- The Juniper Networks device either checks for an authentication
user account on its local database or it sends the login information
to the external authentication server as specified in the policy.
- Finding a valid match (or receiving notice of such a match
from the external authentication server), the Juniper Networks device
informs the user that the login has been successful.
- The Juniper Networks device forwards the packet from its
buffer to its destination IP address 1.2.2.2.
After a Juniper Networks device authenticates a
user at a particular source IP address, it subsequently permits traffic—as
specified in the policy requiring authentication through pass through—from
any other user at that same address. This might be the case if the
user originates traffic from behind a NAT device that changes all
original source addresses to a single translated address.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]