[Contents] [Prev] [Next] [Index] [Report an Error]

Understanding Authentication Schemes

After you define firewall users, you can create a policy that requires the users to authenticate themselves through one of two authentication schemes.

Before You Begin

For background information, read Firewall User Authentication Overview.

The first scheme authenticates users when FTP, HTTP, or Telnet traffic matching a policy requiring authentication reaches the Juniper Networks device. In the second scheme, users authenticate themselves before sending traffic (of any kind—not just FTP, HTTP, or Telnet) that has a policy requiring user authentication.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]