After you define firewall users, you can create a policy that requires the users to authenticate themselves through one of two authentication schemes.
|
Before You Begin |
|---|
|
For background information, read Firewall User Authentication Overview. |
The first scheme authenticates users when FTP, HTTP, or Telnet traffic matching a policy requiring authentication reaches the Juniper Networks device. In the second scheme, users authenticate themselves before sending traffic (of any kind—not just FTP, HTTP, or Telnet) that has a policy requiring user authentication.
This topic covers: