firewall-authentication
Syntax
firewall-authentication {
pass-through {
default-profile profile-name;
ftp {
banner {
fail string;
login string;
success string;
}
}
http {
banner {
fail string;
login string;
success string;
}
}
telnet {
banner {
fail string;
login string;
success string;
}
}
}
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
user-firewall {
default-ssl-termination-profile default-ssl-termination-profile;
}
web-authentication {
banner {
fail string;
logout string;
success string;
}
default-profile profile-name;
logo file path;
timeout seconds;
}
}
Hierarchy Level
[edit access]
Description
Enabling tracing can adversely impact scale and performance and may increase security risk. We strongly recommend using the trace, tracing, or traceoptions commands only under the guidance of a JTAC support engineer. After collecting the debug information, immediately disable tracing to minimize risk and restore normal system performance.
Configure default firewall authentication settings used by firewall authentication policies that restrict and permit access of firewall users to protected resources behind a firewall.
Options
The remaining statements are explained separately. See CLI Explorer.
Required Privilege Level
access—To view this statement in the configuration.
access-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 8.5.