D-Link DFL-860E User Manual for DFL-260E - Page 399

A Group Usage Example, 8.2.8. HTTP Authentication, The Management WebUI Port Must Be Changed

Page 399 highlights

8.2.7. A Group Usage Example Chapter 8. User Authentication authentication rule. This will be either a local NetDefendOS database, an external RADIUS database server or an external LDAP server. 6. NetDefendOS then allows further traffic through this connection as long as authentication was successful and the service requested is allowed by a rule in the IP rule set. That rule's Source Network object has either the No Defined Credentials option enabled or alternatively it is associated with a group and the user is also a member of that group. 7. If a timeout restriction is specified in the authentication rule then the authenticated user will be automatically logged out after that length of time without activity. Any packets from an IP address that fails authentication are discarded. 8.2.7. A Group Usage Example To illustrate authentication group usage, suppose that there are a set of users which will login from the network 192.168.1.0/24 which is connected to the lan interface. The requirement is to restrict access to a network called important_net on the int interface to just one group of trusted users, while the other less-trusted users can only access another network called regular_net on the dmz interface. Assuming that we are using the internal database of users as the authentication source, we add the users to this database with appropriate username/password pairs and a specific Group string. One set of users would be assigned to the group with the name trusted and the other to the group with the name untrusted. We now define two IP objects for the same network 192.168.1.0/24. One IP object is called untrusted_net and has its Group parameter set to the string untrusted. The other IP object is called trusted_net and its Group parameter is set to the string untrusted. The final step is to set up the rules in the IP rule set as shown below: # Action Src Interface Src Network Dest Interface Dest Network Service 1 Allow lan trusted_net int important_net all_services 2 Allow lan untrusted_net dmz regular_net all_services If we wanted to allow the trusted group users to also be able to access the regular network we could add a third rule to permit this: # Action Src Interface Src Network Dest Interface Dest Network Service 1 Allow lan trusted_net int important_net all_services 2 Allow lan trusted_net dmz regular_net all_services 3 Allow int untrusted_net dmz regular_net all_services 8.2.8. HTTP Authentication Where users are communicating through a web browser using the HTTP or HTTPS protocol then authentication is done by NetDefendOS presenting the user with HTML pages to retrieve required user information. This is sometimes also referred to as WebAuth and the setup requires further considerations. The Management WebUI Port Must Be Changed HTTP authentication will collide with the WebUI's remote management service which also uses TCP port 80 by default. To avoid this problem, the WebUI port number must be changed before configuring authentication. Do this by going to Remote Management > advanced settings in the WebUI and changing the 399

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576
  • 577
  • 578
  • 579
  • 580
  • 581
  • 582
  • 583
  • 584
  • 585
  • 586
  • 587
  • 588
  • 589

authentication rule. This will be either a local NetDefendOS database, an external RADIUS
database server or an external LDAP server.
6.
NetDefendOS then allows further traffic through this connection as long as authentication was
successful and the service requested is allowed by a rule in the IP rule set. That rule's Source
Network object has either the
No Defined Credentials
option enabled or alternatively it is
associated with a group and the user is also a member of that group.
7.
If a timeout restriction is specified in the authentication rule then the authenticated user will be
automatically logged out after that length of time without activity.
Any packets from an IP address that fails authentication are discarded.
8.2.7. A Group Usage Example
To illustrate authentication group usage, suppose that there are a set of users which will login from
the network
192.168.1.0/24
which is connected to the
lan
interface. The requirement is to restrict
access to a network called
important_net
on the
int
interface to just one group of trusted users, while
the other less-trusted users can only access another network called
regular_net
on the
dmz
interface.
Assuming that we are using the internal database of users as the authentication source, we add the
users to this database with appropriate username/password pairs and a specific
Group
string. One
set of users would be assigned to the group with the name
trusted
and the other to the group with the
name
untrusted
.
We now define two IP objects for the same network
192.168.1.0/24
. One IP object is called
untrusted_net
and has its
Group
parameter set to the string
untrusted
. The other IP object is called
trusted_net
and its
Group
parameter is set to the string
untrusted
.
The final step is to set up the rules in the IP rule set as shown below:
#
Action
Src Interface
Src Network
Dest Interface
Dest Network
Service
1
Allow
lan
trusted_net
int
important_net
all_services
2
Allow
lan
untrusted_net
dmz
regular_net
all_services
If we wanted to allow the
trusted
group users to also be able to access the regular network we could
add a third rule to permit this:
#
Action
Src Interface
Src Network
Dest Interface
Dest Network
Service
1
Allow
lan
trusted_net
int
important_net
all_services
2
Allow
lan
trusted_net
dmz
regular_net
all_services
3
Allow
int
untrusted_net
dmz
regular_net
all_services
8.2.8. HTTP Authentication
Where users are communicating through a web browser using the HTTP or HTTPS protocol then
authentication is done by NetDefendOS presenting the user with HTML pages to retrieve required
user information. This is sometimes also referred to as
WebAuth
and the setup requires further
considerations.
The Management WebUI Port Must Be Changed
HTTP authentication will collide with the WebUI's remote management service which also uses
TCP port 80 by default. To avoid this problem, the WebUI port number must be changed before
configuring authentication.
Do this by going to
Remote Management > advanced settings
in the WebUI and changing the
8.2.7. A Group Usage Example
Chapter 8. User Authentication
399