D-Link DFL-2500 User Guide - Page 158

Confirm Secret

Page 158 highlights

17.4. Scenarios: User Authentication Configuration 139 Example: Configuring a RADIUS server An external user authentication server can be configured by following the steps below: WebUI : User Authentication → External User Databases→ Add → External User Database: General Name: Enter a name for the server here. Type: The only type supported currently is Radius. IP Address: Enter the IP address of the server here, or enter the symbolic name if the server's address has previously been defined in the Address Book. Port: 1812 (RADIUS service uses registered UDP port 1812 by default.) Retry Timeout: 2 (The firewall will resend authentication request to the sever if there is no response after the timeout, e.g. every 2 seconds. The firewall will retry three times as maximum.) Shared Secret: Enter a text string here for basic encryption of the RADIUS messages. Confirm Secret:Retype the string to confirm the one typed above. and then click OK Example: Enabling HTTP authentication via local user database To enable user authentication via a Web page, first, we need to add an Allow rule in the firewall's IP rules to let the firewall accept user's Web browsing to its HTTP(TCP port 80) agent; second, we specify a user authentication rule to tell the firewall how to perform the authentication, such as which database to take for user's profile lookup, and also the timeout restrictions; Third, another IP rule for dealing with service requests from authenticated users should be appended under the Allow rule from the first step. As explained in 14 IP Rules, all the other traffics that are not explicitly allowed by the IP rule, for example, the unauthenticated traffic coming from the interface where authentication is D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

17.4.
Scenarios
: User Authentication Configuration
139
Example
:
Configuring a RADIUS server
An external user authentication server can be configured by following the
steps below:
WebUI
:
User Authentication
External User Databases
Add
External
User Database
:
General
Name
: Enter a name for the server here.
Type
: The only type supported currently is
Radius
.
IP Address
: Enter the IP address of the server here, or enter the symbolic
name if the server’s address has previously been defined in the
Address
Book
.
Port
: 1812 (RADIUS service uses registered UDP port 1812 by default.)
Retry Timeout
: 2 (The firewall will resend authentication request to the
sever if there is no response after the timeout, e.g.
every 2 seconds.
The
firewall will retry three times as maximum.)
Shared
Secret
:
Enter a text string here for basic encryption of the
RADIUS messages.
Confirm Secret
:Retype the string to confirm the one typed above.
and then click
OK
Example
:
Enabling HTTP authentication via local user
database
To enable user authentication via a Web page, first, we need to add an
Allow
rule in the firewall’s IP rules to let the firewall accept user’s Web
browsing to its HTTP(TCP port 80) agent; second, we specify a user
authentication rule to tell the firewall how to perform the authentication,
such as which database to take for user’s profile lookup, and also the
timeout restrictions; Third, another IP rule for dealing with service
requests from authenticated users should be appended under the
Allow
rule from the first step. As explained in
14 IP Rules
, all the other traffics
that are not explicitly allowed by the IP rule, for example, the
unauthenticated traffic coming from the interface where authentication is
D-Link Firewalls User’s Guide