WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies WSM User Guide - WatchGuard Technologies

watchguard.com
from watchguard.com More from this publisher
12.07.2015 Views

How User Authentication Worksvent a user from authenticating, the administrator must disable that user’s account on the authenticationserver.Using authentication from the external networkThe primary function of the authentication tool is to authenticate outgoing traffic. You can also use it torestrict incoming network traffic. When you have an account on the Firebox, you can always use externalauthentication. For example, you can type this address in your browser at home:https://IP address of Firebox external interface:4100/After you authenticate, you can use the policies that are configured for you on the Firebox.Use this procedure to let a remote user authenticate from the external network. This lets the person useresources through the Firebox.1 From Policy Manager, double-click the WatchGuard Authentication policy icon. This policyappears after you add a user or group to a policy configuration.You see a warning to be careful when you edit an automatically configured policy.2 Click the Policy tab.3 From the WG-Auth connections are drop-down list, select Allowed.4 Below the From box, click Add. Select Any from the list and click Add. Click OK.5 Below the To box, click Add. Select Firebox from the list and click Add. Click OK.Using authentication through a gateway Firebox to another FireboxTo send an authentication request through a gateway Firebox to a different Firebox, you must add a policythat allows the authentication traffic on the gateway Firebox. On the gateway Firebox, use PolicyManager to add the WatchGuard Authentication policy. This policy controls traffic on TCP port 4100.Configure the policy to allow traffic to the IP address of the destination Firebox.122 WatchGuard System Manager

Configuring the Firebox as an Authentication ServerAuthentication server typesWith Fireware®, there are five authentication methods:• Firebox• RADIUS• SecurID• LDAP• Active DirectoryYou can configure one or more authentication server types for a Firebox. Authentication to differentserver types is almost the same for the user. For the Firebox administrator, the difference is that the userdatabase can be on the Firebox or on a dedicated authentication server.When you use an authentication server, you configure it with the instructions from its manufacturer. Youinstall the server with access to the Firebox and put it behind the Firebox for security.Using a backup authentication serverYou can configure a backup authentication server with all types of third-party authentication. If the Fireboxcannot connect to the primary authentication server (after three attempts), it connects to thebackup authentication server. If the Firebox cannot connect to the backup authentication server, it waitsten minutes, and then tries to connect to the primary authentication server again. This cycle continuesuntil the Firebox connects with an authentication server.Configuring the Firebox as an Authentication ServerIf you do not use a third-party authentication server, you can use the Firebox® as an authenticationserver. This procedure divides your company into groups and users for authentication. The group towhich you assign a person is controlled by the tasks they do and information they use. For example, youcan have an accounting group, a marketing group, and a research and development group. You can alsohave a new employee group, with controlled access to the Internet.In a group, you set the authentication procedure for the users, the system type, and the information towhich they have access. A user can be a network or a computer. If your company changes, you can addor remove users or systems from your groups.Use Policy Manager to:• Add, change, or delete the groups in the configuration• Add or change the users in a groupAbout Firebox authenticationYou can configure the Firebox to authenticate users for three different types of authentication:• Firewall authentication• PPTP connections• MUVPN connectionsWhen the authentication is successful, the Firebox makes a mapping between these items:• User name• Firebox User group (or groups) of which the user is a member• IP address on the user’s computer when the user authenticatesUser Guide 123

How <strong>User</strong> Authentication Worksvent a user from authenticating, the administrator must disable that user’s account on the authenticationserver.Using authentication from the external networkThe primary function of the authentication tool is to authenticate outgoing traffic. You can also use it torestrict incoming network traffic. When you have an account on the Firebox, you can always use externalauthentication. For example, you can type this address in your browser at home:https://IP address of Firebox external interface:4100/After you authenticate, you can use the policies that are configured for you on the Firebox.Use this procedure to let a remote user authenticate from the external network. This lets the person useresources through the Firebox.1 From Policy Manager, double-click the <strong>WatchGuard</strong> Authentication policy icon. This policyappears after you add a user or group to a policy configuration.You see a warning to be careful when you edit an automatically configured policy.2 Click the Policy tab.3 From the WG-Auth connections are drop-down list, select Allowed.4 Below the From box, click Add. Select Any from the list and click Add. Click OK.5 Below the To box, click Add. Select Firebox from the list and click Add. Click OK.Using authentication through a gateway Firebox to another FireboxTo send an authentication request through a gateway Firebox to a different Firebox, you must add a policythat allows the authentication traffic on the gateway Firebox. On the gateway Firebox, use PolicyManager to add the <strong>WatchGuard</strong> Authentication policy. This policy controls traffic on TCP port 4100.Configure the policy to allow traffic to the IP address of the destination Firebox.122 <strong>WatchGuard</strong> System Manager

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!