官术网_书友最值得收藏!

Authenticating users with User-ID

Frequently neglected but very powerful when set up properly is a standard feature called User-ID. Through several mechanisms, the firewall can learn who is initiating which sessions, regardless of their device, operating system, or source IP. Additionally, security policies can be set so users are granted access or restricted in their capabilities based on their individual ID or group membership.

User-ID expands functionality with granular control of who is accessing certain resources and provides customizable reporting capabilities for forensic or managerial reporting.

Users can be identified through several different methods:

  • Server monitoring:

    --Microsoft Active Directory security log reading for log-on events

    --Microsoft Exchange Server log-on events

    --Novell eDirectory log-on events

  • The interception of X-Forward-For (XFF) headers, forwarded by a downstream proxy server
  • Client probing using Netbios and WMI probes
  • Direct user authentication

    -- The Captive Portal to intercept web requests and serve a user authentication form or transparently authenticate using Kerberos

    -- GlobalProtect VPN client integration

  • Port mapping on a multiuser platform such as Citrix or Microsoft Terminal Server where multiple users will originate from the same source IP
  • The XML API
  • A syslog listener to receive forwarded logs from external authentication systems
主站蜘蛛池模板: 禹州市| 德州市| 辉南县| 宜宾市| 海宁市| 前郭尔| 武鸣县| 若羌县| 辽阳市| 建平县| 凉山| 海晏县| 搜索| 灵寿县| 固始县| 博客| 霸州市| 竹北市| 东乡族自治县| 彩票| 古蔺县| 巫溪县| 中宁县| 武夷山市| 漳州市| 绥滨县| 甘孜县| 永定县| 思南县| 佛学| 信宜市| 宜都市| 灵宝市| 繁峙县| 贵州省| 龙州县| 昌平区| 太湖县| 张家川| 甘泉县| 巍山|