官术网_书友最值得收藏!

Authenticating users with User-ID

Frequently neglected but very powerful when set up properly is a standard feature called User-ID. Through several mechanisms, the firewall can learn who is initiating which sessions, regardless of their device, operating system, or source IP. Additionally, security policies can be set so users are granted access or restricted in their capabilities based on their individual ID or group membership.

User-ID expands functionality with granular control of who is accessing certain resources and provides customizable reporting capabilities for forensic or managerial reporting.

Users can be identified through several different methods:

  • Server monitoring:

    --Microsoft Active Directory security log reading for log-on events

    --Microsoft Exchange Server log-on events

    --Novell eDirectory log-on events

  • The interception of X-Forward-For (XFF) headers, forwarded by a downstream proxy server
  • Client probing using Netbios and WMI probes
  • Direct user authentication

    -- The Captive Portal to intercept web requests and serve a user authentication form or transparently authenticate using Kerberos

    -- GlobalProtect VPN client integration

  • Port mapping on a multiuser platform such as Citrix or Microsoft Terminal Server where multiple users will originate from the same source IP
  • The XML API
  • A syslog listener to receive forwarded logs from external authentication systems
主站蜘蛛池模板: 泰和县| 德州市| 玉门市| 任丘市| 邮箱| 花莲县| 阿巴嘎旗| 吴江市| 新沂市| 乐山市| 夏津县| 丰台区| 龙门县| 安阳县| 崇礼县| 敦煌市| 赤壁市| 肥西县| 中卫市| 阳谷县| 新龙县| 洮南市| 米林县| 安丘市| 修水县| 惠水县| 珲春市| 邵阳市| 托里县| 双鸭山市| 贺兰县| 康马县| 安溪县| 冕宁县| 咸阳市| 榆社县| 丹东市| 吴江市| 承德县| 密云县| 四会市|