- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
12-06-2012 07:28 AM
Kind of as per the subject really. I'm interested in using User ID so that only authenticated users have internet access, but I'm not sure quite how "real-time" it is?
Basically I'm trying to understand the downsides of using User-ID for policy enforcement rather than simply for additional log information.
Our PAN is running 4.1.8 and our User Agent is 3.1.2.
Thanks.
12-06-2012 01:04 PM
Hello,
It's pretty much real time. There are some time gaps, but it should not be noticeable by a user.
Hope this helps!
Greg
12-06-2012 01:04 PM
Hello,
It's pretty much real time. There are some time gaps, but it should not be noticeable by a user.
Hope this helps!
Greg
12-08-2012 05:49 AM
Thanks Greg, Captive Portal as a "last resort" rule if the user is still unknown sounds very workable here.
We're on 4.1.8 and I must admit I'm a little confused from the online help how I'd only display the portal if the User-ID was unknown, and how I'd hook the portal into LDAP/Active Directory for authentication - do you have any link or KB articles please (I'm just going to do a search of Knowledge Point now ).
Thanks.
12-08-2012 06:41 PM
Hello,
You can configure a captive portal policy first, for eg: trust to un-trust, action: captive-portal. If the firewall receives a http request from a IP it doesn't have any user-mapping for, they are basically 'Unknown' and will trigger the portal authentication page. You can configure the authentication profile/mode of Captive portal to use as well, from Device tab--->User-identification-->Captive portal.
Here's a good reference guide,
Hope that helps!
Thanks,
Aditi
12-10-2012 03:36 AM
Thanks Aditi, I've got it working.
So the next question - right now I have a "whitelist" rule as the last rule in my security policy. It essentially says
"If it's from the Lan to Any other Zone, if it's in the "whitelist" URL Filtering profile allow it, otherwise block it".
This is used for a few domains such as antivirus updates, microsoft, etc.
What's the best way to drop a rule in underneath this as the captive portal rule so that the whitelist rule still fires, since it's used by things such as servers that don't have a person sitting there to enter credentials - is source IP in the captive portal the only option here?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!