WebAuth Example
This section describes a typical WebAuth configuration example.
In this example, WebAuth user access control is demonstrated. It allows only user1 who is authenticated using WebAuth to access Internet. All other accesses are denied. The WebAuth server is the local AAA server named local.
Take the following steps:
Step 1: Create a user.
- Select Objects > Local User from the menu bar.
- In the Local User dialog, select local from the Local server drop-down list, and click New > User.
- In the User Configuration dialog, configure as follows:
- Name: user1
- Password: 123456
- Confirm password:123456
- Click OK to save your settings.
- In Local User dialog, select local from the Local server drop-down list, and click New > User group.
- In the User Group Configuration dialog, configure as follows:
- Name: usergroup1
- Available: user1
- Selected: user1
- Click OK to save your settings.
Step 2: Create a role and a role mapping rule.
- Select Objects > Role from the menu bar.
- In the Role dialog, click New > Role.
- In the Role Configuration dialog, type role1 into the Role name box, and then click OK.
- In the Role dialog, click New > Role Mapping.
- In the Role Mapping Configuration dialog, configure as follows:
- Name: role-mapping1
- Member: Select role1, usergroup, usergroup1 in turn, and then click Add
- Click OK to save the settings and return to the Role Mapping Configuration dialog.
- Click OK in the Role Mapping Configuration dialog.
Step 3: Configure an address entry and AAA server.
- Select Objects > Address Book from the menu bar.
- In the Address Book dialog, click New.
- In the Address Entry Configuration dialog, configure as follows:
- Name: addr_book
- Member: Select and type IP/netmask, 192.168.1.1, 16 in turn, and then click Add
- Click OK to save your settings, and then close the Address Book dialog.
- Select Objects > AAA Server from the menu bar.
- In the AAA Server dialog, select local from the list, and then click Edit.
- In the Local Server Configuration dialog, select role-mapping1 from the Role mapping rule drop-down list.
- Click OK to save your changes.
- In the AAA Server dialog, click OK to save your settings.
Step 4: Configure interfaces and zones.
- On the Navigation pane, click Configure > Network > Network to visit the Network page.
- Select ethernet0/0 from the interface list, and click Edit. In the Interface Configuration dialog, configure the options as below:
- Binding type: Layer 3 zone
- Zone: trust
- Type: Static IP
- IP address: 192.168.1.1
- Netmask: 16
- Click OK to save the changes and return to the Network page.
- Select ethernet0/1 from the interface list, and click Edit. In the Interface Configuration dialog, configure the options as below:
- Binding type: Layer 3 zone
- Zone: untrust
- Type: Static IP
- IP address: 66.1.200.1
- Netmask: 16
- Click OK to save the changes and return to the Network page.
Step 5: Configure policy rules.
- On the Navigation pane, click Configure > Security > Policy to visit the Policy page.
- Click New and in the Policy Configuration dialog, configure options as follows:
- Src zone: trust
- Dst zone: untrust
- Src address: Any
- Dst address: Any
- Service: DNS
- Action: Permit
- Click OK to save your settings. System creates a policy rule, and its ID is 1.
- Click New and in the Policy Configuration dialog, configure options as follows:
- Src zone: trust
- Dst zone: untrust
- Src address: addr_book
- Dst address: Any
- Service: Any
- Source user: Click Multiple and in the Role/User/User Group Configuration dialog, select Role and specify the role name as role1
- Action: Permit
- Click OK to save your settings. System creates a policy rule, and its ID is 2.
Step 6: Configure WebAuth function.
- On the Navigation pane, click Configure > Network > WebAuth to visit the WebAuth Parameter Configuration page.
- Click Edit to enter into the edit mode. Modify according to your need:
- Mode: HTTP
- HTTP port: 8181
- Click OK to save your settings.
- On the Navigation pane, click Configure > Security > Policy to visit the Policy page.
- Click New and in the Policy Configuration dialog, configure the options as below:
- Src zone: trust
- Dst zone: untrust
- Src address: addr_book
- Dst address: Any
- Service: Any
- Source user: Click Multiple and in the Role/User/User Group Configuration dialog, select Role and specify the role name as UNKNOWN
- Action: WebAuthlocal
- Click OK to save your settings.