NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [FW1] Web Surfing Authentication using NT Domains



It might be nice to note that although you can authorize that an individual
trying to surf the web is an member of your domain, that is all you
can do with MetaIP relative to this question-- you cannot create any other
type of rule using the users in MetaIP.   IE you can not create a rule that
says   SpecificMETAIPUSER  *ANY *HTTP *PERMIT   just 
ALLUSERSER@ANY  ANY ANY CLIENT AUTH.


-----Original Message-----
From: [email protected]
[mailto:[email protected]]On Behalf Of
James C. Hanrahan
Sent: Wednesday, January 24, 2001 12:29 PM
To: 'Toth, David'; [email protected]
Subject: RE: [FW1] Web Surfing Authentication using NT Domains



David:
I use user auth with steel belted radius and it works great. 
You could also use metaip and would not have to change your browser proxy
settings.

Good luck,
Jimmy

Jimmy Hanrahan                 Intrasystems Inc.
Network Architect              50 Thomas Patten Drive
Phone:Randolph MA 02368
Email:[email protected]    Web:www.intrasystems.com  


-----Original Message-----
From: Toth, David [mailto:[email protected]]
Sent: Wednesday, January 24, 2001 12:11 PM
To: [email protected]
Subject: [FW1] Web Surfing Authentication using NT Domains



All,

Is is possible to use your NT domains to authenticate Internet users thru
FW-1 or do I have to use an LDAP or RADIUS server?

Thanks in Advance,

Dave.


============================================================================
====
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
============================================================================
====


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================



http://www.primeinc.com
**********************************************************************
This email and any files transmitted with it are confidential
and intended solely for the use of the individual or entity to
whom they are addressed.  If you have received this email
in error please reply to the sender of the message.

The views expressed in this correspondence may not
reflect the views of Prime, Inc.

This footnote also confirms that this email message has
been scanned for the presence of computer viruses.
***********************************************************************



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.