Solved

Transparent firewall authentication of Windows client through Juniper SSG

Posted on 2011-02-16
3
1,046 Views
Last Modified: 2012-05-11
We are currently switching from an MS ISA firewall to a Juniper SSG.  One nice feature of ISA is that it's integrated with Active Directory, meaning it's very easy to create firewall access rules that are dependent on AD groups.  For example, only users that are members of the AD group FTPUsers are allowed to use FTP through the ISA.

I am attempting to migrate a few of these group-dependent rules over to the Juniper.  I have managed to configure MS Network Policy Server as the RADIUS server which the Juniper uses for authentication.  This works for authenticating users.  However, they are prompted for credentials when attempting to use a protocol whose Juniper rule is group-dependent.

Does anyone know of a way that the Windows clients could pass the credentials of the logged-on user - via RADIUS - to the Juniper when prompted?

It would go something like this:
Windows client requests use of a protocol through the Juniper -->
<-- Juniper queries for user credentials
Windows client provides credentials of currently logged-on user -->
Juniper authenticates user via RADIUS and provides access, if the user is a member of the relevant group

In short, it's going to be cumbersome for my users if they are required to enter credentials any time that they wish to use a group-dependent protocol through the Juniper.  I've contacted Juniper support, and they're pointing back to the Windows client as the mechanism for solving this issue.  Thank you for your assistance.
0
Comment
Question by:sloth10k
3 Comments
 
LVL 18

Accepted Solution

by:
deimark earned 500 total points
Comment Utility
In short, juniper support are correct, the client is the best way to maintain this sign credentials and also pass them on when requested

Sadly, the SSG cannot manage any of this single sign on ( SSO)

However, Juniper do have a very good SSL VPN device, the SA series, that integrates really well into AD and also manages the SSO well too.  It is of course another device but it is the market leader for providing remote access solutions
0
 
LVL 33

Expert Comment

by:digitap
Comment Utility
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now