[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Server Access Security

Posted on 2011-09-25
7
Medium Priority
?
259 Views
Last Modified: 2012-05-12

I have netscreen 25 Juniper
I need to add additional (security layer) in juniper like username and password


in fact
I need access to DB Server with 2 password
(Database password and additional password)
if any idea please help
  netscreen 25
0
Comment
Question by:AymanOZ
  • 4
  • 3
7 Comments
 
LVL 10

Expert Comment

by:ujitnos
ID: 36595492
You can create local authentication in Juniper for a rule.

Suppose brach users want to access the oracle server, then create a rule in juniper;

Branch Zone to Oracle Zone --> Allow req port and in the advanced option select local authentication.

Now for this you will need to create local users in juniper. so when this rule is hit, user will be prompted for a username and password (from Juniper). once authenticated, traffic will continue to the oracle server, else it will be denied.
0
 

Author Comment

by:AymanOZ
ID: 36936032
I am so sorry for delay .

Dear Ujitnos its working... But if the user access first time he can access next time without password
so how I can make the password question every time try to access
0
 
LVL 10

Expert Comment

by:ujitnos
ID: 36937692
Go to

Configuration > Auth > Auth Servers > Local

and try the timeout options.
0
Rewarding opportunities for women in IT

Across the nation, technology jobs are vacant because there aren’t enough qualified professionals to fill them. With a degree from WGU, you can get the credentials it takes to become an in-demand IT professional. Plus, WGU’s IT programs include industry certifications.

 

Author Comment

by:AymanOZ
ID: 37022579
Not working probably ......thanks
0
 
LVL 10

Accepted Solution

by:
ujitnos earned 2000 total points
ID: 37029156
In the cli there is a command called "clear auth" but this is to do it manually.
0
 

Author Comment

by:AymanOZ
ID: 37119141
i am late again!
0
 

Author Comment

by:AymanOZ
ID: 37126648
@ujitnos
no automatic command
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question