F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Access Control Configuration Guide-6PW100

147
13BConfiguring portal authentication
Portal authentication can be configured only at the CLI.
Dialer interfaces, virtual-template interfaces, and tunnel interfaces do not support portal authentication.
The term "router" in this document refers to both routers, routing-capable firewalls, and UTM devices.
61B
Feature and hardware compatibility
Hardware Portal authentication
com
atible
F1000-A-EI/F1000-S-EI Yes
F1000-E Yes
F5000 No
Firewall module Yes
U200-A Yes
U200-S Yes
62B
Overview
Portal authentication helps control access to the Internet. Portal authentication is also called "Web
authentication." A website implementing portal authentication is called a portal website.
With portal authentication, an access device redirects all users to the portal authentication page. All
users can access the free services provided on the portal website. However, to access the Internet, a user
must pass portal authentication.
A user can access a known portal website and enter a username and password for authentication. This
authentication mode is called active authentication. There is another authentication mode, forced
authentication, in which the access device forces a user who is trying to access the Internet through HTTP
to log on to a portal website for authentication.
The portal feature provides the flexibility for ISPs to manage services. A portal website can, for example,
present advertisements and deliver community and personalized services. In this way, broadband
network providers, equipment vendors, and content service providers form an industrial ecological
system.
193BExtended portal functions
By forcing patching and anti-virus policies, extended portal functions help users to defend against viruses.
Portal authentication supports the following extended functions:
Security check—Works after identity authentication succeeds to check whether the required
anti-virus software, virus definition file, and operating system patches are installed, and whether
there is any unauthorized software installed on the user host.