Interaction Between Portal System Components; Portal Authentication Modes - HP MSR2000 Configuration Manual

Hide thumbs Also See for MSR2000:
Table of Contents

Advertisement

Interaction between portal system components

The components of a portal system interact as follows:
1.
An unauthenticated user initiates authentication by accessing an Internet website through a Web
browser. When receiving the HTTP request, the access device redirects it to the Web
authentication page provided by the portal Web server. The user can also visit the authentication
website to log in. The user must log in through the HP iNode client for extended portal functions.
2.
The user enters the authentication information on the authentication page/dialog box and submits
the information. The portal Web server forwards the information to the portal authentication server.
Then the portal authentication server processes the information and forwards it to the access
device.
3.
The access device interacts with the AAA server to implement authentication, authorization,
accounting for the user.
4.
If security policies are not imposed on the user, the access device allows the authenticated user to
access the Internet. If security policies are imposed on the user, the portal client, the access device,
and the security policy server interact to check the user host. If the user passes the security check,
the security policy server authorizes the user to access resources based on the check result. Portal
authentication through Web does not support security check for users. To implement security check,
the client must be the HP iNode client.
NOTE:
Portal authentication supports NAT traversal whether it is initiated by a Web client or an HP iNode client.
When the portal authentication client is on a private network, the portal authentication server is on a
public network, and the access device is enabled with NAT, network address translations performed on
the access device do not affect portal authentication. However, in such a case, HP recommends using an
interface's public IP address as the source address of outgoing portal packets.

Portal authentication modes

Portal authentication has three modes: direct authentication, re-DHCP authentication, and cross-subnet
authentication. In direct authentication and re-DHCP authentication, no Layer 3 forwarding devices exist
between the authentication client and the access device. In cross-subnet authentication, Layer 3
forwarding devices can exist between the authentication client and the access device.
Direct authentication
A user manually configures a public IP address or obtains a public IP address through DHCP. Before
authentication, the user can access only the portal Web server and predefined authentication-free
websites. After passing authentication, the user can access Internet resources. The process of direct
authentication is simpler than that of re-DHCP authentication.
Re-DHCP authentication
Before authentication, a user obtains a private IP address through DHCP and can access only the portal
Web server and predefined authentication-free websites. After passing authentication, the user is
assigned a public IP address and can access Internet resources. No public IP address is allocated to
those who fail authentication. Re-DHCP authentication saves public IP addresses. For example, an ISP
can allocate public IP addresses to broadband users only when they access networks beyond the
residential community network.
295

Advertisement

Table of Contents
loading

This manual is also suitable for:

Msr3000Msr4000

Table of Contents