PrepAway - Latest Free Exam Questions & Answers

Which type of user authentication is configured?

A user wants to establish an HTTP session to a server behind an SRX device but is being pointed to Web page on the SRX device for additional authentication.Which type of user authentication is configured?

PrepAway - Latest Free Exam Questions & Answers

A.
pass-through with Web redirect

B.
WebAuth with HTTP redirect

C.
WebAuth

D.
pass-through

11 Comments on “Which type of user authentication is configured?

  1. Aintechco says:

    Ans: D

    Pass-Through Authentication
    Two types of firewall user authentication are available—pass-through or Web authentication. Pass-through
    authentication must first be triggered by Telnet, FTP, and Hypertext Transfer Protocol (HTTP) traffic. In this type of
    firewall authentication, the user initiates a session to a remote network device or resource. If traffic matches the
    security policy configured for pass-through authentication, the SRX Series Services Gateway intercepts the session.
    The user receives a prompt for a username and password. If the authentication is successful, subsequent traffic
    from the same source IP address is automatically allowed to pass through the device, provided it matches the
    applied security policy.




    0



    0
  2. Apollo says:

    So what is right?
    + policy auth {
    + then {
    + permit {
    + firewall-authentication {
    + pass-through {
    + access-profile prof1;
    + web-redirect;
    + }
    + }
    + }
    + }
    Is it then A?




    0



    0
  3. w3pgrrrrr says:

    THE CORRECT ANSWER IS “D” passthrough
    +1 Aintechno

    What he has published is directly from the jncis-sec study guide
    The SRX only allows PASS-THROUGH or WEB-AUTH

    In other words, there are no “http redirect” or “web redirect” supported.

    Pass through must first be triggered by telnet, ftp, http. The SRX intercepts the login, grabs it from you, and authenticates to the server. If the server you’re trying to access says “OK” to your password, SRX let’s traffic flow

    Web auth is different. With web auth you first have to login to the srx “http://yourCorpSrx.com” and authenticate
    Once you’ve authenticated, you can access whatever service/site you need (and you will still have to authenticate again to THOSE services)

    Make sense?




    0



    0
    1. w3pgrrrrr says:

      Just want to make sure I am 100% clear here

      Pass through, SRX is intercepting login request from remote server
      Web Auth, SRX requires you to login into it FIRST… THEN you can access other sites/ftps/etc




      0



      0
  4. w3pgrrrrr says:

    whoa.. wish I could edit my replies =)

    “Directly accessing the device through a browser before gaining access to a remote resource is burdensome. To alleviate this burden, the Junos OS allows Web redirection. The graphic illustrates the configuration of Web
    redirection. With Web redirection enabled, the device responds to the user device with an HTTP redirect message, which tells the user device to use HTTP to access the Junos security platform at a particular address. The Junos OS
    uses the address of the interface on which the initial user request was received. You must enable Web authentication for this interface and for the system itself, just as you would for standard Web authentication.”

    then{
    permit{
    firewall-authentication{




    0



    0
  5. w3pgrrrrr says:

    Dear lord this question is confusing
    whoa.. wish I could edit my replies =)

    Let’s start with the easiest answer to eliminate, “C. WebAuth”
    From JNCIS-SEC study guide,
    “Web authentication is valid for all types of traffic. With Web authentication configured, users must first directly
    access the Junos security platform using HTTP. The user enters the address or hostname of the device into a Web
    browser and then receives a prompt for a username and password”

    So we can safely say this isn’t happening. The user trying to go to http://www.site.com not http://MyCorpSrx.com

    —————–
    Now let’s take a look at the second easiest to eliminate “D. pass-through”
    from the JNCIS-SEC study guide,
    “If traffic matches the security policy configured for pass-through authentication, the SRX Series Services Gateway intercepts the session.
    The user receives a prompt for a username and password.”
    What does the user receive? Not a webpage, the user receives A PROMPT.
    So this is an incorrect answer.

    ——————-
    Now let’s take a look at our final two answers
    “A. pass-through with Web redirect”
    and
    “B. WebAuth with HTTP redirect”

    This is very simple deduction.
    From the study guide, “With Web authentication configured, users must first directly access the Junos security platform using HTTP.”

    So that is to say that there is never a case when WebAuth can be configured with HTTP redirect. It is impossible! If you have enabled WebAuth on the SRX it is going to intercept requests for ANY TYPE OF TRAFFIC and ask for authentication first.

    So the answer must be “A”.
    Please see the below output from my SRX device to further prove that “A” is the correct answer. I apologize for my hasty answer above. I am not 100% sure the answer is correctly “A”

    Please post back if you have any questions and I will answer them.

    {primary:node1}[edit security policies from-zone trust to-zone untrust policy authTest]
    root@moneypenny02# show
    match {
    source-address any;
    destination-address any;
    application any;
    }
    then {
    permit;
    }

    Now my options for PASS THROUGH firewall-authentication(you can clearly see web-redirect)
    {primary:node0}[edit security policies from-zone trust to-zone untrust policy authTest then]
    root@moneypenny02# set permit firewall-authentication pass-through ?
    Possible completions:
    Execute this command
    access-profile Specify access profile name
    + apply-groups Groups from which to inherit configuration data
    + apply-groups-except Don’t inherit configuration data from these groups
    client-match Name of user or group to match
    web-redirect Redirect unauthenticated HTTP requests to the device’s internal web server

    Now my options for WEB-AUTHENTICATION (clearly no option for web-redirect)
    {primary:node1}[edit security policies from-zone trust to-zone untrust policy authTest then]
    root@moneypenny02# set permit firewall-authentication web-authentication ?
    Possible completions:
    Execute this command
    + apply-groups Groups from which to inherit configuration data
    + apply-groups-except Don’t inherit configuration data from these groups
    client-match Name of user or group to match

    WOW! WHAT A TEST QUESTION!!!!




    0



    0
  6. w3pgrrrrr says:

    dear admin can you delete my first 3 posts and leave the final long one?
    It is the best explanation

    Also if possible pl”ease chance,
    “I am not 100% sure the answer is correctly “A””
    it is supposed to read
    “I am NOW 100% sure the answer is correctly “A”




    0



    0
  7. w3pgrrrrr says:

    and maybe for the pursuit of knowledge you can include this juniper explanation,

    “In pass-through authentication, the user attempts to access the remote network resource directly, and the Junos security
    platform intercepts the session to perform firewall authentication, while buffering the session. The buffered session is released
    as long as authentication is successful. In Web authentication, the user must first access an IP address belonging to the Junos
    security device using a Web browser; the authentication is performed using this HTTP session. The user can then proceed to
    access the remote network resource as long as authentication is successful. FTP, Telnet, and HTTP traffic trigger pass-through
    authentication, while an HTTP session must trigger Web authentication.”




    0



    0

Leave a Reply