Segui

Web Proxy - Authentication (NTLM)

Version 2.5

Applies to Platform: UTM 2.4, UTM 2.5
Last Update: 28 April 2011

Note

If you are using an appliance equipped with the more recent 3.0 or 5.0 version, please refer to this article.

This lesson will illustrate the necessary steps to configure a more advanced web proxy with Microsoft Active Directory (NTLM) integration on a typical Endian appliance. Using this form of the web proxy, we can use already existing Active Directory groups and users to create filtering profiles for different levels of web access.

Note

The use of Active Directory (NTLM) based authentication is the only way to achieve a "Single Sign-On" solution where users do not have to re-authenticate to the browser. In other words, when a user logs into their machine they are also authenticated for the web proxy automatically.

Configuration Example

?name=media_1301348388051.png

The diagram above illustrates some of the basic steps involved with web proxy authentication (specificially Active Directory). In our specific example, we'll use two AD groups (admin and general users) to define differing levels of filtering with a more restrictive policy for general users.

Enable the Web Proxy

?name=media_1301348839683.png

The first step is to enable the web proxy by clicking the gray button (which will turn green when enabled). We'll set the operational mode for each network we want filtered to be "non-transparent".

Warning

When using the web proxy with authentication the only supported mode is non-transparent.

Configure the Log Settings

?name=media_1301421748373.png

Since we want to have all web access (allowed and blocked) logged for review purposes, we're going to enable the appropriate logging options.

Click Save and then Apply the changes to proceed.

Configure the Content Filter Profile #1 (General Users)

?name=media_1300829711111.png

The first profile we'll build will be for our general users group which will be more restrictive in terms of web access. In this example, we're only going to configure web filtering by URL Blacklist (only) for ease and administration purposes. The first thing we'll do is ensure our HTTP antivirus is enabled by checking the appropriate box. You can select the whole category to block by clicking the green arrow or, alternatively, you can drop down the subcategories and select those individually in order to block some and not others. You can also attach custom white- or blacklists to this profile as well.

Click Update Profile and then Apply the changes to proceed.

Configure the Content Filter Profile #2 (Admin Users)

?name=media_1301349257298.png

The next profile is for the admin group and will be less restrictive for web access. Again we're only using the URL blacklist for simplicity but you can use the other forms of filtering as well.

Note

When you enable web filtering by phrases (Content Filtering) this will block those categories of phrases for content "inside the page" which will result in a more aggressive blocking strategy with potentially a higher false positive rate.

Configure Proxy Authentication

?name=media_1301349324869.png

The next step is to configure the authentication piece of the web proxy which requires joining the Endian appliance to your Active Directory server. The key pieces of information are the (1) Authentication Realm which is just the domain, (2) the Domain name, (3) the PDC hostname of the AD server and (4) the PDC IP address. The BDC information is not required so you can leave this section blank.

Click Save and then Apply the changes to proceed.

Note

The network authentication protocol used in Active Directory (Kerberos) has strict time requirements, which means the clocks of the involved hosts must be synchronized. Best practice is to indicate the PDC and BDC hosts as NTP servers for Endian.

Join the Endian to the AD Server

?name=media_1301349650298.png

Now we can join the domain by providing a Domain Administrative user name and password (one with permissions to perform domain joins).

Once that's done, click Join ADS and you should see a successful message (illustrated above).

Configure the Access Policy (General Users)

?name=media_1301413479678.png

The last step is to create an access policy which will map the content filtering profile based on a specific network configuration. In the example above, we're creating a policy for the Green zone (entire network) for any user in the "general users" group that uses the content filtering profile #1 (default).

Click Create Policy.

Configure the Access Policy (Admin Users)

?name=media_1301350202576.png

Now we'll configure a separate access policy to map any Green network user belonging to the "domain admin" group to use the content filtering profile #2 (admin).

Click Create Policy and then Apply the changes.

Setup Client-Side Configuration

?name=media_1301412212619.png

The easiest solution is to use the Endian web proxy with authentication in a semi-transparent fashion is to have the Endian also handle DHCP for those networks you wish to provide the web proxy. Using this method, all of the necessary DHCP parameters are automatically configured and handed out to Endian client workstations so they detect and use the proxy automatically assuming the above configuration for Internet Explorer is set. This setting "Automatically detect settings" must be enabled (which it is by default) in order for the IE browser to automatically find the proxy without any further manual configuraiton (PAC file).

The IE browser setting can generally be found under Tools > Internet Options > Connections tab > LAN Settings

Test the Web Proxy

?name=media_1300831781271.png

You can test your configuration now by browsing the Internet from the Green network and testing different user logins (admin and general user) to verify the appropriate content filtering profiles are being applied.

Verify Logging

?name=media_1301413718424.png

You should also be able to view all the web traffic in real-time by going to Logs > Live Log Viewer and select the "Web Proxy" log to view. You'll notice in both the live log viewer and regular proxy logs (pictured above) that you can identify the username for individual traffic which can help you in monitoring users web behavior.

Altre domande? Invia una richiesta

Commenti