How do I configure local user authentication on my DFL Series Firewall?

Step 1: Open a web browser and type the IP address of the firewall into the address bar (default is 192.168.1.1). Press Enter.

Step 2: The default username and password is admin (all lower case). Click OK.

Step 3: Click on System and select Remote Management. Click on Modify Advanced Settings to edit/change remote management ports.



Step 4: Under the Management Web GUI Port, change the default HTTP/80 and HTTPS/443 port (example 800 and 4433). Click OK.



Step 5: Click on User Authentication, select Local User Databases, click on Add and select LocalUserDatabase.



Step 6: Enter a name the new LocalDataBase folder (lannet_authen_users in this example) and click OK.



Step 7: Click on Add and select User and configure as followed:
  • Name: name as desired
  • Password: enter password for the user
  • Confirm password: re-enter password
  • Groups: enter the group name this user belongs to (users in this example)
Click OK.



Step 8: Click on Objects, select Address Book, and then select InterfaceAddresses. Click on Add and select IP address to add a new IP address and configure as followed:
  • Name: name as desired (user_authen in this example)
  • IP address: enter desired IP address or range of IP addresses. For multiple IP addresses separate each IP by commas, using no spaces in between (whole local network in this example)


Step 9: Select the User Authentication tab and enter the group name (should be the same group name as created in Step 7) in the box under Comma-separated list of user names and groups. Click OK.



Note: Authentication of users from an IP address object can be enabled on IP address or IP4 group by attaching user names or user groups to the object. Once the firewall checks the traffic flow from an address object and finds the user name defined on it, it will prompt the user with an authentication request according to the User Authentication Rules.

Step 10: Select User Authentication Rule, click on Add, select UserAuthRule.



Step 11: Configure the user authentication rule as followed:
  • Name: enter a name as desired
  • Agent: HTTP
  • Authentication Source: Local
  • Interface: lan
  • Originator IP: lannet


Step 12: Select the User Authentication tab. In the Local User DB click on the dropdown menu and select lannet_authen_users (the user folder created in Step 6). Click OK.



Step 13: Click on Rules, select IP Rules, click Add, and then select IP Rule Folder.



Step 14: Name the IP rule folder as desired. Click OK.



Step 15: Click on Add to add a new IP Rule and configure as followed:
  • Name: name as desired
  • Action: Allow
  • Service: http
  • Schedule: None
  • Source Interface: lan
  • Source Network: lannet
  • Destination Interface: core
  • Destination Network: lan_ip
Click on OK.



Step 16: Click on Add to add another IP Rule and configure as followed:
  • Name: name as desired
  • Action: NAT
  • Service: dns-all
  • Schedule: None
  • Source Interface: lan
  • Source Network: lannet
  • Destination Interface: any
  • Destination Network: all-nets
Click OK.



Step 17: Click on Add to add another IP Rule and configure as followed:
  • Name: name as desired
  • Action: NAT
  • Service: all_services
  • Schedule: None
  • Source Interface: lan
  • Source Network: select the Object created in step 8
  • Destination Interface: any
  • Destination Network: all-nets
Click OK.



Step 18: Click on Add to add another IP Rule and configure as followed:
  • Name: name as desired
  • Action: SAT
  • Service: http
  • Schedule: None
  • Source Interface: lan
  • Source Network: lannet
  • Destination Interface: any
  • Destination Network: all-nets
Click OK.



Step 19: Click on the SAT tab and configure as followed:
  • New IP Address: select lan_ip from the dropdown
  • Check the box labeled “ All-to-One Mapping: rewrite all destination IPs to a single IP”
Click OK.



Step 20: Click on Add to add another IP Rule and configure as followed:
  • Name: name as desired
  • Action: Allow
  • Service: http
  • Schedule: None
  • Source Interface: lan
  • Source Network: lannet
  • Destination Interface: any
  • Destination Network: all-nets
Click OK.



Step 21: Click on the Configuration dropdown menu and select Save and Activate. Click OK to activate and save the changes.

Did you find this useful?