Step 1: Open a web browser and type the IP address of the firewall into the address bar (default is
192.168.1.1). Press
Enter.
Step 2: The default username and password is
admin (all lower case). Click
OK.
Step 3: Click on
System and select
Remote Management. Click on
Modify Advanced Settings to edit/change remote management ports.
Step 4: Under the
Management Web GUI Port, change the default HTTP/80 and HTTPS/443 port (example 800 and 4433). Click
OK.
Step 5: Click on
User Authentication, select
Local User Databases, click on
Add and select
LocalUserDatabase.
Step 6: Enter a name the new
LocalDataBase folder (
lannet_authen_users in this example) and click
OK.
Step 7: Click on
Add and select
User and configure as followed:
-
Name: name as desired
-
Password: enter password for the user
-
Confirm password: re-enter password
-
Groups: enter the group name this user belongs to (users in this example)
Click
OK.
Step 8: Click on
Objects, select
Address Book, and then select
InterfaceAddresses. Click on
Add and select
IP address to add a new
IP address and configure as followed:
-
Name: name as desired (user_authen in this example)
-
IP address: enter desired IP address or range of IP addresses. For multiple IP addresses separate each IP by commas, using no spaces in between (whole local network in this example)
Step 9: Select the
User Authentication tab and enter the group name (should be the same group name as created in Step 7) in the box under
Comma-separated list of user names and groups. Click
OK.
Note: Authentication of users from an IP address object can be enabled on IP address or IP4 group by attaching user names or user groups to the object. Once the firewall checks the traffic flow from an address object and finds the user name defined on it, it will prompt the user with an authentication request according to the User Authentication Rules.Step 10: Select
User Authentication Rule, click on
Add, select
UserAuthRule.
Step 11: Configure the
user authentication rule as followed:
-
Name: enter a name as desired
-
Agent: HTTP
-
Authentication Source: Local
-
Interface: lan
-
Originator IP: lannet
Step 12: Select the
User Authentication tab. In the
Local User DB click on the dropdown menu and select
lannet_authen_users (the user folder created in Step 6). Click
OK.
Step 13: Click on
Rules, select
IP Rules, click
Add, and then select
IP Rule Folder.
Step 14: Name the
IP rule folder as desired. Click
OK.
Step 15: Click on
Add to add a new IP Rule and configure as followed:
-
Name: name as desired
-
Action: Allow
-
Service: http
-
Schedule: None
-
Source Interface: lan
-
Source Network: lannet
-
Destination Interface: core
-
Destination Network: lan_ip
Click on
OK.
Step 16: Click on
Add to add another IP Rule and configure as followed:
-
Name: name as desired
-
Action: NAT
-
Service: dns-all
-
Schedule: None
-
Source Interface: lan
-
Source Network: lannet
-
Destination Interface: any
-
Destination Network: all-nets
Click
OK.
Step 17: Click on
Add to add another IP Rule and configure as followed:
-
Name: name as desired
-
Action: NAT
-
Service: all_services
-
Schedule: None
-
Source Interface: lan
-
Source Network: select the Object created in step 8
-
Destination Interface: any
-
Destination Network: all-nets
Click
OK.
Step 18: Click on
Add to add another IP Rule and configure as followed:
-
Name: name as desired
-
Action: SAT
-
Service: http
-
Schedule: None
-
Source Interface: lan
-
Source Network: lannet
-
Destination Interface: any
-
Destination Network: all-nets
Click
OK.
Step 19: Click on the
SAT tab and configure as followed:
-
New IP Address: select lan_ip from the dropdown
-
Check the box labeled “ All-to-One Mapping: rewrite all destination IPs to a single IP”
Click
OK.
Step 20: Click on
Add to add another IP Rule and configure as followed:
-
Name: name as desired
-
Action: Allow
-
Service: http
-
Schedule: None
-
Source Interface: lan
-
Source Network: lannet
-
Destination Interface: any
-
Destination Network: all-nets
Click
OK.
Step 21: Click on the
Configuration dropdown menu and select
Save and Activate. Click
OK to activate and save the changes.
