156-215.77 Free Dumps Study Materials
Question 6: Study the Rule base and Client Authentication Action properties screen -
After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web
site, the user tries to FTP to another site using the command line. What happens to the user?
A. user is prompted for authentication by the Security Gateway again.
B. FTP data connection is dropped after the user is authenticated successfully.
C. user is prompted to authenticate from that FTP site only, and does not need to enter his username
and password for Client Authentication.
D. FTP connection is dropped by Rule 2.
Correct Answer: C
Explanation:
Manual Users must use either telnet to port 259 on the firewall, or use a Web browser to connect to
port 900 on the firewall to authenticate before being granted access.
# Partially Automatic If user authentication is configured for the service the user is attempting to
access and they pass this authentication, then no further client authentication is required. For
example, if HTTP is permitted on a client authentication rule, the user will be able to transparently
authenticate since FireWall-1 has a security server for HTTP.Then, if this setting is chosen, users will
not have to manually authenticate for this connection. Note that this applies to all services for which
FireWall-1 has built-in security servers (HTTP, FTP, telnet, and rlogin).
# Fully Automatic If the client has the session authentication agent
installed, then no further client authentication is required (see session authentication below). For
HTTP, FTP, telnet, or rlogin, the firewall will authenticate via user authentication, and then session
authentication will be used to authenticate all other services.
http://www.syngress.com
Figure 6.19 Client Authentication Action Properties
278 Chapter 6 * Authenticating Users
# Agent Automatic Sign On Uses session authentication agent to provide
transparent authentication (see session authentication below).
# Single Sign-On System Used in conjunction with UserAuthority
servers to provide enhanced application level security. Discussion of
UserAuthority is beyond the scope of this book.