CyberoamCyberoam
Certified Network
& Security
Professional
(CCNSP)
Certified
Network
& Security
Profess
Module 4
User Authentication
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Authentication > Agenda
Introduction
Types of Authentication
Levels of Authentication
Authentication Methods
Identity Based Policies
Group Management
User Management
Identity Based Firewall Rule
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Authentication
Cyberoams Layer 8 identifies all traffic by Username in
place of IP Address/MAC address.
It becomes essential for a user to authenticate through the firewall
Cyberoam functions using AAA principles. It not only
authenticates but also authorizes and keeps the account
of user activity.
To Authenticate, there are two types of users and hence two
types of flows
Local
External
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Authentication > Agenda
Introduction
Types of Authentication
Levels of Authentication
Authentication Methods
Identity Based Policies
Group Management
User Management
Identity Based Firewall Rule
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Local Authentication
User Authentication/
Authorization request
2
User Authentication/
Authorization result
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
External Authentication
User Authentication/
Authorization request
Authentication
request forwarded
2
AD
training.cyberoam.com
User Authentication
response
User Authentication
result
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
External Authentication
Cyberoam can be integrated to authenticate with external
servers like
Active Directory
LDAP / LDAPS
Open LDAP
Novell eDirectory
Apple Directory
Any standard LDAP Directory
RADIUS Server
Third Party integration with Cyberoams API
SSL and STARTTLS are supported for Active Directory and LDAP
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Configuration of Authentication Servers
Local & External authentication servers can be configured at
same time
Multiple type of external authentication servers also can be
configured at same time
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Active Directory Integration
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Active Directory Integration
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Active Directory Integration
Upon Users First Successful login
A user will be created on Cyberoams local database
If loose integration is selected while adding AD server, user falls into Default
Open Group
If tight integration is selected while adding AD Sever, user falls into their
respective group on Cyberoam (if the groups are already created or present)
Importing Groups
You can use the import group wizard. In this method, Cyberoam will
automatically create groups by Syncing with AD Server.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Active Directory Integration > Import Groups
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Authentication > Agenda
Introduction
Types of Authentication
Levels of Authentication
Authentication Methods
Identity Based Policies
Group Management
User Management
Identity Based Firewall Rule
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Level of Authentication
Authentication is done at three levels in Cyberoam
Firewall
VPN
Admin
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Level of Authentication > Authentication in Firewall
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Level of Authentication > Authentication in VPN
Only Secure Two Factor Authentication is the most preferred
method at this level
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Level of Authentication > Admin Authentication
Active Directory or Secure Two Factor Authentication are the
most preferred methods at this level
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Authentication > Agenda
Introduction
Types of Authentication
Levels of Authentication
Authentication Methods
Identity Based Policies
Group Management
User Management
Identity Based Firewall Rule
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Authentication Methods
Cyberoam can authenticate a user with four methods
Client Based
Client Less
SSO (Single Sign-On)
SMS (Text Based) (Guest Users)
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Client based
Client based authentication mechanism is applied when a
user is using a stand-alone computer or a mobile device.
Captive portal
Prompts with web page to input user credentials
Customizable Portal View
Can be secured using HTTPS
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Client based
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Captive Portal > Captive Portal Settings
Note: Cyberoam will try sending Keep Alive packet to the live user 3 times at
an interval of 3 minutes.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Client based > Client Software
Corporate Client is the only authentication method that will work, when USER/MAC
Binding is enabled (works for IPv4 only)
Can be downloaded from www.cyberoam.com/cyberoamclients.html
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Client based > Client Software
General Authentication Client for Android is used to authenticate mobile users
Available on Play Store
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Client based > Client Software
iAccess Client for iOS devices is used to authenticate mobile users
Available on App Store
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Client based > Client Software
On successful login, a username appears on the live users
list.
Identity -> Live Users
IPv6
Users
IPv4
Users
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Clientless User
Static mapping of user with fixed IP address
Clientless user does not require user to authenticate with
Cyberoam
Useful for:
Servers to access Internet like Windows Patch Update Server
Print Servers (IP Printers)
VOIP Phones
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Clientless User > Adding a clientless user
To add a clientless user navigate to Identity -> Users ->
Clientless Users -> Add
To check if the user is listed, go to Identity -> Users
-> Clientless Users and click on the username
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Single Sign-On
Cyberoam can be integrated with Active Directory or Novell
eDirectory to provide Single Sign-On (SSO) for transparent
user authentication.
With SSO, users only need to sign in once to access network
Domain credentials can be used to authenticate user for any
traffic type without providing username/password to
Cyberoam.
Benefits
Ease of use
Transparency to users
Improves user experience
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Single Sign-On (Continued)
Cyberoam provides SSO through
CTAS (Cyberoam Transparent Authentication Suite)
For Active Directory & Novell eDirectory
NTLM (NT LAN Manager)
For Active Directory
CATC (Cyberoam Authentication for Terminal Clients)
For Microsoft & Citrix Terminal Services
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS
Cyberoam Transparent Authentication Suite (CTAS) is
software component to be installed on Active Directory server
for SSO.
It eliminates the installation of SSO clients on each
workstation and delivers a high level of protection.
As of now, CTAS works on IPv4
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > Login Flow
Successful logon
Event ID 672 (win 2003),
4768 (win 2008/2012)
Security
Audit Log
AD
CTAS
Software
CTAS sends Audit Log information to Cyberoam on Port 6060
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > Deployment Scenarios
CTAS Suite
Primary
Domain
Controller
(AD)
Agent
Event Log
Successful Login
training.cyberoam.com
Collector
Port
5566
CTAS
Port
5566
Agent
Backup
Domain
Controller
(AD)
Event Log
Successful Login
Port
6060
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > Login Flow for Non-Domain Computer
WMI
ping
Remote Registry
Result :
Successful
CTAS Suite
Primary
AD
Agent
CTAS
Collector
Port
5566
Agent
Event ID
Event ID
Port
5566
training.cyberoam.com
Secondary
AD
Port
6677
Port
6060
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > Components
CTAS suite consists of two components
Agent
Traps user authentication events using Microsoft Event logs, sends such
events to collector
This component is needed in case of Event Logs Login Method
Collector
Processes events received from Agent(s) and stores in its database for
tracking
Authenticate user in Cyberoam
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > Configuration
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > User Log off Detection
EventLog & NETAPI are Microsofts utilities that help in
detecting accurate successful domain user login.
However, there is no built in utility that detects user log-off
and hence Cyberoam provides two different methods for Logoff detection.
When enabled, Cyberoam Collector by default checks user
log off at 10 minutes of interval.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > User Log off Detection
User: Michael
IP: 10.120.16.36
User: Robert
IP: 10.120.16.31
CTAS Suite
Primary
AD
Agent
Event ID
training.cyberoam.com
Collector
CTAS
User: Ricky
IP: 10.120.16.45
Secondary
AD
Agent
Event ID
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > User Log off Detection
Logout Method
Ping /Workstation Polling (WMI /Remote Registry)
Logout Interval
605 seconds (Default)
User: Michael
IP: 10.120.16.36
User: Robert
IP: 10.120.16.31
CTAS Suite
Primary
AD
Agent
Event ID
training.cyberoam.com
Collector
CTAS
User: Ricky
IP: 10.120.16.45
Secondary
AD
Agent
Event ID
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > User Log off Detection
AFTER 15 MINUTES
User: Michael
IP: 10.120.16.36
User: Robert
IP: 10.120.16.31
CTAS Suite
Primary
AD
Agent
Event ID
training.cyberoam.com
Collector
CTAS
Secondary
AD
Agent
User: Ricky
IP: 10.120.16.45
DISCONNECTED
Event ID
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > User Log off Detection
Logout Poll
User: Michael
IP: 10.120.16.36
User: Robert
IP: 10.120.16.31
CTAS Suite
Primary
AD
Agent
Collector
Event ID
CTAS
Secondary
AD
Agent
User: Ricky
IP: 10.120.16.45
DISCONNECTED
Event ID
Logout Ricky
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS > User Log off Detection
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS Fault tolerance
Collector being an essential component in Transparent
authentication mechanism, it is required that Collector
failover be configured also known as "CTAS Fault Tolerance".
Cyberoam allows building up group of Backup collectors for
fault tolerance.
One of these collectors will act as primary, while remaining
are backup collectors.
Cyberoam allows adding up to 5 collectors in a single group.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS Troubleshooting
From CTAS, you can
Check Online users
See Log file
Increase log file size
Perform WMI Query test
Troubleshoot
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CTAS Troubleshooting
CTAS Live users page
Logon Type value 1 stands for Workstation Polling
Logon Type value 2 stands for Authentication from AD
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
NTLM
Browser initiated Single Sign-On Authentication
It is a challenge-response authentication protocol to
authenticate the user while accessing internet or an
application.
Pre-requisites
Cyberoam must be integrated with Active Directory
In order to run NTLM, following requirements must be met:
Server: Windows 2003 or Windows 2008.
Protocol: NTLMv1 or NTLMv2.
Browser: Google Chrome, Firefox & Internet Explorer
As of now, NTLM works on IPv4
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
NTLM Authentication Methodologies
There are two methodologies for NTLM:
Agent Based
Software dependent agent based solution
Software needs to be installed on Domain Controller(s)
Agent Less
Hassel free software independent solution
No software component is needed
Cyberoam NTLM implementation is based on Agent Less
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
NTLM Process Flow
NTLM process flow consists of 6 steps as below:
Client -> Server GET
Server -> Client 401 Unauthorized WWW-Authenticate: NTLM
Client -> Server GET ... Authorization: NTLM <base64-encoded type-1message>
Server -> Client 401 Unauthorized WWW-Authenticate: NTLM <base64encoded type-2-message>
Client -> Server GET ... Authorization: NTLM <base64-encoded type-3message>
Server -> Client 200 Ok
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Enable NTLM
Cyberoam must be integrated with Active Directory to Enable
NTLM
Go to System -> Administration -> Appliance Access. Under
Authentication Services, enable access of NTLM for the
required zones. Here, we have enabled NTLM for LAN zone.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Authentication Failover Approach
Authentication precedence
Clientless Users
Clientless Single Sign-On
Corporate Client
NTLM
Captive Portal
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CATC (Thin Client Authentication)
What is Thin Client
A server that provides ability to host multiple, simultaneous client sessions is
termed as Terminal Servers. Such server is capable of hosting multi-user
desktops.
User uses remote access software, allowing client computer to serve as
terminal emulator. Users shall connect to Terminal Server and access the
resource or internet from virtual user desktop.
CATC works on IPv4
Challenge:
Firewall will see only terminal server IP as a source whenever thin client user
try to access Internet
Difficult to differentiate the user traffic
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CATC (Thin Client Authentication)
Intern
et
Cannot identify
user surfing the
Internet
DMZ
Request for
google.com
XenServ
er
Firewall
Router
192.168.1.1
10.1.1.2
192.168.1
Thin Client
.1
training.cyberoam.com
10.1.1.3
192.168.1
.1
10.1.1.4
192.168.1
.1
Cannot define Rules based on
All
Thin Client Users
combination of IP address
have
same
IP address
Source
IP: 192.168.1.1
as Destination
of XenServer
IP: Google.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Same IP address, Users differentiated by Session-Id
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CATC (Thin Client Authentication)
Cyberoam Authentication for Thin Client (CATC)
Supported on Windows 2003, Windows 2008, Presentation Server and Citrix
XenApp.
In order to run CATC, following requirements must be met:
UDP port 6060 must be open on Terminal Server for outbound, to serve login
information to Cyberoam.
Native Firewall, Anti-Virus or User Account Control (UAC) might intervene
CTAS process and are subject to be disabled or removed in some cases.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CATC Pre-requisites
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CATC > Process Flow
Login
User login on Terminal Server using remote access software.
User opens up a browser to access internet.
CATC will send UDP packet on port 6060 to Cyberoam which consists of
Login Code, Session ID, Source Port, Destination Port, Destination IP, and
Username.
Cyberoam will check the packet sent by the Agent and does reverse lookup
into its Live Users. If user doesnt exist, new user will be added.
Once the user is authenticated, the user traffic is allowed or denied based on
the access control defined for that user.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
CATC > Process Flow
Logout
Terminal Server as well maintains the database of the users currently
connected to it. This database is dynamically updated when the user logs off.
Agent installed on the Terminal Server shall refer to the database continuously
and notify Cyberoam device instantly on user log off.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
SMS or Text based Authentication (Guest User)
It is very tedious for an admin to create users and provide
credentials to user in public places like hotspot/hotels for few
days/hours.
This method provides a portal to guest users using which
they can self create Internet access tokens through
Cyberoam Appliances via. Password received on their SMS
enabled communication device.
Cyberoam facilitates to be integrated with SMS gateways.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
SMS > Step 1: Integrate with SMS Gateway
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
SMS > Step 2: Enable SMS Gateway
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
SMS > Step 2: Enable SMS Gateway
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Authentication > Agenda
Introduction
Types of Authentication
Levels of Authentication
Authentication Methods
Identity Based Policies
Group Management
User Management
Identity Based Firewall Rule
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Identity based Policies > Access time policy
It defines the time period during which users can be
allowed/denied the network access. Like for example, only
office hours access.
It enables to set time interval days and time for network
access with the help of a Schedule.
Identity ->Policy -> Access Time
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Identity based Policies > Surfing Quota Policy
It defines the duration of network surfing time.
It is the allowed time in hours for a group or an individual user
to access Internet.
Identity ->Policy -> Surfing Quota
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Identity based Policies > Data Transfer Policy
This policy is used to restrict the users to upload and
download
Data transfer restriction can be based on:
Total Data transfer (Upload + Download)
Individual Upload and/or Download
To create data transfer policy, go to Identity -> Policy -> Data
Transfer
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Identity based Policies > Creating a Data Transfer Policy
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Authentication > Agenda
Introduction
Types of Authentication
Levels of Authentication
Authentication Methods
Identity Based Policies
Group Management
User Management
Identity Based Firewall Rule
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Group Management
A Group is a collection of users having common policies
Instead of attaching individual policies to the user, create
group of policies and simply assign the appropriate
A group can contain default as well as custom policies.
Various policies that can be grouped are:
Surfing Quota
Access Time policy
Web Filter policy
Application Filter Policy
Bandwidth policy
Data Transfer
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Group Types
Normal
A user of this group need to logon to Cyberoam using the Captive Portal or
Authentication Client to access the network
Clientless
A user of this group is not needed to login to Cyberoam using any Client to
access the network.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Adding a new group
To add or edit user group details, go to Identity Groups
Group.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Managing groups
To manage groups go to Identity->Groups
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Adding clientless groups
To add clientless groups go to Identity ->Groups ->Add
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Authentication > Agenda
Introduction
Types of Authentication
Levels of Authentication
Authentication Methods
Identity Based Policies
Group Management
User Management
Identity Based Firewall Rule
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Management
Users can be identified by an IP/MAC address or a user
name and assigned to a user group.
All the users in a group inherit the policies defined for that
group.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Types
Cyberoam supports three types of users
Normal
Clientless
Single Sign-On
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Adding Normal User
To create the users, Identity -> Users -> User ->Add
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Adding Clientless Users
To create the clientless users, Identity ->User ->Clientless
User
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Adding Single Sign-On Users
Cyberoam will automatically create Single Sign-On user on
first successful authentication
Such users cannot be created manually
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Manage Users
Navigate to Identity -> User
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Manage Clientless Users
Select Identity -> User -> Clientless Users to view list of
Users and click User name to be modified.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User/MAC address binding
This is not applicable to Clientless Users
Navigate to Identity -> Users -> User
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Users My Account
User My Account gives details like quarantine, change
password, email, and Internet usage of a particular user.
User can change his/her password using this tab.
Users can view their My Account details from GUI.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Change Password & Account Status
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
User Authentication > Agenda
Introduction
Types of Authentication
Levels of Authentication
Authentication Methods
Identity Based Policies
Group Management
User Management
Identity Based Firewall Rule
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Identity based firewall rule
In the rule matching criteria a normal UTM does everything
from matching source and destination addresses, to ports.
But, next generation UTM like Cyberoam adds Identity to the
firewalling solution.
When Cyberoam receives the request, it checks for the
source address, destination address and the services and
tries to match with the firewall rule.
If Identity (User) found in the Live User Connections and all
other matching criteria fulfils then action specified in the rule
will be applied.
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Create Identity based Firewall rule (Cyberoam V/S Normal Firewall)
Normal
Firewall
Cyberoam
- Identity Based UTM
Rule matching criteria
- Source address
- Destination address
- Service (port)
- Schedule
- Identity (For IPv4/IPv6)
Action
- Accept
- NAT
- Drop
- Reject
However,
fails inControls
DHCP, Wi-Fi
Unified Threat
(per environment
Rule Matching Criteria)
- IPS Policy
- Web Filter & Application Filter Policy
- QoS Policy
- Anti Virus & Anti Spam
- Routing decisions
On IPv6 Cyberoam Supports, QoS and Routing Decisions
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Create Identity based IPv4 Firewall rule (Cont.)
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Create Identity based IPv6 Firewall rule (Cont.)
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Labs
Lab #12 Enforce Authentication
Action change in default firewall rule
New Firewall Rule in case users are using ISP provided DNS
Lab #13 Authenticating a user through Captive
Portal/Cyberoam Corporate Client
Authenticating with Corporate Client
Lab #14 Change default Captive Portal Settings
Lab #15 Integration with Active Directory (Optional)
Configuring AD authentication
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ
Cyberoam Certified Network & Security Professional (CCNSP)
Next -> Module 5 (Web Filter)
training.cyberoam.com
Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Righ