The authentication page of a web server is also called a portal which provides convenient management functions for carriers through web authentication. Advertisements, community services, and personalized services can be provisioned on a portal, building an industry eco-system for bandwidth carriers, device vendors, and content and service providers.
Web authentication, also called portal authentication, is classified as proactive web authentication or mandatory web authentication.
Web authentication is classified as proactive web authentication or mandatory web authentication. The two authentication modes are the same except for how users access the authentication page. The detailed authentication process is as follows:
As shown in Figure 1, the user can access only the web authentication page in the web pre-authentication domain. If the user passes the authentication after entering the username and password on the page, the user is switched to the web authentication domain and can access network resources.
As shown in Figure 2, the user accesses other extranet resources through HTTP/HTTPS and is forcibly redirected to the web authentication page by the BRAS. The user can access only the web authentication page in the web pre-authentication domain. If the user passes the authentication after entering the username and password on the page, the user is switched to the web authentication domain and can access network resources.
Depending on the network layer where web authentication is performed, web authentication is classified as Layer 2 authentication or Layer 3 authentication.
Layer 2 authentication: Web authentication is enabled on the BRAS interface that connects to Layer 2 users. Only authenticated users are allowed access to external network resources.
Direct authentication: If a user obtains an IP address using DHCP or has an IP address configured before authentication, the user can use this IP address to access only the portal server and the specified addresses for free access. The user can access network resources after it is authenticated. This authentication process is simpler compared with IP address re-assignment-based authentication.
Inter-Layer 3 authentication: is implemented in basically the same way as direct authentication, except that the client and the BRAS can communicate through Layer 3 forwarding devices.
In both direct authentication and inter-Layer 3 authentication, an IP address uniquely identifies a user. The BRAS delivers ACLs based on users' IP addresses to control packet forwarding of authenticated users on interfaces. If direct authentication is used, users and the BRAS do not communicate through Layer 3 forwarding devices. Therefore, the BRAS interface connecting to users can learn the users' MAC addresses, which allows packet forwarding to be controlled based on a finer granularity.
When using the HTTPS redirection function, pay attention to the following points. Otherwise, the web authentication page may not be displayed:
In web authentication scenarios, before users are authenticated, the BRAS redirects the HTTPS request packets sent by clients to the web server. Clients are classified as browser clients and non-browser clients. If a large number of HTTPS request packets are sent by non-browser clients, HTTPS redirect will be triggered continuously. This exerts pressure on the web server and affects the prompting of the login web page, thereby affecting the normal HTTPS requests of browser clients.
To address this problem, enable the HTTPS JavaScript function to shield the HTTPS request packets sent by non-browser clients. When the HTTPS noise reduction function is enabled, the BRAS responds to the client with a 200 OK packet carrying a JavaScript script after receiving an HTTPS Get packet from the client.
The HTTPS chasten function suppresses flow establishment for HTTPS redirect. If a malicious user uses HTTPS redirect packets to attack the BRAS, the HTTPS hasten function can be used to suppress the packets sent by the user. This prevents the HTTPS redirect function of other users from being affected.
By default, the HTTPS chasten function is automatically enabled after the HTTPS redirect function is enabled. If a user sends the HTTPS redirect packets carrying a changed destination IP address to attack the BRAS, the HTTPS chasten function allows the BRAS to discard the extra HTTPS TCP SYN packets that the user is not able to process within a specified period when the BRAS receives TCP SYN packets for HTTPS flow establishment or the number of replied HTTPS redirect packets exceeds the specified threshold.