EasyManua.ls Logo

ZyXEL Communications USG-100@USG-200 - V2.20 ED 2 - Chapter 23 Authentication Policy; Overview; What You Can Do in this Chapter

ZyXEL Communications USG-100@USG-200 - V2.20 ED 2
1157 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ZyWALL USG 100/200 Series User’s Guide
453
CHAPTER 23
Authentication Policy
23.1 Overview
Use authentication policies to control who can access the network. You can
authenticate users (require them to log in) and even perform Endpoint Security
(EPS) checking to make sure users’ computers comply with defined corporate
policies before they can access the network. After a users passes authentication
the user’s computer must meet the endpoint security object’s Operating System
(OS) option and security requirements to gain access. See Chapter 49 on page
819 for how to configure endpoint security objects to use with authentication
policies.
In the following figure the ZyWALL’s authentication policy requires endpoint
security checking on local user A. A passes authentication and the endpoint
security check and is given access. Local user B passes authentication but fails the
endpoint security check and is denied access.
Figure 336 Authentication Policy Using Endpoint Security
23.1.1 What You Can Do in this Chapter
Use the Configuration > Auth. Policy screens (Section 23.2 on page 454) to
create and manage authentication policies.

Table of Contents

Related product manuals