Table of Contents
ZyWALL ATP Series User’s Guide
15
24.4 SSO - Zyxel Device Configuration ............................................................................................. 460
24.4.1 Configuration Overview ................................................................................................... 460
24.4.2 Configure the Zyxel Device to Communicate with SSO .............................................. 460
24.4.3 Enable Web Authentication ............................................................................................ 461
24.4.4 Create a Security Policy ................................................................................................... 463
24.4.5 Configure User Information ..............................................................................................464
24.4.6 Configure an Authentication Method ........................................................................... 465
24.4.7 Configure Active Directory ..............................................................................................466
24.5 SSO Agent Configuration .......................................................................................................... 467
Chapter 25
Security Policy..................................................................................................................................470
25.1 Overview ..................................................................................................................................... 470
25.2 One Security ................................................................................................................................ 471
25.3 What You Can Do in this Chapter ............................................................................................ 474
25.3.1 What You Need to Know ................................................................................................. 474
25.4 The Security Policy Screen ......................................................................................................... 476
25.4.1 Configuring the Security Policy Control Screen ............................................................ 477
25.4.2 The Security Policy Control Add/Edit Screen ................................................................. 481
25.5 Anomaly Detection and Prevention Overview ...................................................................... 482
25.5.1 The Anomaly Detection and Prevention General Screen ........................................... 483
25.5.2 Creating New ADP Profiles ..............................................................................................484
25.5.3 Traffic Anomaly Profiles ................................................................................................... 485
25.5.4 Protocol Anomaly Profiles ................................................................................................ 488
25.6 The Session Control Screen ........................................................................................................ 491
25.6.1 The Session Control Add/Edit Screen .............................................................................. 492
25.7 Security Policy Example Applications ......................................................................................493
Chapter 26
Application Patrol............................................................................................................................496
26.1 Overview ..................................................................................................................................... 496
26.1.1 What You Can Do in this Chapter ................................................................................... 496
26.1.2 What You Need to Know ................................................................................................ 496
26.2 Application Patrol Profile ........................................................................................................... 497
26.2.1 Apply to a Security Policy ................................................................................................ 499
26.2.2 The Application Patrol Profile Add/Edit Screen - My Application ............................... 501
26.2.3 The Application Patrol Profile Add/Edit Screen - Query Result .................................... 503
Chapter 27
Content Filter ....................................................................................................................................505
27.1 Overview ..................................................................................................................................... 505
27.1.1 What You Can Do in this Chapter ................................................................................... 505
27.1.2 What You Need to Know ................................................................................................. 505