ZyXEL Communications ZyWALL 110 User Manual page 10

Hide thumbs Also See for ZyWALL 110:
Table of Contents

Advertisement

19.1 Web Auth Overview ......................................................................................................................339
19.1.1 What You Can Do in this Chapter ........................................................................................339
19.1.2 What You Need to Know ......................................................................................................340
19.2 Web Authentication Screen ...........................................................................................................340
19.2.1 Creating Exceptional Services .............................................................................................343
19.2.2 Creating/Editing an Authentication Policy ............................................................................343
19.3 SSO Overview ...............................................................................................................................344
19.4 SSO - ZyWALL/USG Configuration ..............................................................................................346
19.4.1 Configuration Overview .......................................................................................................346
19.4.2 Configure the ZyWALL/USG to Communicate with SSO ....................................................346
19.4.3 Enable Web Authentication .................................................................................................347
19.4.4 Create a Security Policy ......................................................................................................348
19.4.5 Configure User Information .................................................................................................349
19.4.6 Configure an Authentication Method ...................................................................................350
19.4.7 Configure Active Directory ...................................................................................................351
19.5 SSO Agent Configuration ..............................................................................................................352
Chapter 20
RTLS ..................................................................................................................................................357
20.1 Overview .......................................................................................................................................357
20.1.1 What You Can Do in this Chapter ........................................................................................357
20.2 Before You Begin ..........................................................................................................................358
20.3 Configuring RTLS ..........................................................................................................................358
Security Policy ..................................................................................................................................360
21.1 Overview .......................................................................................................................................360
21.2 One Security .................................................................................................................................361
21.3 What You Can Do in this Chapter .................................................................................................364
21.3.1 What You Need to Know ......................................................................................................365
21.4 The Security Policy Screen ...........................................................................................................366
21.4.1 Configuring the Security Policy Control Screen ...................................................................367
21.4.2 The Security Policy Control Add/Edit Screen ......................................................................370
21.5 Anomaly Detection and Prevention Overview ...............................................................................372
21.5.1 The Anomaly Detection and Prevention General Screen ....................................................373
21.5.2 Creating New ADP Profiles ................................................................................................374
21.5.3 Traffic Anomaly Profiles ......................................................................................................375
21.5.4 Protocol Anomalies ..............................................................................................................378
21.6 The Session Control Screen .........................................................................................................380
21.6.1 The Session Control Add/Edit Screen .................................................................................381
21.7 Security Policy Example Applications ...........................................................................................382
Chapter 22
IPSec VPN..........................................................................................................................................385
ZyWALL/USG Series User's Guide
10

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents