ZyXEL Communications ZyWall ATP series User Manual page 15

Table of Contents

Advertisement

24.4 SSO - Zyxel Device Configuration ............................................................................................. 460
24.4.1 Configuration Overview ................................................................................................... 460
24.4.2 Configure the Zyxel Device to Communicate with SSO .............................................. 460
24.4.3 Enable Web Authentication ............................................................................................ 461
24.4.4 Create a Security Policy ................................................................................................... 463
24.4.5 Configure User Information .............................................................................................. 464
24.4.6 Configure an Authentication Method ........................................................................... 465
24.4.7 Configure Active Directory .............................................................................................. 466
24.5 SSO Agent Configuration .......................................................................................................... 467
Security Policy ..................................................................................................................................470
25.1 Overview ..................................................................................................................................... 470
25.2 One Security ................................................................................................................................ 471
25.3 What You Can Do in this Chapter ............................................................................................ 474
25.3.1 What You Need to Know ................................................................................................. 474
25.4 The Security Policy Screen ......................................................................................................... 476
25.4.1 Configuring the Security Policy Control Screen ............................................................ 477
25.4.2 The Security Policy Control Add/Edit Screen ................................................................. 481
25.5 Anomaly Detection and Prevention Overview ...................................................................... 482
25.5.1 The Anomaly Detection and Prevention General Screen ........................................... 483
25.5.2 Creating New ADP Profiles .............................................................................................. 484
25.5.3 Traffic Anomaly Profiles ................................................................................................... 485
25.5.4 Protocol Anomaly Profiles ................................................................................................ 488
25.6 The Session Control Screen ........................................................................................................ 491
25.6.1 The Session Control Add/Edit Screen .............................................................................. 492
25.7 Security Policy Example Applications ...................................................................................... 493
Application Patrol ............................................................................................................................496
26.1 Overview ..................................................................................................................................... 496
26.1.1 What You Can Do in this Chapter ................................................................................... 496
26.1.2 What You Need to Know ................................................................................................ 496
26.2 Application Patrol Profile ........................................................................................................... 497
26.2.1 Apply to a Security Policy ................................................................................................ 499
Content Filter ....................................................................................................................................505
27.1 Overview ..................................................................................................................................... 505
27.1.1 What You Can Do in this Chapter ................................................................................... 505
27.1.2 What You Need to Know ................................................................................................. 505
Table of Contents
ZyWALL ATP Series User's Guide
15

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Atp500Atp200Atp800

Table of Contents