How To Use Endpoint Security And Authentication Policies; Configure The Endpoint Security Objects - ZyXEL Communications ZYWALL USG 20 Manual

Unified security gateway
Hide thumbs Also See for ZYWALL USG 20:
Table of Contents

Advertisement

Chapter 7 Tutorials
Now you add ext-group-user user objects to identify groups based on the group
2
identifier values. Set up one user account for each group of user accounts in the
RADIUS server. Click Configuration > Object > User/Group > User. Click the
Add icon.
Enter a user name and set the User Type to ext-group-user. In the Group
Identifier field, enter Finance, Engineer, Sales, or Boss and set the Associated
AAA Server Object to radius.
Figure 76 Configuration > Object > User/Group > User > Add
Repeat this process to set up the remaining groups of user accounts.
3
7.7 How to Use Endpoint Security and
Authentication Policies
Here is how to use endpoint security to make sure that users' computers meet
specific security requirements before they are allowed to access the network. This
example requires users to have Kaspersky Internet security or anti-virus software
on their computers before they can access the network.

7.7.1 Configure the Endpoint Security Objects

Click Configuration > Object > Endpoint Security > Add to open the
Endpoint Security Edit screen.
• Select Endpoint must comply with all checking items.
• Set the Endpoint Operating System to Windows and the Window Version
to Windows 7.
126
ZyWALL USG 20/20W User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall usg 20wZywall usg 2000

Table of Contents