ZyXEL Communications ZYWALL USG 20 Manual page 371

Unified security gateway
Hide thumbs Also See for ZYWALL USG 20:
Table of Contents

Advertisement

Table 104 Configuration > Auth. Policy > Add (continued)
LABEL
Schedule
Authentication
Log
Force User
Authentication
Endpoint
Security (EPS)
Enable EPS
Checking
Periodical
checking time
Available EPS
Object /
Selected EPS
Object
OK
Cancel
ZyWALL USG 20/20W User's Guide
DESCRIPTION
Select a schedule that defines when the policy applies. Otherwise, select
none and the rule is always effective. This is none and not configurable
for the default policy.
Select the authentication requirement for users when their traffic
matches this policy.
unnecessary - Users do not need to be authenticated.
required - Users need to be authenticated. They must manually go to
the login screen. The ZyWALL will not redirect them to the login screen.
This field is available for the default policy. Select whether to have the
ZyWALL generate a log (log), log and alert (log alert) or not (no) for
packets that match the default policy. See
more on logs.
This field is available for user-configured policies that require
authentication. Select this to have the ZyWALL automatically display the
login screen when users who have not logged in yet try to send HTTP
traffic.
These fields display when you set the Authentication field to required.
Use these fields to make sure users' computers meet an endpoint
security object's Operating System (OS) and security requirements
before granting access. These fields are available for user-configured
policies that require authentication.
Select this to have the ZyWALL check that users' computers meet the
Operating System (OS) and security requirements of one of the policy's
selected endpoint security objects before granting access.
Select this and specify a number of minutes to have the ZyWALL repeat
the endpoint security check at a regular interval.
Configured endpoint security objects appear on the left. Select the
endpoint security objects to use for this policy and click the right arrow
button to add them to the selected list on the right. Use the [Shift] and/
or [Ctrl] key to select multiple objects. Select any endpoint security
objects that you want to remove from the selected list and click the left
arrow button to remove them.
The ZyWALL checks authenticated users' computers against the policy's
selected endpoint security objects in the order you list them here. When
a user's computer matches an endpoint security object the ZyWALL
grants access and stops checking. Select an endpoint security object and
use the up and down arrows to change it's position in the list. To make
the endpoint security check as efficient as possible, arrange the endpoint
security objects in order with the one that the most users should match
first and the one that the least user's should match last.
Click OK to save your changes back to the ZyWALL.
Click Cancel to exit this screen without saving.
Chapter 21 Authentication Policy
Chapter 44 on page 679
for
371

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall usg 20wZywall usg 2000

Table of Contents