2.2.3 User-Aware Access Control
Set up security policies that restrict access to sensitive information and shared
resources based on the user who is trying to access it.
Figure 5 Applications: User-Aware Access Control
ZyWALL USG 20/20W User's Guide
Chapter 2 Features and Applications
41