Endpoint Security; Overview - ZyXEL Communications ZYWALL USG 20 Manual

Unified security gateway
Hide thumbs Also See for ZYWALL USG 20:
Table of Contents

Advertisement

C
H A P T E R

42.1 Overview

Use Endpoint Security (EPS), also known as endpoint control, to make sure users'
computers comply with defined corporate policies before they can access the
network or an SSL VPN tunnel. After a successful user authentication, a user's
computer must meet the endpoint security object's Operating System (OS) option
and security requirements to gain access. You can configure the endpoint security
object to require a user's computer to match just one of the endpoint security
object's checking criteria or all of them. Configure endpoint security objects to use
with the authentication policy and SSL VPN features.
For example, an authentication policy could use an endpoint security object that
requires a LAN user's computer to pass all of the object's checking items in order
to access the network. LAN user A passes all of the checks and is given access. An
SSL VPN tunnel could use a different endpoint security profile that only requires
the user's computer to match at least one checked item. SSL VPN user B matches
at least one of the items checked by the SSL VPN's endpoint security object and is
granted access to the system resource defined in the SSL VPN access policy; in
this example a web server. SSL VPN user C fails all of the SSL VPN's endpoint
security check and is not given any access.
Figure 364 Endpoint Security
ZyWALL USG 20/20W User's Guide

Endpoint Security

42
621

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall usg 20wZywall usg 2000

Table of Contents