We set up four Authentication examples in this chapter:
No
Suitable
Situation
Ex1
Auth User
Auth Group
Example
Setting specific users to connect with external
network only before passing the authentication
of policy.
(Adopt the built-in Auth User and Auth Group
Function)
99
Page
87