Authentication Policy; Overview; What You Can Do In This Chapter; What You Need To Know - ZyXEL Communications 310 User Manual

Vpn firewall
Hide thumbs Also See for 310:
Table of Contents

Advertisement

18.1 Overview

Use authentication policies to control who can access the network. After a user passes
authentication the user's computer must meet the endpoint security object's Operating System
(OS) option and security requirements to gain access.
In the following figure the ZyWALL's authentication policy requires endpoint security checking on
local user A. A passes authentication and the endpoint security check and is given access. Local
user B passes authentication but fails the endpoint security check and is denied access.
Figure 149 Authentication Policy Using Endpoint Security

18.1.1 What You Can Do in this Chapter

Use the Configuration > Auth. Policy screens
authentication policies.

18.1.2 What You Need to Know

Authentication Policy and VPN
Authentication policies are applied based on a traffic flow's source and destination IP addresses. If
VPN traffic matches an authentication policy's source and destination IP addresses, the user must
pass authentication.
ZyWALL 110/310/1100 Series User's Guide
C
HAPTER

Authentication Policy

(Section 18.2 on page
1 8
254) to create and manage
253

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 1100 seriesZywall 110 seriesZywall 310 series

Table of Contents