Authentication Timeout: Administrators can place the endpoint in a secured firewall setting (the
firewall Switch To Location setting) to secure against any failure of VPN connectivity. The
Authentication Timeout is the amount of time the Endpoint Security Client waits to gain
authentication to the VPN server. It is recommended that this parameter be set above 1 minute to
allow authentication over slower connections.
Connect/Disconnect Commands: When using the Authentication timer, the Connect and
Disconnect commands control client-based VPN activation. Specify the location of the VPN client
and the required switches in the Parameters fields. The Disconnect command is optional, and
provides for VPN clients that require that the user disconnects before logging off of the network.
NOTE: VPN clients that generate virtual adapters (for example, Cisco Systems VPN Client 4.0)
display the: "Policy Has Been Updated" message, and may switch away from the current location
temporarily. The Policy has not been updated, the Endpoint Security Client is simply comparing the
virtual adapter to any adapter restrictions in the current policy. It is recommended that when running
VPN clients of this type that the Disconnect command hyperlink not be used.
Adapters: This is essentially a mini Adapter policy specific to the VPN Enforcement.
If an adapter is checked (changing it to Enabled, Except), those adapters (Wireless being specific to
card type) are permitted connectivity to the VPN.
Adapters entered into the exception lists below, are denied connectivity to the VPN, while all others
of that type will be given connectivity.
If an adapter is not checked (Disabled, Except), then only the adapters entered into the exception list
are permitted to connect to the VPN; all others are denied connectivity.
This control can be used for adapters incompatible to the VPN, for example, or adapters not
supported by the IT department.
This rule overrides the adapter policy set for the switch-to location.
6.2.2 Locations
Locations are rule-groups assigned to network environments. These environments can be set in the
policy (see
Section 6.3.6, "Network Environments," on page
126), or by the user, when permitted.
Each location can be given unique security settings, denying access to certain kinds of networking
and hardware in more hostile network environments, and granting broader access within trusted
environments.
To access Location controls, click the Locations tab.
98
ZENworks Endpoint Security Management Administration Guide
Need help?
Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION and is the answer not in the manual?