Authentication Policy; Overview; What You Can Do In This Chapter; What You Need To Know - ZyXEL Communications ISG50-ISDN User Manual

Integrated service gateway
Hide thumbs Also See for ISG50-ISDN:
Table of Contents

Advertisement

22.1 Overview

Use authentication policies to control who can access the network. You can authenticate users
(require them to log in).

22.1.1 What You Can Do in this Chapter

Use the Configuration > Auth. Policy screens
authentication policies.

22.1.2 What You Need to Know

Authentication Policy and VPN
Authentication policies are applied based on a traffic flow's source and destination IP addresses. If
VPN traffic matches an authentication policy's source and destination IP addresses, the user must
pass authentication.
Forced User Authentication
Instead of making users for which user-aware policies have been configured go to the ISG50 Login
screen manually, you can configure the ISG50 to display the Login screen automatically whenever
it routes HTTP traffic for anyone who has not logged in yet.
Note: This works with HTTP traffic only. The ISG50 does display the Login screen when
users attempt to send other kinds of traffic.
The ISG50 does not automatically route the request that prompted the login, however, so users
have to make this request again.
Finding Out More
See
Section 7.7 on page 122

22.2 Authentication Policy Screen

The Authentication Policy screen displays the authentication policies you have configured on the
ISG50.
ISG50 User's Guide
C
HAPTER

Authentication Policy

(Section 22.2 on page
for an example of how to use authentication policies.
2 2
347) to create and manage
347

Advertisement

Table of Contents
loading

This manual is also suitable for:

Isg50

Table of Contents