ZyXEL Communications ZyWall 110 User Manual page 10

Security firewalls
Hide thumbs Also See for ZyWall 110:
Table of Contents

Advertisement

19.1.1 What You Can Do in this Chapter ........................................................................................335
19.1.2 What You Need to Know ......................................................................................................336
19.2 Web Authentication Screen ...........................................................................................................336
19.2.1 Creating Exceptional Services .............................................................................................339
19.2.2 Creating/Editing an Authentication Policy ............................................................................339
19.3 SSO Overview ...............................................................................................................................340
19.4 SSO - ZyWALL/USG Configuration ..............................................................................................342
19.4.1 Configuration Overview .......................................................................................................342
19.4.2 Configure the ZyWALL/USG to Communicate with SSO ....................................................342
19.4.3 Enable Web Authentication .................................................................................................343
19.4.4 Create a Security Policy ......................................................................................................344
19.4.5 Configure User Information .................................................................................................345
19.4.6 Configure an Authentication Method ...................................................................................346
19.4.7 Configure Active Directory ...................................................................................................347
19.5 SSO Agent Configuration ..............................................................................................................348
Chapter 20
RTLS ..................................................................................................................................................352
20.1 Overview .......................................................................................................................................352
20.1.1 What You Can Do in this Chapter ........................................................................................352
20.2 Before You Begin ..........................................................................................................................353
20.3 Configuring RTLS ..........................................................................................................................353
Security Policy ..................................................................................................................................355
21.1 Overview .......................................................................................................................................355
21.1.1 What You Can Do in this Chapter ........................................................................................355
21.1.2 What You Need to Know ......................................................................................................356
21.2 The Security Policy Screen ...........................................................................................................357
21.2.1 Configuring the Security Policy Control Screen ...................................................................358
21.2.2 The Security Policy Control Add/Edit Screen ......................................................................361
21.3 Anomaly Detection and Prevention Overview ...............................................................................363
21.3.1 The Anomaly Detection and Prevention General Screen ....................................................364
21.3.2 Creating New ADP Profiles ................................................................................................365
21.3.3 Traffic Anomaly Profiles ......................................................................................................366
21.3.4 Protocol Anomalies ..............................................................................................................369
21.4 The Session Control Screen .........................................................................................................371
21.4.1 The Session Control Add/Edit Screen .................................................................................372
21.5 Security Policy Example Applications ...........................................................................................373
Chapter 22
IPSec VPN..........................................................................................................................................376
22.1 Virtual Private Networks (VPN) Overview .....................................................................................376
ZyWALL/USG Series User's Guide
10

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents