ZyXEL Communications 1000 Network Router User Manual


  Open as PDF
of 1075
 
Chapter 23 Authentication Policy
ZyWALL USG 1000 User’s Guide
421
Schedule Select a schedule that defines when the policy applies. Otherwise, select
none and the rule is always effective. This is none and not configurable
for the default policy.
Authentication Select the authentication requirement for users when their traffic
matches this policy.
unnecessary - Users do not need to be authenticated.
required - Users need to be authenticated. They must manually go to
the login screen. The ZyWALL will not redirect them to the login screen.
Log This field is available for the default policy. Select whether to have the
ZyWALL generate a log (log), log and alert (log alert) or not (no) for
packets that match the default policy. See Chapter 51 on page 833 for
more on logs.
Force User
Authentication
This field is available for user-configured policies that require
authentication. Select this to have the ZyWALL automatically display the
login screen when users who have not logged in yet try to send HTTP
traffic.
Endpoint
Security (EPS)
These fields display when you set the Authentication field to required.
Use these fields to make sure users’ computers meet an endpoint
security object’s Operating System (OS) and security requirements
before granting access. These fields are available for user-configured
policies that require authentication.
Enable EPS
Checking
Select this to have the ZyWALL check that users’ computers meet the
Operating System (OS) and security requirements of one of the policy’s
selected endpoint security objects before granting access.
Periodical
checking time
Select this and specify a number of minutes to have the ZyWALL repeat
the endpoint security check at a regular interval.
Available EPS
Object /
Selected EPS
Object
Configured endpoint security objects appear on the left. Select the
endpoint security objects to use for this policy and click the right arrow
button to add them to the selected list on the right. Use the [Shift] and/
or [Ctrl] key to select multiple objects. Select any endpoint security
objects that you want to remove from the selected list and click the left
arrow button to remove them.
The ZyWALL checks authenticated users’ computers against the policy’s
selected endpoint security objects in the order you list them here. When
a user’s computer matches an endpoint security object the ZyWALL
grants access and stops checking. Select an endpoint security object and
use the up and down arrows to change it’s position in the list. To make
the endpoint security check as efficient as possible, arrange the endpoint
security objects in order with the one that the most users should match
first and the one that the least user’s should match last.
OK Click OK to save your changes back to the ZyWALL.
Cancel Click Cancel to exit this screen without saving.
Table 107 Configuration > Auth. Policy > Add (continued)
LABEL DESCRIPTION