ZyXEL Communications 1100 Network Router User Manual


 
ZyWALL 110/310/1100 Series User’s Guide 253
CHAPTER 18
Authentication Policy
18.1 Overview
Use authentication policies to control who can access the network. After a user passes
authentication the user’s computer must meet the endpoint security object’s Operating System
(OS) option and security requirements to gain access.
In the following figure the ZyWALL’s authentication policy requires endpoint security checking on
local user A. A passes authentication and the endpoint security check and is given access. Local
user B passes authentication but fails the endpoint security check and is denied access.
Figure 149 Authentication Policy Using Endpoint Security
18.1.1 What You Can Do in this Chapter
Use the Configuration > Auth. Policy screens (Section 18.2 on page 254) to create and manage
authentication policies.
18.1.2 What You Need to Know
Authentication Policy and VPN
Authentication policies are applied based on a traffic flow’s source and destination IP addresses. If
VPN traffic matches an authentication policy’s source and destination IP addresses, the user must
pass authentication.