Chapter 7 General Tutorials
ISG50 User’s Guide
122
7.7 How to Use Authentication Policies
Here is how to use authentication policies to make sure that users log in before they are allowed to
access the network.
7.7.1 Configure the Authentication Policy
Click Configuration > Auth. Policy and then the Authentication Policy Summary’s Add icon to
open the Auth. Policy Edit screen. Use this screen to configure an authentication policy.
• Enable the policy and name it.
•Set the Source Address to LAN1 and the Destination Address to any, the Schedule set to
none, and Authentication set to required to apply this policy to all users.
•Select Force User Authentication to redirect the HTTP traffic of users who are not yet logged in
to the ISG50’s login screen.
• Click OK.
Figure 93 Configuration > Auth. Policy > Add
4 Turn on authentication policy and click Apply.