Chapter 23 Authentication Policy
ZyWALL USG 300 User’s Guide
455
Schedule
Select a schedule that defines when the policy applies. Otherwise, select
none
and the rule is always effective. This is
none
and not configurable
for the default policy.
Authentication Select the authentication requirement for users when their traffic
matches this policy.
unnecessary
- Users do not need to be authenticated.
required
- Users need to be authenticated. They must manually go to
the login screen. The ZyWALL will not redirect them to the login screen.
Log
This field is available for the default policy. Select whether to have the
ZyWALL generate a log (
log
), log and alert (
log alert
) or not (
no
) for
packets that match the default policy. See
more on logs.
Force User
Authentication
This field is available for user-configured policies that require
authentication. Select this to have the ZyWALL automatically display the
login screen when users who have not logged in yet try to send HTTP
traffic.
Endpoint
Security (EPS)
These fields display when you set the
Authentication
field to
required
.
Use these fields to make sure users’ computers meet an endpoint
security object’s Operating System (OS) and security requirements
before granting access. These fields are available for user-configured
policies that require authentication.
Enable EPS
Checking
Select this to have the ZyWALL check that users’ computers meet the
Operating System (OS) and security requirements of one of the policy’s
selected endpoint security objects before granting access.
Periodical
checking time
Select this and specify a number of minutes to have the ZyWALL repeat
the endpoint security check at a regular interval.
Available EPS
Object /
Selected EPS
Object
Configured endpoint security objects appear on the left. Select the
endpoint security objects to use for this policy and click the right arrow
button to add them to the selected list on the right. Use the [Shift] and/
or [Ctrl] key to select multiple objects. Select any endpoint security
objects that you want to remove from the selected list and click the left
arrow button to remove them.
The ZyWALL checks authenticated users’ computers against the policy’s
selected endpoint security objects in the order you list them here. When
a user’s computer matches an endpoint security object the ZyWALL
grants access and stops checking. Select an endpoint security object and
use the up and down arrows to change it’s position in the list. To make
the endpoint security check as efficient as possible, arrange the endpoint
security objects in order with the one that the most users should match
first and the one that the least user’s should match last.
OK
Click
OK
to save your changes back to the ZyWALL.
Cancel
Click
Cancel
to exit this screen without saving.
Table 117
Configuration > Auth. Policy > Add (continued)
LABEL
DESCRIPTION
Summary of Contents for USG-300 - V2.20 ED 2
Page 2: ......
Page 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Page 31: ...31 PART I User s Guide ...
Page 32: ...32 ...
Page 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Page 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Page 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Page 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Page 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Page 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Page 221: ...Chapter 8 L2TP VPN Example ZyWALL USG 300 User s Guide 221 ...
Page 222: ...Chapter 8 L2TP VPN Example ZyWALL USG 300 User s Guide 222 ...
Page 223: ...223 PART II Technical Reference ...
Page 224: ...224 ...
Page 238: ...Chapter 9 Dashboard ZyWALL USG 300 User s Guide 238 ...
Page 282: ...Chapter 10 Monitor ZyWALL USG 300 User s Guide 282 ...
Page 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Page 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Page 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Page 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Page 433: ...Chapter 20 HTTP Redirect ZyWALL USG 300 User s Guide 433 ...
Page 434: ...Chapter 20 HTTP Redirect ZyWALL USG 300 User s Guide 434 ...
Page 456: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 456 ...
Page 474: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 474 ...
Page 515: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 515 ...
Page 516: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 516 ...
Page 529: ...Chapter 26 SSL VPN ZyWALL USG 300 User s Guide 529 ...
Page 530: ...Chapter 26 SSL VPN ZyWALL USG 300 User s Guide 530 ...
Page 540: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 540 ...
Page 542: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 542 ...
Page 550: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 550 ...
Page 635: ...Chapter 34 IDP ZyWALL USG 300 User s Guide 635 ...
Page 636: ...Chapter 34 IDP ZyWALL USG 300 User s Guide 636 ...
Page 646: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 646 Figure 448 Profiles Protocol Anomaly ...
Page 657: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 657 ...
Page 658: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 658 ...
Page 690: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 690 ...
Page 708: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 708 ...
Page 730: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 730 ...
Page 746: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 746 ...
Page 752: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 752 ...
Page 764: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 764 ...
Page 780: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 780 ...
Page 802: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 802 ...
Page 814: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 814 ...
Page 824: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 824 ...
Page 876: ...Chapter 50 System ZyWALL USG 300 User s Guide 876 ...
Page 916: ...Chapter 54 Reboot ZyWALL USG 300 User s Guide 916 ...
Page 918: ...Chapter 55 Shutdown ZyWALL USG 300 User s Guide 918 ...
Page 938: ...Chapter 56 Troubleshooting ZyWALL USG 300 User s Guide 938 ...
Page 946: ...Chapter 57 Product Specifications ZyWALL USG 300 User s Guide 946 ...
Page 1118: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1118 ...