using the operator OR, AND, or NOT to combine user objects, user group objects, or other
group expressions to define:
•
Alternatives for authentication (“a” OR “b” )
•
Requirements for authentication “a” AND “b” )
•
Exclusions of a user group, or another group expression (NOT “c” ).
NOTE:
The user and user groups you reference in the group expressions must be external
users that are stored on an external RADIUS server. (A RADIUS server enables a user
to belong to more than one user group).
The operators have different meanings depending on the type of user object you are
using in the security policy, as listed in Table 40 on page 405.
Table 40: Group Expression Operators
User Objects
If the security policy defines authentication for “a” or “b” user objects, the security
device authenticates the user if it is either “a” or “b” .
OR
Requires one of the two objects in the expression to be either a user group or a group
expression (a single user cannot be both user “a” and user “b” ). If the security policy
defines authentication for “a” AND a member of group “b” , the security device
authenticates the user only if those two conditions are met.
AND
If the security policy defines authentication for any user object that is not the “c” user
(NOT “c” ), the security device authenticates all users except the “c” user.
NOT
User Groups
If the security policy defines authentication for user group “ a” or user group “ b”
, the security device authenticates the user if it belongs to either “ a” or “ b” user
group.
OR
If the security policy defines authentication for user group “ a” AND user group “b”
, the security device authenticates the user only if it belongs to both user groups.
AND
If the security policy defines authentication for any user group that is not group
“c” (NOT “c” ), the security device authenticates all users except those that belong
to the “c” user group.
NOT
Group Expressions
If the security policy defines authentication for user objects that match the
description of group expression “a” OR group expression “b” , the security device
authenticates the user if either group expression references that user.
OR
405
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...