18

Authentication Policy

18.1 Overview

Use authentication policies to control who can access the network. After a user passes authentication the user’s computer must meet the endpoint security object’s Operating System (OS) option and security requirements to gain access.

In the following figure the ZyWALL’s authentication policy requires endpoint security checking on local user A. A passes authentication and the endpoint security check and is given access. Local user B passes authentication but fails the endpoint security check and is denied access.

Figure 149 Authentication Policy Using Endpoint Security

18.1.1 What You Can Do in this Chapter

Use the Configuration > Auth. Policy screens (Section 18.2 on page 254) to create and manage authentication policies.

18.1.2 What You Need to Know

Authentication Policy and VPN

Authentication policies are applied based on a traffic flow’s source and destination IP addresses. If VPN traffic matches an authentication policy’s source and destination IP addresses, the user must pass authentication.

 

253

ZyWALL 110/310/1100 Series User’s Guide