Chapter 7 Tutorials

4Turn on authentication policy and click Apply.

Figure 88 Configuration > Auth. Policy

The following figure shows an error message example when a user’s computer does not meet an endpoint security object’s requirements. Click Close to return to the login screen.

Figure 89 Example: Endpoint Security Error Message

7.8 How to Configure Service Control

Service control lets you configure rules that control HTTP and HTTPS management access (to the Web Configurator) and separate rules that control HTTP and HTTPS

136

 

ZyWALL USG 50 User’s Guide