Chapter 21 Authentication Policy

 

Table 102 Configuration > Auth. Policy > Add (continued)

 

LABEL

DESCRIPTION

 

Schedule

Select a schedule that defines when the policy applies. Otherwise, select

 

 

none and the rule is always effective. This is none and not configurable

 

 

for the default policy.

 

 

 

 

Authentication

Select the authentication requirement for users when their traffic

 

 

matches this policy.

 

 

unnecessary - Users do not need to be authenticated.

 

 

required - Users need to be authenticated. They must manually go to

 

 

the login screen. The ZyWALL will not redirect them to the login screen.

 

 

 

 

Log

This field is available for the default policy. Select whether to have the

 

 

ZyWALL generate a log (log), log and alert (log alert) or not (no) for

 

 

packets that match the default policy. See Chapter 46 on page 723 for

 

 

more on logs.

 

 

 

 

Force User

This field is available for user-configured policies that require

 

Authentication

authentication. Select this to have the ZyWALL automatically display the

 

 

login screen when users who have not logged in yet try to send HTTP

 

 

traffic.

 

 

 

 

Endpoint

These fields display when you set the Authentication field to required.

 

Security (EPS)

Use these fields to make sure users’ computers meet an endpoint

 

 

security object’s Operating System (OS) and security requirements

 

 

before granting access. These fields are available for user-configured

 

 

policies that require authentication.

 

 

 

 

Enable EPS

Select this to have the ZyWALL check that users’ computers meet the

 

Checking

Operating System (OS) and security requirements of one of the policy’s

 

 

selected endpoint security objects before granting access.

 

 

 

 

Periodical

Select this and specify a number of minutes to have the ZyWALL repeat

 

checking time

the endpoint security check at a regular interval.

 

 

 

 

Available EPS

Configured endpoint security objects appear on the left. Select the

 

Object /

endpoint security objects to use for this policy and click the right arrow

 

Selected EPS

button to add them to the selected list on the right. Use the [Shift] and/

 

Object

or [Ctrl] key to select multiple objects. Select any endpoint security

 

 

objects that you want to remove from the selected list and click the left

 

 

arrow button to remove them.

 

 

The ZyWALL checks authenticated users’ computers against the policy’s

 

 

selected endpoint security objects in the order you list them here. When

 

 

a user’s computer matches an endpoint security object the ZyWALL

 

 

grants access and stops checking. Select an endpoint security object and

 

 

use the up and down arrows to change it’s position in the list. To make

 

 

the endpoint security check as efficient as possible, arrange the endpoint

 

 

security objects in order with the one that the most users should match

 

 

first and the one that the least user’s should match last.

 

 

 

 

OK

Click OK to save your changes back to the ZyWALL.

 

 

 

 

Cancel

Click Cancel to exit this screen without saving.

 

 

 

 

355

ZyWALL USG 50 User’s Guide