Index

local user database 619 user awareness 585

User Datagram Protocol, see UDP user group objects 583

user groups 583, 585

and content filtering 533 and firewall 370, 373

and policy routes 287, 288, 451, 454, 457, 460 configuration overview 106

user name 32 rules 586

user objects 583 user portal

links 659 logo 418

see SSL user screens 421, 427 user sessions, see sessions user SSL screens 421, 427

access methods 421 bookmarks 428 certificates 422 login 422

logout 428

required information 422 system requirements 422

user-aware 122 users 583

access, see also access users admin (type) 583

admin, see also admin users and AAA servers 584

and authentication method objects 584 and content filtering 533

and firewall 370, 373 and LDAP 584

and policy routes 287, 288, 451, 454, 457, 460 and RADIUS 584

and service control 690 and shell scripts 597 attributes for Ext-User 584 attributes for LDAP 597 attributes for RADIUS 597 attributes in AAA servers 597 configuration overview 106 currently logged in 161, 166 default lease time 593, 595

default reauthentication time 593, 595 default type for Ext-User 584

ext-group-user (type) 584 Ext-User (type) 584 ext-user (type) 584 groups, see user groups Guest (type) 584

lease time 588 limited-admin (type) 584 lockout 594

prerequisites for force user authentication policies 106

reauthentication time 589 types of 583

user names 586 user (type) 584

User’s Guide 29 UTF-8 decode 530

UTF-8-encoding attack 530

V

Vantage CNM 719

Vantage Report (VRPT) 727, 733 virtual interfaces 216

basic characteristics 217 not DHCP clients 267

vs asymmetrical routes 365 vs triangle routes 365

Virtual Local Area Network, see VLAN.

Virtual Network Computing see VNC

Virtual Private Network, see VPN virus 491

attack 464, 491 boot sector 477 e-mail 477 file infector 477 life cycle 477 macro 477 mutation 477 polymorphic 477 scan 464

VLAN 246 advantages 247 and MAC address 247 ID 247 troubleshooting 763

942

 

ZyWALL USG 50 User’s Guide