ZyWALL 110/310/1100 Series User’s Guide
253
C
H A P T E R
1 8
Authentication Policy
18.1 Overview
Use authentication policies to control who can access the network. After a user passes
authentication the user’s computer must meet the endpoint security object’s Operating System
(OS) option and security requirements to gain access.
In the following figure the ZyWALL’s authentication policy requires endpoint security checking on
local user A. A passes authentication and the endpoint security check and is given access. Local
user B passes authentication but fails the endpoint security check and is denied access.
Figure 149
Authentication Policy Using Endpoint Security
18.1.1 What You Can Do in this Chapter
Use the Configuration > Auth. Policy screens (
) to create and manage
authentication policies.
18.1.2 What You Need to Know
Authentication Policy and VPN
Authentication policies are applied based on a traffic flow’s source and destination IP addresses. If
VPN traffic matches an authentication policy’s source and destination IP addresses, the user must
pass authentication.