ZyXEL Communications ISG50 User Manual

Page of 880
Chapter 49 Authentication Method
ISG50 User’s Guide
640
4
Click OK to save the settings. 
Figure 427   
Example: Using Authentication Method in VPN 
49.2  Authentication Method Objects
Click Configuration > Object > Auth. Method to display the screen as shown. 
Note: You can create up to 16 authentication method objects. 
Figure 428   
Configuration > Object > Auth. Method 
The following table describes the labels in this screen. 
Table 253   
Configuration > Object > Auth. Method
LABEL
DESCRIPTION
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can 
modify the entry’s settings. 
Remove
To remove an entry, select it and click Remove. The ISG50 confirms you want to 
remove it before doing so.
Object 
References
Select an entry and click Object References to open a screen that shows which 
settings use the entry. Se
 for an example.
#
This field displays the index number.
Method Name
This field displays a descriptive name for identification purposes.
Method List
This field displays the authentication method(s) for this entry.
Add icon
Click Add to add a new entry. 
Click Edit to edit the settings of an entry. 
Click Delete to remove an entry.