ZyXEL Communications 1000 Manuel D’Utilisation

Page de 1075
 Chapter 23 Authentication Policy
ZyWALL USG 1000 User’s Guide
421
Schedule
Select a schedule that defines when the policy applies. Otherwise, select 
none and the rule is always effective. This is none and not configurable 
for the default policy.
Authentication Select the authentication requirement for users when their traffic 
matches this policy. 
unnecessary - Users do not need to be authenticated.
required - Users need to be authenticated. They must manually go to 
the login screen. The ZyWALL will not redirect them to the login screen.
Log
This field is available for the default policy. Select whether to have the 
ZyWALL generate a log (log), log and alert (log alert) or not (no) for 
packets that match the default policy. See 
more on logs.
Force User 
Authentication
This field is available for user-configured policies that require 
authentication. Select this to have the ZyWALL automatically display the 
login screen when users who have not logged in yet try to send HTTP 
traffic. 
Endpoint 
Security (EPS)
These fields display when you set the Authentication field to required
Use these fields to make sure users’ computers meet an endpoint 
security object’s Operating System (OS) and security requirements 
before granting access. These fields are available for user-configured 
policies that require authentication.
Enable EPS 
Checking
Select this to have the ZyWALL check that users’ computers meet the 
Operating System (OS) and security requirements of one of the policy’s 
selected endpoint security objects before granting access.
Periodical 
checking time
Select this and specify a number of minutes to have the ZyWALL repeat 
the endpoint security check at a regular interval.
Available EPS 
Object / 
Selected EPS 
Object
Configured endpoint security objects appear on the left. Select the 
endpoint security objects to use for this policy and click the right arrow 
button to add them to the selected list on the right. Use the [Shift] and/
or [Ctrl] key to select multiple objects. Select any endpoint security 
objects that you want to remove from the selected list and click the left 
arrow button to remove them. 
The ZyWALL checks authenticated users’ computers against the policy’s 
selected endpoint security objects in the order you list them here. When 
a user’s computer matches an endpoint security object the ZyWALL 
grants access and stops checking. Select an endpoint security object and 
use the up and down arrows to change it’s position in the list. To make 
the endpoint security check as efficient as possible, arrange the endpoint 
security objects in order with the one that the most users should match 
first and the one that the least user’s should match last. 
OK
Click OK to save your changes back to the ZyWALL.
Cancel
Click Cancel to exit this screen without saving.
Table 107   Configuration > Auth. Policy > Add  (continued) 
LABEL
DESCRIPTION