ZyXEL Communications ISG50 ユーザーズマニュアル

ページ / 880
ISG50 User’s Guide
347
C
H A P T E R
      2 2
Authentication Policy
22.1  Overview 
Use authentication policies to control who can access the network. You can authenticate users 
(require them to log in). 
22.1.1  What You Can Do in this Chapter
Use the Configuration > Auth. Policy screens (
) to create and manage 
authentication policies.
22.1.2  What You Need to Know
Authentication Policy and VPN
Authentication policies are applied based on a traffic flow’s source and destination IP addresses. If 
VPN traffic matches an authentication policy’s  source and destination IP addresses, the user must 
pass authentication. 
Forced User Authentication
Instead of making users for which user-aware policies have been configured go to the ISG50 Login 
screen manually, you can configure the ISG50 to display the Login screen automatically whenever 
it routes HTTP traffic for anyone who has not logged in yet. 
Note: This works with HTTP traffic only. The ISG50 does display the Login screen when 
users attempt to send other kinds of traffic.
The ISG50 does not automatically route the request that prompted the login, however, so users 
have to make this request again.
Finding Out More
Se
 for an example of how to use authentication policies.
22.2  Authentication Policy Screen
The Authentication Policy screen displays the authentication policies you have configured on the 
ISG50.