ZyXEL Communications ISG50 ユーザーズマニュアル
Chapter 22 Authentication Policy
ISG50 User’s Guide
349
The following table gives an overview of the objects you can configure.
Table 111
Configuration > Auth. Policy
LABEL
DESCRIPTION
Enable
Authentication
Policy
Authentication
Policy
Select this to turn on the authentication policy feature.
Exceptional
Services
Services
Use this table to list services that users can access without logging in.
Click Add to change the list’s membership. A screen appears. Available services
appear on the left. Select any services you want users to be able to access
without logging in and click the right arrow button to add them. The member
services are the right. Select any service that you want to remove from the
member list, and click the left arrow button to remove them.
appear on the left. Select any services you want users to be able to access
without logging in and click the right arrow button to add them. The member
services are the right. Select any service that you want to remove from the
member list, and click the left arrow button to remove them.
Keeping DNS as a member allows users’ computers to resolve domain names into
IP addresses.
IP addresses.
Figure 231
Configuration > Auth. Policy > Add Exceptional Service
In the table, select one or more entries and click Remove to delete it or them.
Authentication
Policy Summary
Policy Summary
Use this table to manage the ISG50’s list of authentication policies.
Add
Click this to create a new entry. Select an entry and click Add to create a new
entry after the selected entry.
entry after the selected entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can
modify the entry’s settings.
modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The ISG50 confirms you want to
remove it before doing so.
remove it before doing so.
Activate
To turn on an entry, select it and click Activate.
Inactivate
To turn off an entry, select it and click Inactivate.
Move
To move an entry to a different number in the list, click the Move icon. In the
field that appears, specify the number to which you want to move the interface.
field that appears, specify the number to which you want to move the interface.
Status
This icon is lit when the entry is active and dimmed when the entry is inactive.
Priority
This is the position of the authentication policy in the list. The priority is important
as the policies are applied in order of priority. Default displays for the default
authentication policy that the ISG50 uses on traffic that does not match any
exceptional service or other authentication policy. You can edit the default rule
but not delete it.
as the policies are applied in order of priority. Default displays for the default
authentication policy that the ISG50 uses on traffic that does not match any
exceptional service or other authentication policy. You can edit the default rule
but not delete it.
Source
This displays the source address object to which this policy applies.