Справочник Пользователя для ZyXEL Communications ISG50
Chapter 49 Authentication Method
ISG50 User’s Guide
640
4
Click OK to save the settings.
Figure 427
Example: Using Authentication Method in VPN
49.2 Authentication Method Objects
Click Configuration > Object > Auth. Method to display the screen as shown.
Note: You can create up to 16 authentication method objects.
Figure 428
Configuration > Object > Auth. Method
The following table describes the labels in this screen.
Table 253
Configuration > Object > Auth. Method
LABEL
DESCRIPTION
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can
modify the entry’s settings.
modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The ISG50 confirms you want to
remove it before doing so.
remove it before doing so.
Object
References
References
Select an entry and click Object References to open a screen that shows which
settings use the entry. See
settings use the entry. See
for an example.
#
This field displays the index number.
Method Name
This field displays a descriptive name for identification purposes.
Method List
This field displays the authentication method(s) for this entry.
Add icon
Click Add to add a new entry.
Click Edit to edit the settings of an entry.
Click Delete to remove an entry.