User's Manual
ISG50 User’s Guide 347
CHAPTER 22
Authentication Policy
22.1 Overview
Use authentication policies to control who can access the network. You can authenticate users
(require them to log in).
22.1.1 What You Can Do in this Chapter
Use the Configuration > Auth. Policy screens (Section 22.2 on page 347) to create and manage
authentication policies.
22.1.2 What You Need to Know
Authentication Policy and VPN
Authentication policies are applied based on a traffic flow’s source and destination IP addresses. If
VPN traffic matches an authentication policy’s source and destination IP addresses, the user must
pass authentication.
Forced User Authentication
Instead of making users for which user-aware policies have been configured go to the ISG50 Login
screen manually, you can configure the ISG50 to display the Login screen automatically whenever
it routes HTTP traffic for anyone who has not logged in yet.
Note: This works with HTTP traffic only. The ISG50 does display the Login screen when
users attempt to send other kinds of traffic.
The ISG50 does not automatically route the request that prompted the login, however, so users
have to make this request again.
Finding Out More
See Section 7.7 on page 122 for an example of how to use authentication policies.
22.2 Authentication Policy Screen
The Authentication Policy screen displays the authentication policies you have configured on the
ISG50.