User's Manual
Chapter 22 Authentication Policy
ISG50 User’s Guide
351
The following table gives an overview of the objects you can configure.
Table 112 Configuration > Auth. Policy > Add
LABEL DESCRIPTION
Create new
Object
Use to configure any new settings objects that you need to use in this screen.
Enable Policy Select this check box to activate the authentication policy. This field is available for
user-configured policies.
Description Enter a descriptive name of up to 60 printable ASCII characters for the policy.
Spaces are allowed. This field is available for user-configured policies.
User
Authentication
Policy
Use this section of the screen to determine which traffic requires (or does not
require) the senders to be authenticated in order to be routed.
Source Address Select a source address or address group for whom this policy applies. Select any
if the policy is effective for every source. This is any and not configurable for the
default policy.
Destination
Address
Select a destination address or address group for whom this policy applies. Select
any if the policy is effective for every destination. This is any and not configurable
for the default policy.
Schedule Select a schedule that defines when the policy applies. Otherwise, select none
and the rule is always effective. This is none and not configurable for the default
policy.
Authentication Select the authentication requirement for users when their traffic matches this
policy.
unnecessary - Users do not need to be authenticated.
required - Users need to be authenticated. They must manually go to the login
screen. The ISG50 will not redirect them to the login screen.
Log This field is available for the default policy. Select whether to have the ISG50
generate a log (log), log and alert (log alert) or not (no) for packets that match
the default policy. See Chapter 53 on page 705 for more on logs.
Force User
Authentication
This field is available for user-configured policies that require authentication.
Select this to have the ISG50 automatically display the login screen when users
who have not logged in yet try to send HTTP traffic.
OK Click OK to save your changes back to the ISG50.
Cancel Click Cancel to exit this screen without saving.