Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 148

Configuring Groups, Configuring, Authentication,

Page 148 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance The STM supports both unauthenticated and authenticated users: • Unauthenticated users. Anonymous users who do not log in to the STM and to which the STM's default email and Web access policies apply. • Authenticated users. Users who have a computer behind the STM, who log in to the STM with a user name and password, and who are assigned an access policy that normally differs from the STM's default email and Web access policies. Different users or user groups can have different access policies, so there can be multiple access policies on the STM. In addition to being authenticated as individual users, users can be authenticated on the STM according to group membership or IP address: - Group membership. A group is defined in the STM's local database, an LDAP database, or a RADIUS database. If you use a RADIUS database for authentication, a group can also be defined in a VLAN. - IP address. A group is defined by its IP address and subnet. Note: For detailed information about authentication, see Configuring Authentication on page 154. The login window that is presented to this type of users is the User Portal Login screen (see Figure 88 on page 156), which requires three items: a user name, a password, and a domain selection. The domain determines the authentication method that needs to be used-LDAP, Active Directory, RADIUS, or the STM's local database. Configuring Groups The use of groups simplifies the application of exception policies that allow different sets of users to have different Internet access restrictions. Rather than applying the same exception to each user, it is easier to apply a single exception to the entire group. For information about exception policies, see Setting Access Exception Rules for Web Access on page 132. Note: For information about custom groups that allow you to set access exceptions for a combination of local groups and local users, groups and users that are defined by their IP address, LDAP groups and users, and RADIUS groups and users, see Creating Custom Groups for Web Access Exceptions on page 139. 148 | Chapter 5. Managing Users, Groups, and Authentication

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

148
|
Chapter 5.
Managing Users, Groups, and Authentication
ProSecure Web/Email Security Threat Management (STM) Appliance
The STM supports both unauthenticated and authenticated users:
Unauthenticated users
. Anonymous users who do not log in to the STM and to which
the STM’s default email and Web access policies apply.
Authenticated users
. Users who have a computer behind the STM, who log in to the
STM with a user name and password, and who are assigned an access policy that
normally differs from the STM’s default email and Web access policies. Different users or
user groups can have different access policies, so there can be multiple access policies
on the STM.
In addition to being authenticated as individual users, users can be authenticated on the
STM according to group membership or IP address:
-
Group membership
. A group is defined in the STM’s local database, an LDAP
database, or a RADIUS database. If you use a RADIUS database for authentication, a
group can also be defined in a VLAN.
-
IP address
. A group is defined by its IP address and subnet.
Note:
For detailed information about authentication, see
Configuring
Authentication
on page 154.
The login window that is presented to this type of users is the User Portal Login screen
(see
Figure 88
on page 156), which requires three items: a user name, a password, and a
domain selection. The domain determines the authentication method that needs to be
used—LDAP, Active Directory, RADIUS, or the STM’s local database.
Configuring Groups
The use of groups simplifies the application of exception policies that allow different sets of
users to have different Internet access restrictions. Rather than applying the same exception
to each user, it is easier to apply a single exception to the entire group. For information about
exception policies, see
Setting Access Exception Rules for Web Access
on page 132.
Note:
For information about custom groups that allow you to set access
exceptions for a combination of local groups and local users, groups
and users that are defined by their IP address, LDAP groups and
users, and RADIUS groups and users, see
Creating Custom Groups
for Web Access Exceptions
on page 139.