Table of Contents
ZyWALL ATP Series User’s Guide
15
22.1.1 What You Can Do in this Chapter
...................................................................................
467
22.1.2
What You Need to Know
................................................................................................
467
22.2 The Bandwidth Management Configuration
..........................................................................
471
22.2.1 The Bandwidth Management Add/Edit Screen
............................................................
474
Chapter 23
Web Authentication
........................................................................................................................
483
23.1 Web Auth Overview
...................................................................................................................
483
23.1.1 What You Can Do in this Chapter
...................................................................................
483
23.1.2 What You Need to Know
.................................................................................................
484
23.2 Web Authentication General Screen
......................................................................................
484
23.2.1 User-aware Access Control Example
.............................................................................
489
23.2.2 Authentication Type Screen
............................................................................................
495
23.2.3 Custom Web Portal / User Agreement File Screen
.......................................................
499
23.3 SSO Overview
..............................................................................................................................
500
23.4 SSO - Zyxel Device Configuration
.............................................................................................
502
23.4.1 Configuration Overview
...................................................................................................
502
23.4.2 Configure the Zyxel Device to Communicate with SSO
..............................................
502
23.4.3 Enable Web Authentication
............................................................................................
503
23.4.4 Create a Security Policy
...................................................................................................
505
23.4.5 Configure User Information
..............................................................................................
506
23.4.6 Configure an Authentication Method
...........................................................................
507
23.4.7 Configure Active Directory
..............................................................................................
508
23.5 SSO Agent Configuration
..........................................................................................................
509
Chapter 24
Security Policy
..................................................................................................................................
512
24.1 Overview
.....................................................................................................................................
512
24.2 One Security
................................................................................................................................
513
24.3 What You Can Do in this Chapter
............................................................................................
516
24.3.1 What You Need to Know
.................................................................................................
516
24.4 The Security Policy Screen
.........................................................................................................
518
24.4.1 Configuring the Security Policy Control Screen
............................................................
519
24.4.2 The Security Policy Control Add/Edit Screen
.................................................................
523
24.5 Anomaly Detection and Prevention Overview
......................................................................
524
24.5.1 The Anomaly Detection and Prevention General Screen
...........................................
525
24.5.2 Creating New ADP Profiles
..............................................................................................
526
24.5.3 Traffic Anomaly Profiles
...................................................................................................
527
24.5.4 Protocol Anomaly Profiles
................................................................................................
530
24.6 The Session Control Screen
........................................................................................................
533
24.6.1 The Session Control Add/Edit Screen
..............................................................................
534
24.7 Security Policy Example Applications
......................................................................................
535