Page 346 / 944 Scroll up to view Page 341 - 345
Chapter 20 IP/MAC Binding
ZyWALL USG 50 User’s Guide
346
20.2.2
Static DHCP Edit
Click
Configuration > Network > IP/MAC Binding > Edit
to open the
IP/
MAC Binding Edit
screen. Click the
Add
or
Edit
icon to open the following
screen. Use this screen to configure an interface’s IP to MAC address binding
settings.
Figure 208
Configuration > Network > IP/MAC Binding > Edit > Add
The following table describes the labels in this screen.
Static DHCP
Bindings
This table lists the bound IP and MAC addresses. The ZyWALL checks this
table when it assigns IP addresses. If the computer’s MAC address is in
the table, the ZyWALL assigns the corresponding IP address. You can
also access this table from the interface’s edit screen.
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click
Edit
to open a screen where
you can modify the entry’s settings.
Remove
To remove an entry, select it and click
Remove
. The ZyWALL confirms
you want to remove it before doing so.
#
This is the index number of the static DHCP entry.
IP Address
This is the IP address that the ZyWALL assigns to a device with the
entry’s MAC address.
MAC Address
This is the MAC address of the device to which the ZyWALL assigns the
entry’s IP address.
Description
This helps identify the entry.
OK
Click
OK
to save your changes back to the ZyWALL.
Cancel
Click
Cancel
to exit this screen without saving.
Table 98
Configuration > Network > IP/MAC Binding > Edit
(continued)
LABEL
DESCRIPTION
Table 99
Configuration > Network > IP/MAC Binding > Edit > Add
LABEL
DESCRIPTION
Interface
Name
This field displays the name of the interface within the ZyWALL and the
interface’s IP address and subnet mask.
IP Address
Enter the IP address that the ZyWALL is to assign to a device with the
entry’s MAC address.
Page 347 / 944
Chapter 20 IP/MAC Binding
ZyWALL USG 50 User’s Guide
347
20.3
IP/MAC Binding Exempt List
Click
Configuration > Network > IP/MAC Binding > Exempt List
to open the
IP/MAC Binding Exempt List
screen. Use this screen to configure ranges of IP
addresses to which the ZyWALL does not apply IP/MAC binding.
Figure 209
Configuration > Network > IP/MAC Binding > Exempt List
The following table describes the labels in this screen.
MAC Address
Enter the MAC address of the device to which the ZyWALL assigns the
entry’s IP address.
Description
Enter up to 64 printable ASCII characters to help identify the entry. For
example, you may want to list the computer’s owner.
OK
Click
OK
to save your changes back to the ZyWALL.
Cancel
Click
Cancel
to exit this screen without saving.
Table 99
Configuration > Network > IP/MAC Binding > Edit > Add
(continued)
LABEL
DESCRIPTION
Table 100
Configuration > Network > IP/MAC Binding > Exempt List
LABEL
DESCRIPTION
Add
Click this to create a new entry.
Edit
Click an entry or select it and click
Edit
to modify the entry’s settings.
Remove
To remove an entry, select it and click
Remove
. The ZyWALL confirms
you want to remove it before doing so.
#
This is the index number of the IP/MAC binding list entry.
Name
Enter a name to help identify this entry.
Start IP
Enter the first IP address in a range of IP addresses for which the
ZyWALL does not apply IP/MAC binding.
End IP
Enter the last IP address in a range of IP addresses for which the ZyWALL
does not apply IP/MAC binding.
Add icon
Click the
Add
icon to add a new entry.
Click the
Remove
icon to delete an entry. A window displays asking you
to confirm that you want to delete it.
Apply
Click
Apply
to save your changes back to the ZyWALL.
Page 348 / 944
Chapter 20 IP/MAC Binding
ZyWALL USG 50 User’s Guide
348
Page 349 / 944
ZyWALL USG 50 User’s Guide
349
C
HAPTER
21
Authentication Policy
21.1
Overview
Use authentication policies to control who can access the network. You can
authenticate users (require them to log in) and even perform Endpoint Security
(EPS) checking to make sure users’ computers comply with defined corporate
policies before they can access the network. After a users passes authentication
the user’s computer must meet the endpoint security object’s Operating System
(OS) option and security requirements to gain access. See
Chapter 44 on page
665
for how to configure endpoint security objects to use with authentication
policies.
In the following figure the ZyWALL’s authentication policy requires endpoint
security checking on local user
A
.
A
passes authentication and the endpoint
security check and is given access. Local user
B
passes authentication but fails the
endpoint security check and is denied access.
Figure 210
Authentication Policy Using Endpoint Security
21.1.1
What You Can Do in this Chapter
Use the
Configuration > Auth. Policy
screens (
Section 21.2 on page 350
) to
create and manage authentication policies.
Page 350 / 944
Chapter 21 Authentication Policy
ZyWALL USG 50 User’s Guide
350
21.1.2
What You Need to Know
Authentication Policy and VPN
Authentication policies are applied based on a traffic flow’s source and destination
IP addresses. If VPN traffic matches an authentication policy’s
source and
destination IP addresses, the user must pass authentication.
Multiple Endpoint Security Objects
You can set an authentication policy to use multiple endpoint security objects. This
allows checking of computers with different OSs or security settings. When a client
attempts to log in, the ZyWALL checks the client’s computer against the endpoint
security objects one-by-one. The client’s computer must match one of the
authentication policy’s endpoint security objects in order to gain access.
Forced User Authentication
Instead of making users for which user-aware policies have been configured go to
the ZyWALL
Login
screen manually, you can configure the ZyWALL to display the
Login
screen automatically whenever it routes HTTP traffic for anyone who has
not logged in yet.
Note: This works with HTTP traffic only. The ZyWALL does display the
Login
screen
when users attempt to send other kinds of traffic.
The ZyWALL does not automatically route the request that prompted the login,
however, so users have to make this request again.
Finding Out More
See
Section 7.7 on page 133
for an example of how to use endpoint security and
authentication policies.
21.2
Authentication Policy Screen
The
Authentication Policy
screen displays the authentication policies you have
configured on the ZyWALL.

Rate

124.8 / 5 based on 304 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top