Configuring Policy Enforcement and Device Settings
2
-
5
Step 2 : Specify Authentication and Network Zones
1.
Specify the
Authentication Settings
to apply this policy towards authenticated
users or guest users. You do not have to enable this feature. However, if you do
enable this feature, you must create another policy with the same Trigger
(
Authentication
and
Network Zone
) settings to ensure that endpoints that do
not pass authentication will match a policy. (See
a.
Select the
Enable user authentication
checkbox.
b.
Select either
Apply policy to authenticated users
or
Apply policy to guest
users
.
Note:
Configure LDAP settings if you select
Enable user authentication
. See
on page 2-25 for more information. If you
create one policy for authenticated users, create a policy that applies to users
that are not authenticated.
2.
Specify the
Endpoint Network Zone
to apply this policy to traffic from a
specified network segment.
3.
Specify the
Packet
Destination Network Zones
to apply this policy to traffic
going to a specified network segment.
4.
Specify the
TCP/UDP Protocol Ports
to apply this policy to.
To apply this policy to specific ports, select
Specific ports
and type port number
or port ranges in the text box.
5.
Specify a
Schedule
for this policy. Use this feature to restrict policies to be
effective on certain days or hours.
For example, If you select a schedule of 8:00 A.M. to 7:00 A.M., the policy is
disabled from 7:00 A.M. to 8:00 A.M.
6.
Click
Save
.