ZyWALL (ZLD) CLI Reference Guide
281
C
H A P T E R
3 4
Endpoint Security
This chapter describes how to configure endpoint security objects for use in authentication
policy and SSL VPN.
34.1 Endpoint Security Overview
Use Endpoint Security (EPS), also known as endpoint control, to make sure users’ computers
comply with defined corporate policies before they can access the network or an SSL VPN
tunnel. After a successful user authentication, a user’s computer must meet the endpoint
security object’s Operating System (OS) option and security requirements to gain access. You
can configure the endpoint security object to require a user’s computer to match just one of the
endpoint security object’s checking criteria or all of them. Configure endpoint security objects
to use with the authentication policy and SSL VPN features.
What Endpoint Security Can Check
The settings endpoint security can check vary depending on the OS of the user’s computer.
Depending on the OS, EPS can check user computers for the following:
• Operating System (Windows, Linux, Mac OSX, or others)
• Windows version and service pack version
• Windows Auto Update setting and installed security patches
• Personal firewall installation and activation
• Anti-virus installation and activation
• Windows registry settings
• Processes that the endpoint must execute
• Processes that the endpoint cannot execute
• The size and version of specific files
Multiple Endpoint Security Objects
You can configure an authentication policy or SSL VPN policy to use multiple endpoint
security objects. This allows checking of computers with different OSs or security settings.
When a client attempts to log in, the ZyWALL checks the client’s computer against the
endpoint security objects one-by-one. The client’s computer must match one of the force
authentication or SSL VPN policy’s endpoint security policies in order to gain access.
Summary of Contents for ZyWall
Page 2: ......
Page 6: ...Document Conventions ZyWALL ZLD CLI Reference Guide 6 ...
Page 10: ...10 ...
Page 26: ...Chapter 1 Command Line Interface ZyWALL ZLD CLI Reference Guide 26 ...
Page 46: ...46 ...
Page 84: ...Chapter 6 Interfaces ZyWALL ZLD CLI Reference Guide 84 ...
Page 98: ...Chapter 8 Route ZyWALL ZLD CLI Reference Guide 98 ...
Page 106: ...Chapter 10 Zones ZyWALL ZLD CLI Reference Guide 106 ...
Page 110: ...Chapter 11 DDNS ZyWALL ZLD CLI Reference Guide 110 ...
Page 116: ...Chapter 12 Virtual Servers ZyWALL ZLD CLI Reference Guide 116 ...
Page 120: ...Chapter 13 HTTP Redirect ZyWALL ZLD CLI Reference Guide 120 ...
Page 124: ...Chapter 14 ALG ZyWALL ZLD CLI Reference Guide 124 ...
Page 125: ...125 PART III Firewall Firewall 127 ...
Page 126: ...126 ...
Page 134: ...Chapter 15 Firewall ZyWALL ZLD CLI Reference Guide 134 ...
Page 135: ...135 PART IV VPN IPSec VPN 137 SSL VPN 147 L2TP VPN 153 ...
Page 136: ...136 ...
Page 146: ...Chapter 16 IPSec VPN ZyWALL ZLD CLI Reference Guide 146 ...
Page 152: ...Chapter 17 SSL VPN ZyWALL ZLD CLI Reference Guide 152 ...
Page 160: ...Chapter 18 L2TP VPN ZyWALL ZLD CLI Reference Guide 160 ...
Page 161: ...161 PART V Application Patrol Application Patrol 163 ...
Page 162: ...162 ...
Page 174: ...Chapter 19 Application Patrol ZyWALL ZLD CLI Reference Guide 174 ...
Page 175: ...175 PART VI Anti X Anti Virus 177 IDP Commands 185 Content Filtering 203 Anti Spam 215 ...
Page 176: ...176 ...
Page 202: ...Chapter 21 IDP Commands ZyWALL ZLD CLI Reference Guide 202 ...
Page 214: ...Chapter 22 Content Filtering ZyWALL ZLD CLI Reference Guide 214 ...
Page 224: ...Chapter 23 Anti Spam ZyWALL ZLD CLI Reference Guide 224 ...
Page 225: ...225 PART VII Device HA Device HA 227 ...
Page 226: ...226 ...
Page 236: ...236 ...
Page 248: ...Chapter 26 Addresses ZyWALL ZLD CLI Reference Guide 248 ...
Page 252: ...Chapter 27 Services ZyWALL ZLD CLI Reference Guide 252 ...
Page 262: ...Chapter 29 AAA Server ZyWALL ZLD CLI Reference Guide 262 ...
Page 266: ...Chapter 30 Authentication Objects ZyWALL ZLD CLI Reference Guide 266 ...
Page 272: ...Chapter 31 Certificates ZyWALL ZLD CLI Reference Guide 272 ...
Page 276: ...Chapter 32 ISP Accounts ZyWALL ZLD CLI Reference Guide 276 ...
Page 280: ...Chapter 33 SSL Application ZyWALL ZLD CLI Reference Guide 280 ...
Page 288: ...Chapter 34 Endpoint Security ZyWALL ZLD CLI Reference Guide 288 ...
Page 289: ...289 PART IX System System 291 System Remote Management 299 ...
Page 290: ...290 ...
Page 298: ...Chapter 35 System ZyWALL ZLD CLI Reference Guide 298 ...
Page 314: ...314 ...
Page 332: ...Chapter 37 File Manager ZyWALL ZLD CLI Reference Guide 332 Figure 55 Startup Complete ...
Page 344: ...Chapter 39 Reports and Reboot ZyWALL ZLD CLI Reference Guide 344 ...
Page 346: ...Chapter 40 Session Timeout ZyWALL ZLD CLI Reference Guide 346 ...
Page 348: ...Chapter 41 Diagnostics ZyWALL ZLD CLI Reference Guide 348 ...
Page 362: ...Chapter 44 Watchdog Timer ZyWALL ZLD CLI Reference Guide 362 ...
Page 363: ...363 PART XI Command List List of Commands Alphabetical 365 ...
Page 364: ...364 ...
Page 394: ...List of Commands Alphabetical ZyWALL ZLD CLI Reference Guide 394 ...