TMS zl Management and Configuration Guide ST.1.0.090213

4-43
Firewall
User Authentication
User Authentication
Beyond firewalls, VPNs, and intrusion prevention and detection systems, the
TMS zl Module provides security for your network by requiring users to
authenticate to the network and requiring authorization for users to access
specific resources and services.
With the TMS zl Module, you can require network users to authenticate by
entering their login credentials on a Web page (for which you can customize
the banner). This user authentication is verified by one of the following
authentication methods:
Local database
Remote Authentication Dial-In User Service (RADIUS) server
You can choose either method for authentication. You can also choose to use
both methods simultaneously. If you choose to use both methods, the TMS zl
Module will check both databases for the user credentials.
Configuring User Authentication
To direct users to log in, you must complete the following tasks:
Configure the Web login page and Web session settings.
Create a group-specific, rate-limiting access policy that allows HTTPS
traffic from the zone in which you will require authentication.
Direct the endpoint’s Web browser to one of the module’s IP address, using
the correct port.
Configure Web Login Page and Web Settings
To configure the Web login page and Web settings, complete the following
steps:
1. Select System > Settings > General.