TMS zl Management and Configuration Guide ST.1.0.090213
4-47
Firewall
User Authentication
Figure 4-30. Add Policy Window
15. Click Apply then Close.
16. Click Save.
Once users authenticate, the TMS zl Module applies user-based firewall access
policies to the zone from which the user logged in. The user’s zone is deter-
mined by the source IP address from which the user authenticated.
Using a RADIUS Server to Authenticate Users
The TMS zl Module works with RADIUS servers to provide both authentica-
tion and authorization. RADIUS servers combine authentication and authori-
zation in one process. This is because the authentication packet which enables
a user to access the network also includes attribute-value pairs (AVPs), which
control the user’s access. This section will discuss authentication and autho-
rization separately, although the RADIUS server will perform both functions
for the TMS zl Module.
The largest advantage of using a RADIUS server for authentication and
authorization is that it streamlines the process to more efficiently control a
user from the instant the user begins sending and receiving data. However,