TMS zl Management and Configuration Guide ST.1.0.090213
4-52
Firewall
User Authentication
Access Control List. An ACL is a list of permissions attached to an object—
in this case, the user. The list specifies exactly which other users (or subnets)
the object is allowed to contact (and vice versa). It also specifies exactly which
resources the user is allowed to access. For example, the ACL for a top level
executive would allow the user to access essentially every part of the network;
whereas, the ACL for a guest would likely allow very limited access (perhaps
only to the demilitarized zone).
An ACL may contain as many or as few entries as you like. You can configure
these manually or use a third-party program such as HP ProCurve Identity
Driven Manager (IDM). (See “Using HP ProCurve IDM with RADIUS Servers”
on page 4-67.)
Rate Limits. Rate limits ensure that each user shares network resources,
and they prevent an infected endpoint from monopolizing all bandwidth. (See
“Rate-Limiting Access Policy” on page 4-29.)
Configuring a RADIUS Server
To use a RADIUS server for network authentication and authorization, you
must complete the following tasks.
■ Configure access to a RADIUS server.
■ On that RADIUS server, add the TMS zl Module as a client.
■ On the RADIUS server, create ACLs.
To configure RADIUS settings, complete the following steps:
1. Select Network > Authentication > RADIUS.
Figure 4-33. Network > Authentication > RADIUS Window