TMS zl Management and Configuration Guide ST.1.1.100430

4-59
Firewall
User Authentication
Figure 4-35. Add Policy Window
15. Click Apply.
16. Click Close.
17. Click Save.
The access policy or policies that you have created should be the only access
policies for the users’ zone (or IP addresses) that have no user group setting.
When a user authenticates, the TMS zl Module maps his or her devices source
IP address to the correct user group. The module then applies the firewall
access policies configured for that group.
You must now configure authentication. See either:
“Configure Authentication to the Local Database” on page 4-60
“Configure Authentication to an External RADIUS Server” on page 4-63