TMS zl Management and Configuration Guide ST.1.2.100916

1-31
Overview
Deployment Options for Routing Mode—Threat Protection
2. Configure authentication:
a. Create user groups.
b. Configure the credential repository in one of these ways:
Create accounts on the local database.
Configure proxy to another RADIUS server. On that RADIUS
server, add the TMS zl Module as a client. Create policies on the
RADIUS server to authenticate the users and assign them to the
correct groups.
See “User Authentication” in Chapter 4: “Firewall” for detailed
instructions.
3. Configure the group-based access policies in one of these ways:
On the TMS zl Module (static policies)
Create firewall access policies that are specific to the group. See
“Access Policies” on page 1-43 for an overview of policies and “Fire-
wall Access Policies” in Chapter 4: “Firewall” for detailed instruc-
tions.
On an external RADIUS server
See the documentation for your RADIUS server. You can also use HP
Identity Driven Manager (IDM) to easily configure granular policies
on the external RADIUS server.