User guide
42
4.2.4.1.1 Zone authentication - Client configuration
In the Zone and rule setup window, click the Zones tab and create a new zone using the name of the zone
authenticated by the server. Then click Add IPv4 address and select the Subnet option to add a subnet mask that
contains the authentication server.
Click the Zone authentication tab. Each zone can be set to authenticate to the server. The zone (its IP address and
subnet) will be valid after it is successfully authenticated – e.g. actions such as switching to a firewall profile and adding
an address/subnet of the zone to the Trusted Zone will be performed only after successful authentication.
Select the IP addresses/subnets in the zone will become valid... option to make a zone that will become invalid if
authentication is unsuccessful. To select a Personal firewall profile to be activated after a successful zone authentication,
click the Profiles... button.
If you select the Add addresses/subnets of the zone to the Trusted Zone option, the addresses/subnets of the zone
will be added to the Trusted zone after successful authentication (recommended). If the authentication is unsuccessful,
the addresses will not be added to the Trusted zone. If the Switch to profile with the same name automatically (a
new profile will be created) option is selected, a new profile will be created after successful authentication. Click the
Profiles... button to open the Firewall profiles window.
There are two authentication types available:
1) Using ESET authentication server
Zone authentication searches for a specific server in the network and uses asymmetric encryption (RSA) to authenticate
the server. The authentication process is repeated for each network your computer connects to. Click Setup... and
specify a server name, server listening port and a public key that corresponds to the private server key (see section Zone
authentication – Server configuration). The server name can be entered in the form of an IP address, DNS or NetBios
name. The server name can be followed by a path specifying the location of the key on the server (e.g., server_name_/
directory1/directory2/authentication). Enter multiple servers, separated by semicolons, to serve as alternate servers if the
first one is unavailable.
The public key can be a file of one of the following types:
PEM encrypted public key (.pem)
This key can be generated using the ESET Authentication Server (see section Zone authentication – Server
configuration).
Encrypted public key
Public key certificate (.crt)










