User's Manual
Administrator’s Manual
60
5.2.1 Authentication Policies
The device provides a simple interface simplifying the complicated management setup,
and the system provides a total of 2 management setups. Administrator can adopt
different Authetication methods according to each management setup. Each
management setup has at most 20 management rules to go with the group
configuration, so that the management on general users is once more diversified and
flexible. Administrator can select the desired management set up through the
pull-down menu. In addition, a layer 2 Authentication is also possible.
Figure 5-37 Example of Authentication Policy
Preferred Authentication Method: This Authentication method is put to be the
Preference.