User identification identifies which IP address belongs to
which user. This allows a method of user identification to be built using an IP address-to-user
mapping cache for policy matching. For details about adding rules, see
Adding Authentication Rules.
By default, all IP addresses do not automatically work with user identification. administrators
must define which source IP addresses or range of IP addresses must work with user
identification. If a source IP address is not in the defined ranges, the IP address
will not work
for user identification. (In such cases, the policy source IP address must be set
to "Any" for
user or group policies to work.)
For the specified IP addresses or ranges of IP addresses, administrators can define
user
identification methods including:
- Transparent authentication (using Windows Client Query and Domain Controller Event
Log
Query)
- Captive Portal