User identification identifies which IP address belongs to
which user. This allows a method of user identification to be built using an IP address-to-user
mapping cache for policy matching. For details about adding rules, see
Adding Authentication Rules.
By default, all IP addresses do not automatically work with user identification. Make
sure to
define which source IP addresses or range of IP addresses must work with user identification.
If
a source IP address is not in the defined ranges, the IP address will not work for
user
identification. (In such cases, the policy source IP address must be set to "Any"
for user or
group policies to work.)
For the specified IP addresses or ranges of IP addresses, define user
identification methods including:
- Transparent authentication (using Windows Client Query and Domain Controller Event
Log
Query)
- Captive Portal