Device Configuration : Configure : Authentication : User : Registering a New User
Registering a New User
Use the Add User page to enter a new user and quickly configure a related policy.
The Add User page allows you to manually enter user details and configure related policies for a user on your system.
Once a user is registered successfully, the page provides two more options:
Reset User Accounting- Click to reset the usage accounting i.e. internet usage time and data transfer of the user.
View Usage- Click to view the Internet usage and data transfer usage.
1. Go to Device Configuration > Configure > Authentication > User and click Add.
2. Enter user details.
Username
Enter Username, which uniquely identifies user and to be used for login.
Name
Enter Name of the user.
Password
Enter password and re-enter same password for confirmation.
Password is case-sensitive.
User Type
Select the type of user from the available options.
* User
* Administrator
Profile (Only when User Type is Administrator)
Select the administrator profile. Administrator will get access of various Admin Console menus as per the configured profile.
Create a new profile directly from this page or from the profile page.
Email
Specify Email Address of the user.
Use comma to seperate multiple Email Addresses.
Description
Provide user description.
3. Enter policies details.
Group
Select Group in which the user is to be added. User will inherit all the policies assigned to the group.
Surfing Quota
By default, user will inherit its group policy. To override the group policy, select the policy from the list.
You can also create a new policy directly from this page itself or from Protection > Web Protection > Surfing Quota or Objects > Policy > Surfing Quota page.
Access Time
By default, user will inherit its group policy. To override the group policy, select the policy from the list.
You can also create a new policy directly from this page iteself or from Objects > Policy > Access Time page.
Network Traffic
By default, user will inherit its group policy. To override the group policy, select the policy from the list.
You can also create a new policy directly from this page itself or from Objects > Policy > Data Transfer page.
Traffic Shaping
By default, user will inherit its group policy. To override the group policy, select the policy from the list.
You can also create a new policy directly from this page itself or from Objects > Policy > Traffic Shaping page.
4. Enter SSL VPN Policy details.
Remote Access
By default, the user will inherit its group policy. To override the group policy, select a policy from the list.
You can also create a new policy directly from this page itself or from System > VPN > SSL VPN (Remote Access) page.
If user is not to be provided SSL VPN access then select No Policy Applied.
Clientless
By default, the user will inherit its group policy. To override the group policy, select a policy from the list.
You can also create a new policy directly from this page itself or from System > VPN > Clientless Access page.
If user is not to be provided clientless access then select No Policy Applied.
L2TP
By default, user is provided remote access through L2TP. Disable if remote access is not to be provided to the user.
Provide the IP Address (IPv4/IPv6) to be leased to the user for L2TP access.
PPTP
By default, user is provided remote access through PPTP. Disable if remote access is not to be provided to the user.
Provide the IP Address (IPv4/IPv6) to be leased to the user for PPTP access.
Quarantine digest is an Email containing a list of quarantined spam messages filtered by the device and held in the user quarantine area. If configured, device will mail the digest daily to the user. Digest also provides a link to User My Account from where user can access and take the action quarantined messages.
CISCO™ VPN Client
By default, user is provided remote access through CISCO VPN Client. Disable if remote access is not to be provided to the user.
Provide the IP Address (IPv4/IPv6) to be leased to the user for CISCO VPN access.
* To use this feature, CISCO™ VPN Client needs to be configured from VPN > CISCO
Quarantine Digest
Configure Quarantine Digest.
Quarantine digest is an Email containing list of quarantined spam messages filtered by the device and held in the user quarantine area. If configured, device will mail the digest at the configured frequency to the user. Digest also provides a link to User Portal from where user can access and take the action on quarantined messages.
Available Options:
* Enable - User will receive the Quarantine Digest daily and overrides Group setting.
* Disable - User will not receive Quarantine Digest and overrides Group setting.
Simultaneous Logins
Specify number of concurrent logins that will be allowed to user OR Click 'Unlimited' for allowing unlimited Concurrent logins.
Default - 1
Acceptable Range - 1 to 99
* The specified setting will override the global setting specified in the client preferences.
MAC Binding
Enable/disable "MAC Binding". By binding User to MAC Address, you are mapping user with a group MAC Addresses.
If enabled, specify MAC Addresses for example 01:23:45:67:89:AB.
Once you enable MAC binding, user will be able to login through pre-specified machines only.
Use comma to seperate multiple MAC Addresses. For example 01:23:45:67:89:AB, 01:23:45:67:89:AC.
Login Restrictions
Select the appropriate option to specify the login restriction for the user.
Available Options:
* Any Node - User will be able to login from any of the nodes in the network.
* User Group Node(s) - User will be able to login only from the nodes assigned to her group.
* Selected Nodes - User will be able to login from the specified nodes only.
* Node Range - User will be able to login from any of the IP Address from the configured range.
* Only IPv4 Addresses must be provided for options "Selected Nodes" and "Node Range".
5. Select Advanced settings (Only if User Type is Administrator)
Schedule for Device Access
Schedule the device access.
Administrator will be able to access the device only during the time configured in schedule.
Login Restriction for Device Access
Select the appropriate option to specify the login restriction for the user.
Available Options:
* Any Node - Administrator will be able to login from any of the nodes in the network.
* Selected Nodes - Administrator will be able to login from the specified nodes only.
* Node Range - Administrator will be able to login from any of the IP Address from the configured range.
Reset User Accounting (Displayed only after user is added)
Click to reset the usage accounting i.e. internet usage time and network traffic of the user.
View Usage (Displayed only after user is added)
Click to view the Internet usage and data transfer usage.
* User configuration is given precendence over Group configuration.
6. Click Save to register a new user.