Hi, I understand that I can use the UAC to force users to authenticate if they hit certain firewall policies on my SSG140. I want to know what the user experience is when there are multiple policies that require authentication. For example if I have these firewall policies: Policy 1 Untrust to Trust from Any to 2.2.2.2 protocol SSH Policy 2 Trust to Production from 2.2.2.2 to 3.3.3.3 protocol telnet Authentication is enabled on both policies via an IC controller. What happens if a user connects to 2.2.2.2 hitting policy 1 and authenticates to the IC controller using a 2 factor token, then the same user makes the connection to 3.3.3.3 traversing policy 2? Is it possible to have the user only authenticate once and then the IC and SSG140 recognise that user for future policies that require authentication, within a certain time period?
... View more