Setting up user authentication
You can implement user authentication to control which resources different end users can access. You can use authentication as an access requirement in IPv4 Access and IPv6 Access rules in Firewall Policies. You can use both internal and external user authentication servers.