Knowing user and groups names is only one piece of the
puzzle. The firewall also needs to know which IP addresses map to
which users so that security rules can be enforced appropriately.
Figure 1 illustrates
the different methods that are used to identify users and groups
on your network and shows how user mapping and group mapping work together
to enable user- and group-based security enforcement and visibility.
The following topics describe the different methods of user mapping: