412
Enabling remote access with clientless VPN
Controlling remote access
Controlling remote access
Because of a conflict between clientless VPN and security gateway service redirects, the clientless VPN
feature is disabled by default. The procedure in this section must be performed prior to using the
clientless VPN feature.
The three categories of remote access (mail, files, and Web VPN) can be enabled and disabled
independently. This lets you disable certain types of traffic without needing to reconfigure each of the
access rules that allows that sort of traffic.
You can also enable the client and server content caching to improve download and upload rates.
Prerequisites
Complete the following tasks before beginning this procedure:
■
“Managing clientless VPN users”
To enable or disable access to a specific resource type
1
In the SGMI, in the left pane, under System, click
Configuration
.
2
In the right pane, on the Features tab, check
Clientless VPN
.
3
Under Clientless VPN, check any of the following check boxes:
All are checked by default except server caching.
Define users and user groups and their associated authentication
server or group server on the Assets > Users > Network Users or User
Groups tab.
“Configuring users for internal
Define an authentication scheme on the Assets > Authentication
Servers > Schemes tab.
“Configuring an authentication
Define a VPN profile to determine connection parameters on the
Policy > Clientless VPN > Clientless VPN Profiles tab.
“Defining VPN profiles to allow
communication between the security
gateway and clientless users”
Define access rules for local resources on the Policy > Clientless VPN
> Clientless VPN Rules tab.
“Using rules to allow or deny clientless
Define rule sets to apply multiple access rules to users and groups on
the Policy > Clientless VPN > Rulesets tab
“Using rule sets to group clientless VPN
Create roles on the Policy > Clientless VPN > Role Settings tab.
“Using roles to assign rules to users”
Assign users or groups to the roles on the Policy > Clientless
VPN > Role Settings tab
.
“Creating and assigning roles”
Create and configure portal pages to manage remote users’ access to
internal resources on the Assets > Portal Pages > Portal Pages tab.
“Using portal pages to customize the
Web VPN
Enables all Web VPN connections without modifying individual connections.
Remote mail access
Enables all mail proxy connections without modifying individual connections.
File access
Enables all file access rules without modifying individual rules.
Client caching
Caches static client content.
Server caching
Caches static server content.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...