458
Enabling remote access with clientless VPN
Identifying resources with URLs
The protocol is always mapi. The host name is the fully qualified domain name or IP address of the host
computer.
Note:
The Microsoft Outlook client does not launch automatically using this resource URL.
The following table shows an example of a MAPI resource.
File server resources
Clientless VPN can control access to file server resources. These resources are configured and accessed
using rules with the following URL syntax:
Because many file servers allow the share to contain a forward slash (/), the share is always terminated
with the @ symbol whether there is a path or not. For Novell FS, share must be preceded by NOVELL.
The protocol is file. File servers always use the host element share to specify which share they are
requesting from the file server; it is not an optional element like port because there is no default share.
When using the advanced syntax, the domain value is optional.
Most file shares are password-protected. The single sign-on feature prompts the user to enter his or
her user name and password the first time he or she accesses the URL, then stores the data for future
logons.
The following table shows an example of a file resource on the sales file server:
The following table shows an example of a Novell file resource on the engineering file server.
Table 11-13
mapi://exchange.symantecdomain.com
URL
Example
protocol
mapi
host
exchange.symantecdomain.com
Basic
protocol://host:share@/path
Advanced
protocol://username/domain:password@host:share@/path
Novell
protocol://host:NOVELL/share@/path
Table 11-14
file://sales1.symantecexample.com:NW@/projects
URL
Example
protocol
file
host
sales1.symantecexample.com
share
NW
path
/projects
Table 11-15
file://engineering.symantecdomain.com: NOVELL/development@/status
URL
Example
protocol
file
host
engineering.symantecdomain.com
share
development
path
/status
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...