620
Field descriptions
Policy field descriptions
Network application Network application to which the rule applies.
The network applications available for Clientless VPN rules are:
■
HTTP
■
HTTPS
■
HTTP/HTTPS
■
File
■
FTP
■
■
Telnet
■
TCP
■
UDP
■
Outlook
■
MAPI
■
VPN
These are not necessarily protocols, but rather, types of applications and access methods
that the user may launch from the portal. You may select only one protocol in a simple rule.
The Network Application selected determines which of the rest of the fields on this tab
appear.
The list of network applications is not determined by the protocols defined under Assets >
Protocols > Protocols, and it is not configurable as those are. All network applications can
always be used in any Clientless VPN rule.
Host
Fully qualified domain name or IP address of the destination host.
Note:
Clientless VPN users need to match either the fully-qualified domain name or the IP
address. Reverse lookups are not enabled by default. To enable reverse lookups, check the
Enable expanded DNS lookups option on the Asset Parameters page.
Port
Port number to use. This is only necessary if it is not the default port number for that
resource protocol.
Path
Folder, file, or URL path to the resources made available or restricted on the destination
host.
Wildcard expressions may be used. For example, in the Web URL http://
jdoe:[email protected]/products.html*, the path /products.html* specifies
anything below the /products directory with an html extension.
Query
An optional query to help locate http and https resources.
Wildcard expressions may be used. For example, in the Web URL http://
jdoe:[email protected]/products.html?Symantec, the query ?Symantec locates
dynamic content containing the name Symantec.
Share
For file resource rules, the share mount point.
VPN Profile
For VPN rules, the name of a specific VPN profile or * to allow access to all Clientless VPN
profiles.
Read allowed
Selecting Yes for Web resources allows users to perform Get operations.
Selecting Yes for file resources allows users to download files.
The default is No.
Write allowed
Selecting Yes for Web resources allows users to perform Put, Get, and Delete operations.
Selecting Yes for file resources allows users to upload and delete files.
The default is No.
Table D-54
Simple Rule Properties—General tab (Continued)
Field
Description
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...