
245
Limiting user access
Configuring users for internal authentication
4
On the Authentication tab, do the following:
5
Click
OK
.
6
Optionally, do one of the following:
■
To save your configuration now and activate later, on the tool bar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
7
After creating a user account, you can use it in the following ways:
■
Add it to a user group
■
Make the user account IKE-enabled
■
Add it to a rule for authentication
■
Use it as the basis for a clientless VPN role
Related information
For further information related to this topic, see the following:
■
“User Account Properties—General tab”
■
“User Account Properties—Authentication tab”
■
“Configuring user groups for internal and external authentication”
■
“Creating an IKE-enabled user”
■
“Adding authentication to rules”
■
“Using roles to assign rules to users”
Creating an IKE-enabled user
To use a user as the remote endpoint of a Client VPN tunnel, the user must be IKE-enabled.
Prerequisites
Complete the following task before beginning this procedure:
■
“Configuring users for internal authentication”
To create an IKE-enabled user
1
In the SGMI, in the left pane, under Assets, click
Users
.
2
In the right pane, on the Network Users tab, select the user you want to use in a Client VPN tunnel,
and then click
Properties
.
Last name
Type the last name of the user.
Caption
Type a brief description of the user.
Password
Type a password for the new user.
Confirm Password
Type the user password again to confirm the password you entered in the
Password text box.
Account expiration date
Click the calendar button and select the time and date on which you want the
user account to expire.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...