416
Enabling remote access with clientless VPN
Using rules to allow or deny clientless VPN access
Simple rule syntax
You can specify most fields of the Simple Rule Properties dialog box as patterns that must match the
corresponding part of the URL. Simple rules patterns use two special characters as noted in
.
Note:
Clientless VPN users need to match either the fully-qualified domain name or the IP address in
the host field. Reverse lookups are disabled by default. To enable reverse lookups, check the Enable
expanded DNS lookups option on the Asset Parameters page.
See
“Configuring clientless VPN logon policy”
Examples of simple rules
The following examples show simple rules in the clientless VPN rules table.
Typically, the path element is used to control access and therefore the examples below demonstrate
variations of the path element. Other elements, such as host name, can be formulated using similar
methods.
Figure 11-1
Clientless VPN rules table
Example 1
SimpleAllow1 is a rule for all Web resources that are not secure on host www.symantecexample.com.
Since the wildcard (*) was typed in the path field, this rule allows access to any URL beginning http://
www.symantecexample.com/.
The following URLs match SimpleAllow1:
■
http://www.symantecexample.com
■
http://www.symantecexample.com/companyinfo/techsupport.html
■
http://www.symantecexample.com/product/product/Symantec.pdf
Table 11-1
Simple rule regular expression special characters
Character
Description
Example
*
Matches zero or more characters within a
string.
sa*e
Matches: sae, safe, safffe, save, savvasdeeeee.
?
Matches exactly one character within a
string.
sa?e”
Matches: saae, sase, sa1e, sa_e, sa4e
but does not match sae, safffffe.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...