419
Enabling remote access with clientless VPN
Using rules to allow or deny clientless VPN access
Related information
For further information related to this topic, see the following:
■
“Simple Rule Properties—General tab”
■
■
■
“Using rule sets to group clientless VPN access rules”
■
“Assigning a rule or rule set to a role”
About advanced rules
An advanced rule identifies a resource or multiple resources and the attributes required to access it.
The attributes vary by resource protocol, and are entered as regular expressions. An advanced rule can
identify one or more resource protocols that are located on the same host.
Note:
Only create advanced rules if you are comfortable using regular expressions. This section is not
intended to teach you how to build regular expressions.
Advanced rule syntax
Regular expressions use a number of special characters to denote different types of matches. To use a
special character in an access rule as a normal character, precede it with a backslash (for example, to
use
?
as a normal character, type \?). Additional regular expression characters besides those shown in
that must be preceded by a backslash are:
The table below shows a commonly used subset of regular expression special characters. Unlike the
simple rule syntax, it is not implied that the beginning and end of an expression must correspond to
the beginning and end of a string.
Advanced rules split the URL elements into several fields. Do not enter the delimiters commonly
inserted between URL elements, except in the case of the path field, where the defining slash (/) is
considered part of the path.
Note:
Clientless VPN users need to match either the fully-qualified domain name or the IP address in
the host field. Reverse lookups are disabled by default. To enable reverse lookups, check the Enable
expanded DNS lookups option on the Asset Parameters page.
See
“Configuring clientless VPN logon policy”
(
)
[
]
{
}
|
\
Table 11-2
Commonly used regular expression characters
Character
Function
^
Match the beginning of a string.
$
Match the end of a string.
.
Match any single character.
*
Match zero or more instances of the character it follows.
+
Match one or more instances of the character it follows.
?
Match zero or one instance of the character it follows.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...