436
Enabling remote access with clientless VPN
Using portal pages to customize the user experience
7
Optionally, do the following:
■
To save your configuration and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
8
After creating your resource group, you can make it available to remote users on a portal page.
Related information
For further information related to this topic, see the following:
■
“Resource Group Properties—General tab”
■
“Adding resource links to portal pages”
Adding resource links to portal pages
To display the resources on the remote user’s portal page, you must add the resource to a portal page
that is used by the remote user’s role.
Prerequisites
Complete the following tasks before beginning this procedure:
■
■
“Creating resource QuickLinks”
To add a resource link to a portal page
1
In the SGMI, in the left pane, under Assets, click
Portal Pages
.
2
In the right pane, on the Portal Pages tab, select the portal page you created, and then click
Properties
.
3
In the Portal Page Properties dialog box, on the General tab, click
Add
.
4
In the Resource Name or Resource Group table, select the resource or resource group that you want
to add, and then click
OK
.
5
Verify that the resource or resource group appears in the Resources list, and then click
OK
.
6
Repeat steps
through
to add more resource links.
7
Optionally, do one of the following:
■
To save your configuration and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“Portal Page Properties—General tab”
■
“Portal Page Properties—Resource/Resource Group Selection dialog box”
■
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...