441
Enabling remote access with clientless VPN
Using reverse proxy translation
Prerequisites
Complete the following tasks before beginning this procedure:
■
“Creating a single sign-on rule”
To delete user sign-on information
1
Sign on to clientless VPN.
2
On the clientless VPN home page, click
Account Administration.
3
On the Account Administration page, click
Delete Single Sign-on Information
.
4
Click
Remove.
5
To confirm, click
OK
.
Related information
For further information related to this topic, see the following:
■
“Creating and assigning roles”
■
“Configuring clientless VPN logon policy”
Using reverse proxy translation
The security gateway can use reverse proxy operations to convert or rewrite resource host names or
URLs with the security gateway’s address instead of the actual network host or URL.
Prerequisites
None
Enable reverse proxy translation for hosts or for URLs
Host translation rules enable reverse proxy translation based on host name. URL translation rules
enable reverse proxy translation based on the resource URL.
To enable reverse proxy translation for hosts
1
In the SGMI, in the left pane, under Policy, click
Clientless VPN
.
2
In the right pane, on the Translation Rules tab, click
New > Host Translation Rule
.
3
In the Host Translation Rules Properties dialog box, on the General tab, in the Host name field,
type a host name or range of host names for which you want to allow or deny reverse proxy
translation.
4
In the Translation area, do one of the following:
■
To allow reverse proxy translation, click
Allow
.
■
To deny reverse proxy translation, click
Deny
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...