457
Enabling remote access with clientless VPN
Identifying resources with URLs
Mail resources
Clientless VPN can control access to mail resources. These resources are configured and accessed in
rules using the following URL syntax:
The protocol is mail. The port is entered only if it is not the default IMAP port (143).
Note:
Users typically do not enter their user name and password because this information can be
automatically inserted by clientless VPN.
The following table shows an example of a mail URL resource.
Using a Microsoft Outlook client
The security gateway supports connections to a Microsoft Exchange server using Microsoft Outlook
client.
Note:
Using the Microsoft Outlook resource URL automatically launches the Microsoft Outlook client
when a session is active.
This feature allows users to connect to Microsoft Exchange servers behind the security gateway
without reconfiguring Microsoft Outlook. This resource uses the following URL syntax:
protocol://host name
The protocol is always outlook. The host name is the fully qualified domain name or IP address of the
host computer.
The following table shows an example of an Outlook resource.
MAPI
The security gateway supports connections to a Microsoft Exchange Server using an Outlook client.
This feature lets users connect to Microsoft Exchange servers behind the security gateway without
reconfiguring Microsoft Outlook. MAPI (Mapping Application Programming Interface) resources use
the following URL syntax:
protocol://hostname
Basic
protocol://host
Advanced
protocol://username:password@host:port/mailbox
Table 11-11
mail://mail.symantecdomain.com
URL
Example
protocol
host
mail.symantecdomain.com
Table 11-12
outlook://exchange.symantecexample.com
URL
Example
protocol
outlook
host
exchange.symantecexample.com
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...