460
Enabling remote access with clientless VPN
Identifying resources with URLs
User Datagram Protocol (UDP) port forwarding
The security gateway supports remote UDP (User Datagram Protocol) port forwarding. This feature
lets users connect to any UDP resource (for example, application or applet) behind the security
gateway without reconfiguring the application client.
The UDP port forwarding feature changes the host files on the remote user’s computer. Therefore,
only users who have permission to modify the host files on their computer (client) can access a UDP
resource. The following clients can access UDP resources using the security gateway:
■
Microsoft Windows 2000 or XP with FAT or FAT derivative partitions
■
Microsoft Windows 200 or XP with administrator rights and NTFS
■
Apple MAC OS X
Resource links can be configured from the Portal tab to automatically start when the user signs on.
Autostart is particularly useful for mail applications.
UDP is a basic resource and uses the following syntax:
protocol://hostname:port
The protocol is always udp. The host name can be either the fully qualified domain name or the IP
address of the host computer. The port is required.
The following table shows an example of a UDP resource.
Secure Network Connection
The security gateway supports Secure Network Connection (SNC) connections. VPN is a basic resource
and uses the following syntax:
protocol://VPN_Profile
The protocol is always vpn. The administrator must configure the VPN profile using the SGMI on the
security gateway.
The following table shows an example of an SNC URL.
Table 11-18
udp://sales.symantecexample.com:200
URL
Example
protocol
udp
host
sales.symantecexample.com
port
200
Table 11-19
vpn://ITAdmins
URL
Example
protocol
vpn
VPN Profile
ITAdmins
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...