Configuring Resources for a User Group
100
Firebox SSL VPN Gateway
• You can further restrict access by specifying a port and protocol for an IP address/subnet pair. For
example, you might specify that a resource can use only port 80 and the TCP protocol.
• When you configure resource group access for a user group, you can allow or deny access to any
resource group. This enables you to exclude a portion of an otherwise allowed resource. For
example, you might want to allow a user group access to 10.20.10.0/24 but deny that user group
access to 10.20.10.30. Deny rules take precedence over allow rules.
• The easiest method to provide all user groups with access to all network resources is to not create
any resource groups and to disable the
Deny Access without ACL
option on the
Global Cluster
Policies
tab. All user groups then have access to the accessible networks listed on the
Global
Cluster Policies
tab.
• If you have one or more user groups that should have access to all network resources, a shortcut
to adding each resource group to those user groups is to create a resource group for 0.0.0.0/
0.0.0.0 and allow that one resource group for those user groups. For all other user groups, you will
need to allow or deny individual resource groups as needed.
To create and configure a network resource
1
Click the
Access Policy Manager
tab.
2
In the right pane, right-click
Network Resources
and then click
New Network Resource
.
3
Type a name for the group and click
OK
.
4
In
Network/Subnet
, type the IP address/subnet pair for the resource in the Subnets field. You can
use CIDR notation for the mask. Use a space to separate entries.
5
In
Port or port range
, enter the port or ports that the Firebox SSL VPN Gateway can use to establish
connections with the network resource(s). You have these options when entering ports:
•
Enter a 0 (zero) to use all ports.
•
Enter a single port or multiple ports that are not in a range. If you enter multiple ports, separate each
port with a comma. For example, to allow connections on ports 22, 80, and 8088, enter:
22, 80, 8080
•
Enter a range of ports. Separate the starting and ending ports in the range with a hyphen (-). For
example, to allow connections on any port from 110 through 120, enter:
110-120
•
You can also enter a combination of single ports and a port range. For example, to allow connections
on ports 22, 80, 8088 and 110 through 120, enter:
22, 80, 8080, 110-120
6
In
Protocol
, select the protocols that can be used to establish connections on the specified ports.
7
Click
OK
.
Allowing and Denying Network Resources and Application Policies
By default, all network resources and application policies are allowed. When you deny one resource
group, all other resource groups are denied automatically and the network access for the user group is
controlled only through its ACL.
The Firebox SSL VPN Gateway interprets allow or deny as follows:
•
The Firebox SSL VPN Gateway denies access to any network resource or application policy that is not
explicitly allowed. Thus, if you want to provide a particular user group with access to only one resource
group, you allow access only to that resource group.
Summary of Contents for SSL 1000
Page 1: ...WatchGuard Firebox SSL VPN Gateway Administration Guide Firebox SSL VPN Gateway...
Page 40: ...Using the Firebox SSL VPN Gateway 30 Firebox SSL VPN Gateway...
Page 118: ...Setting the Priority of Groups 108 Firebox SSL VPN Gateway...
Page 146: ...Managing Client Connections 136 Firebox SSL VPN Gateway...
Page 168: ...Generating Trusted Certificates for Multiple Levels 158 Firebox SSL VPN Gateway...
Page 190: ...180 Firebox SSL VPN Gateway...
Page 198: ...188 Firebox SSL VPN Gateway...