Chapter 26 SSL VPN
ZyWALL USG 300 User’s Guide
520
Available EPS
Objects /
Selected EPS
Objects
Configured endpoint security objects appear on the left. Select the
endpoint security objects to use for this SSL access policy and click the
right arrow button to add them to the selected list on the right. Use the
[Shift] and/or [Ctrl] key to select multiple objects. Select any endpoint
security objects that you want to remove from the selected list and click
the left arrow button to remove them.
The ZyWALL checks authenticated users’ computers against the SSL
access policy’s selected endpoint security objects in the order you list
them here. When a user’s computer matches an endpoint security
object the ZyWALL grants access and stops checking. Select an
endpoint security object and use the up and down arrows to change it’s
position in the list. To make the endpoint security check as efficient as
possible, arrange the endpoint security objects in order with the one
that the most users should match first and the one that the least users
should match last.
SSL Application
List (Optional)
The
Selectable Application Objects
list displays the name(s) of the
SSL application(s) you can select for this SSL access policy.
To associate an SSL application to this SSL access policy, select a name
and click
>>
to add to the
Selected Application Objects
list. You can
select more than one application.
To remove an SSL application, select the name(s) in the
Selected
Application Objects
list and click
<<
.
Network
Extension
(Optional)
Enable Network
Extension
Select this option to create a VPN tunnel between the authenticated
users and the internal network. This allows the users to access the
resources on the network as if they were on the same local network.
Clear this option to disable this feature. Users can only access the
applications as defined by the selected SSL application settings and the
remote user computers are not made to be a part of the local network.
Assign IP Pool
Define a separate pool of IP addresses to assign to the SSL users. Select
it here.
The SSL VPN IP pool cannot overlap with IP addresses on the ZyWALL's
local networks (LAN and DMZ for example), the SSL user's network, or
the networks you specify in the SSL VPN
Network List
.
DNS/WINS
Server 1..2
Select the name of the DNS or WINS server whose information the
ZyWALL sends to the remote users. This allows them to access devices
on the local network using domain names instead of IP addresses.
Network List
To allow user access to local network(s), select a network name in the
Selectable Address Objects
list and click
>>
to add to the
Selected
Address Objects
list. You can select more than one network.
To block access to a network, select the network name in the
Selected
Address Objects
list and click
<<
.
Table 138
VPN > SSL VPN > Access Privilege > Add/Edit (continued)
LABEL
DESCRIPTION
Summary of Contents for Unified Security Gateway ZyWALL 300
Page 2: ......
Page 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Page 31: ...31 PART I User s Guide ...
Page 32: ...32 ...
Page 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Page 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Page 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Page 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Page 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Page 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Page 221: ...221 PART II Technical Reference ...
Page 222: ...222 ...
Page 288: ...Chapter 11 Registration ZyWALL USG 300 User s Guide 288 ...
Page 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Page 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Page 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Page 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Page 454: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 454 ...
Page 472: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 472 ...
Page 534: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 534 ...
Page 536: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 536 ...
Page 544: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 544 ...
Page 638: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 638 Figure 448 Profiles Protocol Anomaly ...
Page 682: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 682 ...
Page 700: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 700 ...
Page 722: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 722 ...
Page 738: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 738 ...
Page 744: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 744 ...
Page 756: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 756 ...
Page 772: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 772 ...
Page 794: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 794 ...
Page 806: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 806 ...
Page 811: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 811 ...
Page 866: ...Chapter 50 System ZyWALL USG 300 User s Guide 866 ...
Page 873: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 873 ...
Page 886: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 886 ...
Page 916: ...Chapter 54 Packet Flow Explore ZyWALL USG 300 User s Guide 916 ...
Page 918: ...Chapter 55 Reboot ZyWALL USG 300 User s Guide 918 ...
Page 920: ...Chapter 56 Shutdown ZyWALL USG 300 User s Guide 920 ...
Page 948: ...Chapter 58 Product Specifications ZyWALL USG 300 User s Guide 948 ...
Page 1014: ...Appendix A Log Descriptions ZyWALL USG 300 User s Guide 1014 ...
Page 1124: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1124 ...