387
Step Remarks
10.
Configuring authentication policies
Optional.
Configure authentication methods and authentication
parameters for an SSL VPN domain.
IMPORTANT:
Local authentication is always enabled. To use other
authentication methods, you must manually enable them.
11.
Optional.
Configure the check items and protected resources for a
security policy. Only user hosts that pass the security
policy's check can access the configured resources.
IMPORTANT:
To perform security check for user hosts, you must also
enable security check in the domain policy.
12.
Customizing the SSL VPN user interface
Optional.
Customize service interfaces for SSL VPN users.
Configuring the SSL VPN service
Before you configure the SSL VPN service, go to
Certificate Management
to configure a PKI domain and
get a certificate for the SSL VPN gateway. An administrator or user uses the certificate to authenticate the
SSL VPN gateway to avoid logging in to an invalid SSL VPN gateway. For more information about
certificates, see "Managing certificates."
1.
Select
VPN
>
SSL VPN
>
Service Management
from the navigation tree to enter the service
management page.
Figure 389
Service management
2.
Configure the SSL VPN service information as described in
3.
Click
Apply
.
Table 164
Configuration items
Item Description
Enable SSL VPN
Select the box before this item to enable the SSL VPN service.
Port
Specify the port for providing the SSL VPN service. The default port number is
443.
PKI Domain
Select a PKI domain for the SSL VPN service.
Содержание MSR SERIES
Страница 17: ...xv Documents 835 Websites 835 Conventions 836 Index 838 ...
Страница 20: ...3 Figure 3 Initial page of the Web interface ...
Страница 42: ...25 Figure 13 Firefox Web browser setting ...
Страница 59: ...42 Figure 27 Checking the basic service configuration ...
Страница 73: ...56 Figure 35 Sample interface statistics ...
Страница 156: ...139 Figure 139 Rebooting the 3G modem ...
Страница 168: ...151 Figure 152 Configuring Web server 2 ...
Страница 174: ...157 Figure 158 Configure the URL filtering function ...
Страница 187: ...170 Upon detecting the Land or Smurf attack on Ethernet 0 2 Router outputs an alarm log and drops the attack packet ...
Страница 242: ...225 Figure 233 Enabling the DHCP client on interface Ethernet 0 1 ...
Страница 247: ...230 Figure 236 The page for configuring an advanced IPv4 ACL ...
Страница 255: ...238 Figure 241 Advanced limit setting ...
Страница 298: ...281 e Click Apply 2 Configure Router B in the same way Router A is configured ...
Страница 354: ...337 Figure 339 Configuring a login control rule so Host B cannot access Router through the Web ...
Страница 400: ...383 Figure 387 Verifying the configuration ...
Страница 405: ...388 ...
Страница 523: ...506 Figure 530 Ping configuration page ...
Страница 538: ...521 a Click Device A on the topology diagram b Click Ethernet 0 2 on the panel diagram c Click Port Guard ...
Страница 744: ...727 Verifying the configuration In the case that the IP network is unavailable calls can be made over PSTN ...
Страница 775: ...758 Figure 785 Configuring a jump node ...
Страница 791: ...774 Figure 801 Configuring a jump node ...