
416
Enabling remote access with clientless VPN
Using rules to allow or deny clientless VPN access
Simple rule syntax
You can specify most fields of the Simple Rule Properties dialog box as patterns that must match the
corresponding part of the URL. Simple rules patterns use two special characters as noted in
.
Note:
Clientless VPN users need to match either the fully-qualified domain name or the IP address in
the host field. Reverse lookups are disabled by default. To enable reverse lookups, check the Enable
expanded DNS lookups option on the Asset Parameters page.
See
“Configuring clientless VPN logon policy”
Examples of simple rules
The following examples show simple rules in the clientless VPN rules table.
Typically, the path element is used to control access and therefore the examples below demonstrate
variations of the path element. Other elements, such as host name, can be formulated using similar
methods.
Figure 11-1
Clientless VPN rules table
Example 1
SimpleAllow1 is a rule for all Web resources that are not secure on host www.symantecexample.com.
Since the wildcard (*) was typed in the path field, this rule allows access to any URL beginning http://
www.symantecexample.com/.
The following URLs match SimpleAllow1:
■
http://www.symantecexample.com
■
http://www.symantecexample.com/companyinfo/techsupport.html
■
http://www.symantecexample.com/product/product/Symantec.pdf
Table 11-1
Simple rule regular expression special characters
Character
Description
Example
*
Matches zero or more characters within a
string.
sa*e
Matches: sae, safe, safffe, save, savvasdeeeee.
?
Matches exactly one character within a
string.
sa?e”
Matches: saae, sase, sa1e, sa_e, sa4e
but does not match sae, safffffe.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...