
421
Enabling remote access with clientless VPN
Using rules to allow or deny clientless VPN access
Adding advanced rules
Advanced rules contain attributes that allow remote users to access multiple resources or multiple
protocols. If several resource protocols on the same host are defined by the same rule, only the
attributes that apply to the resource protocol are used to structure the users’ access privilege to each
resource.
Note:
You may want to create access links for the resources that are identified in the advanced rule
when you create your portal pages. This way, when the remote user assigned to the rule logs on, a link
to the resource is immediately available.
Prerequisites
None
To add an advanced rule
1
In the SGMI, in the left pane, under Policy, click
Clientless VPN
.
^
/dir/subdir.*$
Matches the string
/dir/subdir followed by
anything.
/dir/subdir
/dir/subdir/
/dir/subdirertory
/dir/subdir/subsubdir
/dir/subdirrrrrrrrrrrrrrrr
dir/subdi, dir/subdir
^
/dir/subdir/.*$
Matches the string
/dir/subdir/ followed by
anything.
/dir/subdir/
/dir/subdir/sub/sub/subdir
/dir/subdir/text.txt
dir, /dir, /subdir/test/
^
.+$
Matches one or more
characters (does not match a
blank path “ ”).
a
/
/dir
“ ” for example, blank
^
.?$
Matches zero or one character. “ ”
a
dir, /dir, subdir/text.pdf
^
/?$
Matches zero or one slash
(this is a good way to specify
top-level directories).
“ ”
/
/dir, /subdir/text.pdf
Table 11-3
Path element variations (Continued)
Path
Description
Examples with possible
path match
Examples with no match
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...