
422
Enabling remote access with clientless VPN
Using rules to allow or deny clientless VPN access
2
In the right pane, on the Clientless VPN Rules tab, click
New > Advanced Rule
.
3
In the Advanced rule Properties dialog box, select the following attributes so remote users can gain
access to multiple resources at log on:
Rule name
Type a name for the advanced rule.
Access
Select one of the following:
■
To create a rule that grants permission, select Allow.
■
To create a rule that specifically denies access to the resource, select Deny.
Network
application(s)
Check the network protocols for which you are creating a rule.
Host
Type an expression that matches the allowed DNS (domain names) or IP addresses.
Port
Type the port number used to access the resource if it is different from the default.
Path
Type an expression that matches the allowed path.
This restricts access to the host.
Query
Type an expression that matches the text after the ? symbol in a Web URL.
User name
Type an expression that matches allowed user names.
Domain
For file resources only, type an expression that matches the domain on which the share
resides.
Share
For file resources only, type an expression that matches the allowed share name of the
file.
Fragment
Type the syntax for matches after the # symbol in a Web URL (also referred to as an
anchor).
VPN Profile
Type the name of a specific VPN profile or .* to allow access to all VPN profiles.
Read allowed
For deny rules only, do one of the following:
■
To let the user read files, select Yes.
■
To prevent all access to the resource, select No.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...