
442
Enabling remote access with clientless VPN
Using the Remote Access Tunnel Wizard to set up clientless VPN connections
To enable reverse proxy translation for URLs
1
In the SGMI, in the left pane, under Policy, click
Clientless VPN
.
2
In the right pane, on the Translation Rules tab, click
New > URL Translation Rule
.
3
In the URL Translation Rule Properties dialog box, on the General tab, in the URL field, type a URL
or range of URLs for which you want to allow or deny reverse proxy translation.
4
In the Translation area, do one of the following:
■
To allow reverse proxy translation, click
Allow
.
■
To deny reverse proxy translation, click
Deny
.
Related information
For further information related to this topic, see the following:
■
“Host Translation Rule Properties—General tab”
■
“URL Translation Rule Properties—General tab”
■
Using the Remote Access Tunnel Wizard to set up clientless
VPN connections
The security gateway provides the Remote Access Tunnel Wizard, which you can use to simplify
setting up clientless VPN connections. The Remote Access Tunnel Wizard builds connections in a who-
what-how methodology: who is being provided access, to what resource are they provided access, and
how they may access the resource. The who is defined by a rule, the what is defined by resource links,
and the how is defined by a simple rule.
You can use the Remote Access Tunnel Wizard to set up:
■
A Web VPN connection
■
A port forwarder connection
■
A secure network connection
Clientless VPN connection types
The type of connection you need is determined by the type of traffic you are controlling and the
resources that need to be accessed as shown in the following table.
The Remote Access Tunnel Wizard can also be used to build tunnels for Symantec Client VPN users.
Prerequisites
Complete the following tasks before beginning this procedure:
■
“Configuring users for internal authentication”
Table 11-5
Clientless access methods
Access method
Protocols
Resource types
Web VPN
HTTP, HTTPS, HTTP/HTTPS,
File, FTP, Mail
Servers, paths, files (wild cards supported)
Port forwarder
Telnet, TCP, UDP, Outlook, MAPI
Servers, paths, files (wild cards supported)
Secure Network
Connection
VPN
Hosts on the inside interface
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...