ProSecure Unified Threat Management (UTM) Appliance

2.Create authentication domains, user groups, and user accounts (see Configure Domains, Groups, and Users on page 362)

a.Create one or more authentication domains for authentication of SSL VPN users.

When remote users log in to the UTM, they need to specify a domain to which their login account belongs. The domain determines the authentication method that is used and the portal layout that is presented, which in turn determines the network resources to which the users are granted access. Because you need to assign a portal layout when creating a domain, the domain is created after you have created the portal layout.

b.Create one or more groups for your SSL VPN users.

When you define the SSL VPN policies that determine network resource access for your SSL VPN users, you can define global policies, group policies, or individual policies. Because you need to assign an authentication domain when creating a group, the group is created after you have created the domain.

c.Create one or more SSL VPN user accounts.

Because you need to assign a group when creating an SSL VPN user account, the user account is created after you have created the group.

3.For port forwarding, define the servers and services (see Configure Applications for Port Forwarding on page 363).

Create a list of servers and services that can be made available through user, group, or global policies. You can also associate fully qualified domain names (FQDNs) with these servers. The UTM resolves the names to the servers using the list you have created.

4.For SSL VPN tunnel service, configure the virtual network adapter (see Configure the SSL VPN Client on page 365).

For the SSL VPN tunnel option, the UTM creates a virtual network adapter on the remote computer that then functions as if it were on the local network. Configure the portal’s SSL VPN client to define a pool of local IP addresses to be issued to remote clients, as well as DNS addresses. Declare static routes or grant full access to the local network, subject to additional policies.

5.To simplify policies, define network resource objects (see Use Network Resource Objects to Simplify Policies on page 369).

Network resource objects are groups of IP addresses, IP address ranges, and services. By defining resource objects, you can more quickly create and configure network policies.

6.Configure the SSL VPN policies (see Configure User, Group, and Global Policies on page 371).

Policies determine access to network resources and addresses for individual users, groups, or everyone.

Virtual Private Networking Using SSL Connections

358

Page 358
Image 358
NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual 358