Configuring Resources for a User Group

Kiosk resources that define how the user can log on and which file shares and applications are accessible to the user when logged on. If the user is allowed to use the Firefox Web browser in kiosk mode, the Web address the user is allowed to use is also defined.

End point resources and policies that define the required and optional parameters that must be on the user’s computer when logging on.

If a user belongs to more than one group, group policies are applied to the user based on the group pri- orities set on the Group Priority tab, as described in “Setting the Priority of Groups”.

Adding Users to Multiple Groups

When a user is a member of multiple groups, some group settings are unioned together. These settings are:

Network Resources

Application Policies

Kiosk Resources

End Point Policies

Settings that are not unioned are based on group priority. These include:

Authenticating after network interruption or on system resume

Enabling single sign-on

Running logon scripts

Session time-out

Split DNS

Portal page authentication

Exceptions to the unionized settings are:

Deny applications without policies. If any of the groups that a user is a member of has the Deny applications without policies check box selected, the user inherits that setting.

IP pooling. Users assume the IP address from the highest priority group that has IP pools enabled.

Inherit Default group settings. If any of the groups that a user is a part of has the Inherit properties from the Default Group check box selected, the user inherits that setting.

Allowing and denying network resources and application policies

By default, all network resources and application policies are allowed. When you deny one resource group, all other resource groups are denied automatically and the network access for the user group is controlled only through its ACL.

The Firebox SSL VPN Gateway interprets allow or deny as follows:

The Firebox SSL VPN Gateway denies access to any network resource or application policy that is not explicitly allowed. Thus, if you want to provide a particular user group with access to only one resource group, you allow access only to that resource group.

Deny rules take precedence over allow rules. This enables you to allow access to a range of resources and to also deny access to selected resources within that range. For example, you might want to allow a group access to a resource group that includes 10.20.10.0/24, but need to deny that user group access to 10.20.10.30. To handle this, you create a resource group that includes 10.20.10.30. Access to that resource is denied unless you specifically allow it.

98

Firebox SSL VPN Gateway

Page 108
Image 108
WatchGuard Technologies SSL VPN manual Adding Users to Multiple Groups

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.