Configuring Resources for a User Group

You can further restrict access by specifying a port and protocol for an IP address/subnet pair. For example, you might specify that a resource can use only port 80 and the TCP protocol.

When you configure resource group access for a user group, you can allow or deny access to any resource group. This enables you to exclude a portion of an otherwise allowed resource. For example, you might want to allow a user group access to 10.20.10.0/24 but deny that user group access to 10.20.10.30. Deny rules take precedence over allow rules.

The easiest method to provide all user groups with access to all network resources is to not create any resource groups and to disable the Deny Access without ACL option on the Global Cluster Policies tab. All user groups then have access to the accessible networks listed on the Global Cluster Policies tab.

If you have one or more user groups that should have access to all network resources, a shortcut to adding each resource group to those user groups is to create a resource group for 0.0.0.0/ 0.0.0.0 and allow that one resource group for those user groups. For all other user groups, you will need to allow or deny individual resource groups as needed.

To create and configure a network resource

1Click the Access Policy Manager tab.

2In the right pane, right-click Network Resources and then click New Network Resource.

3Type a name for the group and click OK.

4In Network/Subnet, type the IP address/subnet pair for the resource in the Subnets field. You can use CIDR notation for the mask. Use a space to separate entries.

5In Port or port range, enter the port or ports that the Firebox SSL VPN Gateway can use to establish connections with the network resource(s). You have these options when entering ports:

Enter a 0 (zero) to use all ports.

Enter a single port or multiple ports that are not in a range. If you enter multiple ports, separate each port with a comma. For example, to allow connections on ports 22, 80, and 8088, enter:

22, 80, 8080

Enter a range of ports. Separate the starting and ending ports in the range with a hyphen (-). For example, to allow connections on any port from 110 through 120, enter:

110-120

You can also enter a combination of single ports and a port range. For example, to allow connections

on ports 22, 80, 8088 and 110 through 120, enter:

22, 80, 8080, 110-120

6In Protocol, select the protocols that can be used to establish connections on the specified ports.

7Click OK.

Allowing and Denying Network Resources and Application Policies

By default, all network resources and application policies are allowed. When you deny one resource group, all other resource groups are denied automatically and the network access for the user group is controlled only through its ACL.

The Firebox SSL VPN Gateway interprets allow or deny as follows:

The Firebox SSL VPN Gateway denies access to any network resource or application policy that is not explicitly allowed. Thus, if you want to provide a particular user group with access to only one resource group, you allow access only to that resource group.

100

Firebox SSL VPN Gateway

Page 110
Image 110
WatchGuard Technologies SSL VPN manual To create and configure a network resource, 22, 80

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.