Configuring Resources for a User Group

Deny rules take precedence over allow rules. This enables you to allow access to a range of resources and to also deny access to selected resources within that range. For example, you might want to allow a group access to a resource group that includes 10.20.10.0/24, but need to deny that user group access to 10.20.10.30. To handle this, you create two network resources; one that includes the 10.20.10.0/24 subnet and a group that includes 10.20.10.30. Access to that resource is denied unless you specifically allow it.

To add a network resource to a group

1On the Access Policy Manager tab, in the right-pane, under Network Resources, click the resource you want to add and then drag it to the user group in the left pane.

2To allow or deny access, right-click the network resource and then click Allow or Deny.

To remove a network resource

1Click the Access Policy Manager tab.

2In the right pane, under Network Resources, right-click the resource group you want to remove.

3Click Remove.

Application policies

Application policies put constraints on the network path applications can access. For example, a user is using Microsoft Outlook 2003 for corporate email. You can configure the application to use a specific network resource to the Microsoft Exchange Server. When the network resource is defined, when Out- look tries to start, it checks for the network resource and end point policy (if defined). If it passes, the user can log on and check email. If it fails, Outlook does not start.

If the application is open before connecting to the Firebox SSL VPN Gateway, the application remains open; however, the policies take effect and the user cannot use the application.

If an application policy does not have a network resource or end point policy configured, and if the checkbox Deny applications without policies is selected on the General tab of the group properties, the application is denied access to the network.

To configure an application policy

1Click the Access Policy Manager tab.

2In the right pane, right-click Application Policies and then click New Application Policy.

3In Application, type the name of the application or click Browse to navigate to the application.

The MD5 field is populated automatically with the binary sum of the application.

4To restrict the application to specific networks or require an end point policy, under Application Constraints do one or both of the following:

To add a network resource to the application policy, under Network Resources, click the resource and drag it to Application Network Policies.

To add an end point policy to the application policy, under End Point Policies, click the policy and drag it to Application End Point Policies.

5Click OK.

When a user disconnects from the Firebox SSL VPN Gateway, any applications that are open can be closed automatically.

Administration Guide

101

Page 111
Image 111
WatchGuard Technologies SSL VPN Application policies, To add a network resource to a group, To remove a network resource

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.