Configuring Resources for a User Group

To add an application policy to a group

1On the Access Policy Manager tab, in the right-pane, under Application Policies, click the resource you want to add and then drag it to the user group in the left pane.

2To allow or deny access, right-click the network resource and then click Allow or Deny.

When an application policy is created and then added to a user group, the application can use only the specified network path and end point policy. This does not prevent other applications from using these resources. To prevent applications from using these network resources, you can deny access to the net- work.

To deny applications without policies

1On the Access Policy Manager tab, right-click a user group and click Properties.

2On the General tab, under Application options, select Deny applications without policies. You can deny one application access to the network, while allowing access to all other applications.

A user can get access with this application to all internal networks that were assigned to that user, but the application is denied access to the denied network.

You can also deny all applications access to the network, but allow one to have restricted access to a specific network path. The procedure is the same as “To deny one application network access”. The dif- ference is instead of clearing the check box Deny applications without policies, it is selected. This check box denies all applications access to the corporate network. To allow one application network access, configure the application policy to accept the application, following the steps in the previous procedure.

Users obtain access to the application only to the internal site that is specifically allowed. No other appli- cations from the client computers are allowed access to the internal network.

To deny one application network access

1On the Access Policy Manager tab, right-click a user group and click Properties.

2On the General tab, under Application Options, select Deny applications without policies.

3Click OK and close the Properties dialog box.

4In the right pane, right-click Application Policies and then click New Application Policy.

5Type a name for the policy and click OK.

6Under Application Resource, in Application, type the application name. When this field is

complete, the MD5 field is populated automatically.

To restrict the application to a specific network path, under Network Resources, click a network resource and drag and drop it on Application Network Policies.

Other configured network resources must already be added to a user group and set to deny. To do so, in the left pane, under Network Policies in the group, right-click a network resource and click Deny. Click OK.

7Click OK.

8Click the application policy and drag it to the user group to which it applies.

Configuring file share resources

When a user connects from a public computer, the Firebox SSL VPN Gateway opens a kiosk mode con- nection. The network shares available to the user are configured on the Access Policy Manager tab.

102

Firebox SSL VPN Gateway

Page 112
Image 112
WatchGuard Technologies SSL VPN manual Configuring file share resources, To add an application policy to a group

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.