Configuring Resources for a User Group

To create a file share resource

1Click the Access Policy Manager tab.

2In the right pane, right-clickFile Share Resources, click New File Share Resource, type a name, and click OK.

3In Share Source, type the path to the share source using the form: //server/share.

4In Mount Type, select the file sharing network protocol, either CIFS/SMB or NFS.

Note

CIFS/SMB is the Common Internet File System/Server Message Block network protocol used for file sharing in Microsoft Windows. NFS is the Network File System that allows you to mount a disk partition on a remote computer as if it was on the hard drive on the local computer. NFS is typically used with Linux computers.

5If administrative user credentials are required to mount a CIFS/SMB drive, in User Name, specify the

user name and in Password, type a password. These fields are not enabled for NFS.

All users who access the share have the rights of this user. You might want to create a dummy domain user, like “sslvpn_share” to use for ssl vpn share access.

6In Domain, type the Active Directory domain of the share. This field is not enabled for NFS.

7In Permissions, specify whether you want remote users to have read/write or read-only permissions for the share.

Note

Users can use the FTP protocol to send and receive files to the remote computer.

8Click OK.

To add a share to a group, the share must be added to the kiosk resource first. Then the kiosk resource is dragged and dropped to the group in the left pane.

To remove a share

On the Access Policy Manager tab, in the right-pane, right-click the file share and click Remove.

Configuring kiosk mode

Kiosk mode is configured using kiosk resources that define the network shares and applications users have access to when they log on in kiosk mode. By default, kiosk mode is disabled. To enable it, the resources are configured and then added to user groups. For more information about client connec- tions, see “Working with Client Connections” on page 117.

Kiosk mode is configured on the Access Policy Manager tab and then added to the groups in the left pane.

Note

If the user has general Internet access before making a connection, the user can browse the Internet from the Firefox browser in the Web browser window, unless a network resource is defined that denies access to the Internet.

To create and configure a kiosk resource

1Click the Access Policy Manager tab.

2In the right pane, right-click Kiosk Resources and then click New Kiosk Resource.

Administration Guide

103

Page 113
Image 113
WatchGuard Technologies SSL VPN manual Configuring kiosk mode, To create a file share resource, To remove a share

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.