Troubleshooting

Defining Accessible Networks

In the Accessible Networks field on the Global Cluster Policies tab, up to 24 subnets can be defined. If more than 24 subnets are entered, the Firebox SSL VPN Gateway ignores the additional subnets.

VMWare

If a user logs on to the Secure Access Client from two computers that are running VMWare and VMWare uses the same MAC address for the two computers, the Firebox SSL VPN Gateway does not allow both clients to run simultaneously. The Firebox SSL VPN Gateway uses the MAC address to manage licenses and does not allow more than one client session at a time per MAC address.

ICMP Transmissions

The Firebox SSL VPN Gateway returns a “Request timed out” error message if an ICMP transmission fails for any reason. The Firebox SSL VPN Gateway always sends a standard ICMP packet to the remote desti- nation host when a client tries to ping it. Any client options such as increasing the size of the ICMP pay- load are not recognized by the Firebox SSL VPN Gateway and are not sent to the remote host.

Ping Command

The Firebox SSL VPN Gateway always sends out the same ping command, regardless of the options specified with the ping command from a client computer.

LDAP Authentication

When the Firebox SSL VPN Gateway is configured to use LDAP authentication and authorization, the LDAP group information is not used to automatically populate the group field in the Administration Tool.

End Point Policies

When the Firebox SSL VPN Gateway is evaluating the union of a group’s end point policies, it does not consider the group priorities and therefore might not resolve conflicting policies correctly. The last pol- icy appended in an expression is the policy that takes effect. For example, one group has policy Pro- cessA and another group has policy !ProcessA. If the union of the policies is ProcessA and !ProcessA, the !ProcessA takes effect.

Network Resources

For added network resources, the Firebox SSL VPN Gateway does not recognize the CIDR notation address ipaddress/0. For example, to add a resource group that provides access to all resources, specify 0.0.0.0/0.0.0.0 instead of 0.0.0.0/0.

Kiosk Connections

For kiosk connections, the Firebox SSL VPN Gateway must have a certificate that is signed by a Sun Microsystems trusted Certificate Authority.

Client connections using kiosk mode require the installation of Java Runtime Environment (JRE) 1.4+ on their computer.

Administration Guide

145

Page 155
Image 155
WatchGuard Technologies SSL VPN Defining Accessible Networks, VMWare, Icmp Transmissions, Ping Command, End Point Policies

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.