Scenario 1: Configuring LDAP Authentication and Authorization

This task includes these five procedures:

Configuring accessible networks

Creating an LDAP authentication realm

Creating the appropriate groups on the Firebox SSL VPN Gateway

Creating and assigning network resources to the user groups

Creating an application policy for the email server

Each of these procedures is discussed in detail below.

Configuring Accessible Networks

Configuring accessible networks is the first of five procedures the administrator performs to configure access to the internal network resources in the configuring LDAP authentication and authorization scenario.

In this procedure, the administrator specifies the internal networks that contain the network resources that users must access using the Secure Access Client.

In the previous task, the administrator determined that the remote Sales and Engineering users must have access to the resources on these specific internal networks:

The Web conference server, file servers, and email server residing in the network 10.10.0.0/24

The server containing the Sales Web application residing in the network 10.60.10.0/24

The administrator specifies these networks as accessible networks. Specifying the accessible networks enables the Secure Access Client to support split tunneling.

When a user logs on to the Firebox SSL VPN Gateway, the Firebox SSL VPN Gateway sends this list of networks to the Secure Access Client on the user's computer. The Secure Access Client uses this list of networks as a filter to determine which outbound packets should be sent to the Firebox SSL VPN Gateway and which should be sent elsewhere. The Secure Access Client transmits only the packets bound for the Firebox SSL VPN Gateway through the secure tunnel to the Firebox SSL VPN Gateway.

Note

If you do not want to support split tunneling, you do not need to configure accessible networks.

To configure accessible networks

1Open the Administration Tool.

2Click the Global Cluster Policies tab.

3If necessary, select Enable split tunneling.

4In the Accessible networks box, enter all of the internal networks that the Firebox SSL VPN Gateway must access. Separate each network entered with a space or a carriage return. In this example access scenario, the administrator would make these entries:

10.10.0.0/24

10.60.10.0/24

5Select the Enable logon page authentication check box. This setting requires users to authenticate when accessing the portal page of the Firebox SSL VPN Gateway with a Web browser.

6To simplify this example, assume the administrator clears all other check boxes that appear on the Global Cluster Policies tab.

For more information about split tunneling, see “Enabling Split Tunneling” on page 57.

For more information about the Deny Access without ACL setting, see “Denying Access to Groups without an ACL” on page 58.

164

Firebox SSL VPN Gateway

Page 174
Image 174
WatchGuard Technologies SSL VPN manual Configuring Accessible Networks, To configure accessible networks

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.