Scenario 2: Creating Guest Accounts Using the Local Users List

5In the left pane, click the "Email server" network resource you just created and drag it to Application Network Policies listed under Application Constraints in the right pane. Click OK.

6In the left pane, expand both the "Remote Sales" user group and the "Remote Engineers" user group.

7In the right pane, under Application Policies, click the "Email Application Policy" and drag it to Application Policies under the Remote Sales user group in the left pane, so that the Application Policy is part of the Remote Sales ACL.

8In the right pane, under Application Policies, click the "Email Application Policy" and drag it to Application Policies under the Remote Engineers user group in the left pane, so that the Application Policy is part of the Remote Engineers ACL.

Note

In the procedure above, the administrator could also add an application end point policy to the application policy to require every client device to meet specific requirements when accessing the email server. For more information, see “Application policies” on page 101.

This procedure concludes the scenario for configuring LDAP authentication and authorization. When this procedure is complete, the administrator has configured all of the following:

Users can authenticate to the LDAP directory specified in the Default authentication realm using their LDAP directory credentials.

Users are authorized to access the internal network resources based on their group memberships in the LDAP directory and on the Firebox SSL VPN Gateway.

Only users who are members of the "Remote Sales" group and the "Remote Engineers" group are authorized to access resources on the internal network. (Each of these groups must exist both in the LDAP directory and on the Firebox SSL VPN Gateway.)

Users in the "Remote Sales" group are authorized to access the Web conference server and file servers in the 10.10.0.0/24 network and the Sales Web application in the 10.60.10.0/24 network.

The Sales users can access the email application on the server with the 10.10.25.50 IP address, but cannot access the email application on other email servers in the allowed networks.

The Sales users can also access other network resources located in the two allowed networks.

Users in the "Remote Engineering" group can access the Web conference server and the file servers in the 10.10.0.0/24 network (and other network resources located in this network).

The Engineering users can also access the email application on the server with the 10.10.25.50 IP address, but cannot access the email application on other email servers in the allowed networks. To understand the purpose of local users on the Firebox SSL VPN Gateway and to understand how to enable authentication and authorization for the local users, continue to “Scenario 2: Creating Guest Accounts Using the Local Users List” on page 169.

Scenario 2: Creating Guest Accounts Using the Local Users List

This example illustrates how local users work on the Firebox SSL VPN Gateway and shows one way in which an administrator can support authentication and authorization for the local users.

In the previous example, users were authenticated and authorized based on their LDAP directory cre- dentials and group memberships.

Administration Guide

169

Page 179
Image 179
WatchGuard Technologies SSL VPN manual Administration Guide 169

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.