Scenario 2: Creating Guest Accounts Using the Local Users List

An administrator can also create a list of local users on the Firebox SSL VPN Gateway and configure the Firebox SSL VPN Gateway to provide authentication and authorization services for these users. This list of local users is maintained in a database on the Firebox SSL VPN Gateway and not in an external direc- tory.

Local users are especially useful if the administrator wants to do any of the following:

Grant access to users who are not listed in any corporate directory

Grant access to users who are listed in a corporate directory to which the Firebox SSL VPN Gateway does not connect

Provide a small number of users with a special level of access to the internal network resources without creating a new group in the corporate directory for these users

This example assumes the following:

Silvio Branco and Lisa Marth are consultants that do not work for the corporation and are not listed in the corporate directory

Silvio Branco and Lisa Marth must have remote access to the Web conference server on the internal network to participate in conferences with the Sales and Engineering users who are employed by the corporation

The administrator has already completed the previous LDAP authentication with LDAP authorization example scenario earlier in this chapter to provide Sales and Engineering users with access to the Web conference server

The Web conference server IP address is 10.10.50.60

Note

In this example, Silvio Branco and Lisa Marth are referred to as guest users because they are not employed by the corporation and are not listed in the corporate directory.

To provide Silvio Branco and Lisa Marth with access to the Web conference server, the administrator per- forms these three procedures:

Creates a guest user authentication realm

Creates local users

Creates and assigns a network resource to the Default user group on the Firebox SSL VPN Gateway

Creating a Guest User Authentication Realm

Creating a guest user authentication realm is the first of three procedures the administrator performs in the scenario for creating guest accounts using the Local Users list.

In the previous scenario for configuring LDAP authentication and authorization, the administrator cre- ated a Default authentication realm to support authentication and authorization of the users listed in a corporate LDAP directory.

Because Silvio Branco and Lisa Marth are not listed in the corporate LDAP directory, the administrator creates a separate authentication realm for them that supports the following:

Local Authentication. This option in an authentication realm ensures that users are authenticated against a Local Users list on the Firebox SSL VPN Gateway, and not an external directory

No Authorization. This option in an authentication realm ensures that users of this realm are provided with the access levels associated with the Default user group on the Firebox SSL VPN Gateway.

170

Firebox SSL VPN Gateway

Page 180
Image 180
WatchGuard Technologies SSL VPN manual Creating a Guest User Authentication Realm

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.