Scenario 3: Configuring Local Authorization for Local Users

Silvio and Lisa are authorized to access any resource defined in the ACL of the Default user group because No Authorization is specified as the authorization type of the Guest realm.

In this example, Silvio and Lisa can access only the Web conference server on the internal network because that is the only network resource defined for the Default user group.

Scenario 3: Configuring Local Authorization for Local Users

By slightly altering the configuration discussed previously in the "Scenario for Creating Guest Accounts Using the Local Users List", the administrator can provide local users (Lisa Marth and Silvio Branco) with the same level of access to the internal network resources as either the Sales or the Engineering users. This scenario illustrates the concept of local authorization for local users.

Assume the administrator wants to provide Lisa and Silvio with the same level of access as the Engineer- ing users. To accomplish this, the administrator could perform two procedures:

Change the authorization type of the Guest realm to Local Authorization

Assign the local users Lisa Marth and Silvio Branco to the Remote Engineers group on the Firebox SSL VPN Gateway

To assign local users Lisa Marth and Silvio Branco to the Remote Engineers group on the Firebox SSL VPN Gateway, the administrator performs this procedure:

1Click the Access Policy Manager tab.

2Expand User Groups and then expand Local Users.

3Under Local Users, click the name Lisa Marth and drag her name to Local Group Users underneath the Remote Engineers user group.

4Under Local Users, click the name Silvio Branco and drag his name to Local Group Users

underneath the Remote Engineers user group.

When this procedure is complete, both of the following are true:

Silvio Branco and Lisa Marth can enter the user credential "Guest\Silvio Branco" or "Guest\Lisa Marth" to authenticate to the Guest realm on the Firebox SSL VPN Gateway.

Silvio and Lisa are authorized to access any resource defined in the ACL of the Remote Engineers user group because Local Authorization is specified as the authorization type of the Guest realm.

When Local Authorization is specified, local users receive the authorization associated with the user group on the Firebox SSL VPN Gateway to which they are assigned. They do not receive the authoriza- tion associated with the Default user group on the Firebox SSL VPN Gateway, as is the case when No Authorization is selected for the Guest authentication realm.

172

Firebox SSL VPN Gateway

Page 182
Image 182
WatchGuard Technologies SSL VPN manual Scenario 3 Configuring Local Authorization for Local Users

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.