Name Service Providers

Note

IP pooling is configured per groups, as described in “Enabling IP Pooling” on page 94.

Name Service Providers

Name resolution is configured on the Name Service Providers tab. You can specify the following:

DNS Server 1, DNS Server 2, DNS Server 3

These are the IP address of the first, second, and third DNS servers.

DNS suffixes

These are the DNS suffixes of the servers. Each entry in the list is separated by a space. Each entry should follow the format of site.com. Do not precede a suffix with a dot (“.”), such as

.site.com.

By default, the Firebox SSL VPN Gateway checks a user’s remote DNS only. If you want to allow failover to a user’s local DNS, you need to enable split DNS.

WINS Server

This is the IP address of the WINS server.

To have client connections communicate with the WINS Server, the IP address must be manually added to the Accessible Networks list on the Global Cluster Policies tab. For more information, see “Controlling Network Access” on page 56. The IP address must also be added as a network resource on the Access Policy Manager tab and added to the user group(s). For more information, see “Defining network resources” on page 99.

To enable split DNS

1On the Access Policy Manager tab, in the left pane, right-click a group and click Properties.

2On the Networking tab, select Enable split-DNS.

The Firebox SSL VPN Gateway fails over to the local DNS only if the specified DNS servers cannot be contacted, but not if there is a negative response.

To edit the HOSTS file

You can add entries to the Firebox SSL VPN Gateway HOSTS file from the Name Service Providers tab. The Firebox SSL VPN Gateway uses the entries in the HOSTS file to resolve FQDNs to IP addresses. When the Firebox SSL VPN Gateway attempts to translate an FQDN to an IP address, the Firebox SSL VPN Gateway checks its HOSTS file before connecting to DNS to perform the address translation. If the Fire- box SSL VPN Gateway can translate the FQDN to an IP address using the information in the HOSTS file, it does not use DNS to perform the address translation.

You might want to add entries to the HOSTS file in an Firebox SSL VPN Gateway deployment where the network configuration prevents the Firebox SSL VPN Gateway from connecting to DNS to perform address translations. Also, adding entries to the HOSTS file can optimize performance because the Fire- box SSL VPN Gateway does not have to connect to a different server to perform the address translations.

To add an entry to the HOSTS file

1On the Firebox SSL VPN Gateway Cluster tab, open the window for an appliance.

2 Click the Name Service Providers tab.

50

Firebox SSL VPN Gateway

Page 60
Image 60
WatchGuard Technologies SSL VPN manual Name Service Providers, To enable split DNS, To edit the Hosts file

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.