Dynamic and Static Routing

5In the text box, type a text string that is an exact, case-sensitive match to the authentication string transmitted by the RIP server.

6Select the Enable RIP MD5 Authentication for Interface check box if the RIP server transmits the

authentication string encrypted with MD5.

Do not select this option if the RIP server transmits the authentication string using plain text.

7Click Submit.

Changing from Dynamic Routing to Static Routing

Before you change from dynamic routing to static routing, you may want to save your dynamic routes to the static route table. Selecting this option saves the current RIP dynamic routing information as static routes.

If you change from dynamic routing to static routing, and you previously created static routes, the static routes reappear in the Firebox SSL VPN Gateway routing table.

If these static routes are no longer valid, or if no static routes were created previously, you might lose remote access to the Administration Tool and users could lose access to the internal network resources until you manually configure the static routes.

Saving the current RIP dynamic routing information as static routes when you switch from dynamic routing to static routing allows you to maintain connectivity until you properly configure the static routes.

To save dynamic routes to the static route table

1On the Firebox SSL VPN Gateway Cluster tab, open the window for the appliance.

2 Click the Routes tab.

3Click Save to static routes.

After you save the dynamic route, you can switch to static routing.

Configuring a Static Route

When setting up communication with another host or network, a static route might need to be added from the Firebox SSL VPN Gateway to the new destination if you do not use dynamic routing.

Set up static routes on the Firebox SSL VPN Gateway adapter not being used by the Default Gateway that is specified on the General Networking tab.

For an example static route setup, see “Static Route Example” on page 54.

To add a static route

1Click the VPN Gateway Cluster tab and then click the Routes tab.

2 In Select routing type, select Static Routing.

3Under Add Static Route, in Destination LAN IP Address, type the IP address of the destination local area network.

4In Subnet Mask, type the subnet mask for the gateway device.

5In Gateway, type the IP address for the default gateway. If you do not specify a gateway, the Firebox SSL VPN Gateway can access content only on the local network.

6In Interface, select the network adapter for the static route. The default is eth0.

7 Click Add Static Route.

Administration Guide

53

Page 63
Image 63
WatchGuard Technologies SSL VPN manual Changing from Dynamic Routing to Static Routing, Configuring a Static Route

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.