LDAP Authorization

For Active Directory, the group name specified as cn=groupname is required. The group name that is defined in the Firebox SSL VPN Gateway must be identical to the group name that is defined on the LDAP server.

For other LDAP directories, the group name either is not required or, if required, is specified as ou=groupname.

The Firebox SSL VPN Gateway binds to the LDAP server using the administrator credentials and then searches for the user. After locating the user, the Firebox SSL VPN Gateway unbinds the administrator credentials and rebinds with the user credentials.

5In LDAP Administrator Password, type the password.

6In LDAP Base DN (where users are located), type the Base DN under which users are located. Base DN is usually derived from the Bind DN by removing the user name and specifying the group where users are located. The following are examples of syntax for Base DN: “ou=Users,dc=ace,dc=com”

“cn=Users,dc=ace,dc=com”

7In LDAP Server login name attribute, type the attribute under which the Firebox SSL VPN Gateway should look for user logon names for the LDAP server that you are configuring. The default is cn. If Active Directory is used, type the attribute sAMAccountName.

8In LDAP Group Attribute, type the name of the attribute. The default is “memberOf.” This attribute enables the Firebox SSL VPN Gateway to obtain the groups associated with a user during authorization.

9Click Submit.

Using certificates for secure LDAP connections

You can use a secure client certificate with LDAP authentication and authorization. To use a client certif- icate, you must have an enterprise Certificate Authority, such as Certificate Services in Windows Server 2003, running on the same computer that is running Active Directory. You can create a client certificate using the Certificate Authority.

To use a client certificate with LDAP authentication and authorization, it must be a secure certificate using SSL. Secure client certificates for LDAP are uploaded to the Firebox SSL VPN Gateway.

To upload a secure client certificate for LDAP

1On the VPN Gateway Cluster tab, click the Administration tab.

2Next to Upload Private Key + Client Certificate for LDAP, click Browse.

3 Navigate to the client certificate and click Open.

Determining Attributes in your LDAP Directory

If you need help determining your LDAP Directory attributes, you can easily look them up with the free LDAP Browser from Softerra.

To install and set up the LDAP Browser

1Download the free LDAP Browser application from the Softerra LDAP Administrator Web site http:// www.ldapbrowser.com.

2Install LDAP Browser and open it.

3From the LDAP Browser window, choose File > New Profile and specify the following settings:

78

Firebox SSL VPN Gateway

Page 88
Image 88
WatchGuard Technologies SSL VPN Using certificates for secure Ldap connections, To install and set up the Ldap Browser

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.