Creating User Groups

Group resources include:

Network resources that define the networks to which clients can connect.

Application policies that define the applications users can use when connected. In addition to selecting the application, you can further define which networks the application has access to and if any end point policies need to be met when connecting.

File share resources that define which file shares the user can connect to when logged on in kiosk mode.

Kiosk resources that defines how the user can log on, the Web address the user needs, and which file shares and applications the user can use when logged on.

End point resources and policies that define the required and option parameters that must be on the user’s computer when logging on.

If a user belongs to more than one group, group policies are applied to the user based on the group pri- orities set on the Group Priority tab, as described in “Setting the Priority of Groups” on page 106.

Creating User Groups

User groups are created on the Access Policy Manager tab. Multiple user groups can be created and configured. When a new group is created, the properties page appears that allows you to configure the settings for the group. You can also add local groups that are not related to groups on authentication serv- ers. After the settings are complete, resources can be added to the group.

Note

If you create a user group that has more than 127 characters and then delete that user group, it still appears on the Group Priority tab after deletion. To resolve this problem, user group names should have fewer than 127 characters. Any characters over this limit are truncated.

To create a local user group

1Click the Access Policy Manager tab.

2In the left pane, right-click User Groups and then click New Group.

3In Group Name, type a descriptive name for the group, such as “Temp Employees” or “accounting”

and then click OK.

A dialog box for the added group appears.

Note

If you want the group’s properties to be used for authentication obtained from authentication servers, the group name must match the authentication server group name, including case and use of spaces.

4To configure the group, see “Configuring Properties for a User Group” on page 90.

To remove a user group

On the Access Policy Manager tab, in the left-pane, right-click a group and then click Delete.

Administration Guide

89

Page 99
Image 99
WatchGuard Technologies SSL VPN manual Creating User Groups, To create a local user group, To remove a user group

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.