Page 661 / 944 Scroll up to view Page 656 - 660
Chapter 43 SSL Application
ZyWALL USG 50 User’s Guide
661
2
Click the
Add
button and select
Web Application
in the
Type
field.
In the
Server Type
field, select
Web Server
.
Enter a descriptive name in the
Display Name
field. For example,
“CompanyIntranet”.
In the
Address
field, enter “http://info”.
Select
Web Page Encryption
to prevent users from saving the web content.
Click
Apply
to save the settings.
The configuration screen should look similar to the following figure.
Figure 376
Example: SSL Application: Specifying a Web Site for Access
43.2
The SSL Application Screen
The main
SSL Application
screen displays a list of the configured SSL application
objects. Click
Configuration > Object > SSL Application
in the navigation
panel.
Figure 377
Configuration > Object > SSL Application
Page 662 / 944
Chapter 43 SSL Application
ZyWALL USG 50 User’s Guide
662
The following table describes the labels in this screen.
43.2.1
Creating/Editing a Web-based SSL Application Object
A web-based application allows remote users to access an application via standard
web browsers.
To configure a web-based application, click the
Add
or
Edit
button in the
SSL
Application
screen and select
Web Application
in the
Type
field to display the
configuration screen as shown.
Figure 378
Configuration > Object > SSL Application > Add/Edit: Web Application
Table 205
Configuration > Object > SSL Application
LABEL
DESCRIPTION
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click
Edit
to be able to modify the
entry’s settings.
Remove
To remove an entry, select it and click
Remove
. The ZyWALL confirms you
want to remove it before doing so.
Object
Reference
s
Select an entry and click
Object Reference
s to open a screen that shows
which settings use the entry. See
Section 11.3.2 on page 230
for an example.
#
This field displays the index number.
Name
This field displays the name of the object.
Address
This field displays the IP address/URL of the application server or the location
of a file share.
Type
This field shows whether the object is a file-sharing, web-server, Outlook Web
Access, Virtual Network Computing, or Remote Desktop Protocol SSL
application.
Page 663 / 944
Chapter 43 SSL Application
ZyWALL USG 50 User’s Guide
663
The following table describes the labels in this screen.
Table 206
Configuration > Object > SSL Application > Add/Edit: Web Application
LABEL
DESCRIPTION
Show Advance
Settings / Hide
Advance
Settings
This displays for VNC or RDP type web application objects. Click this
button to display a greater or lesser number of configuration fields.
Create new
Object
Use this to configure any new settings objects that you need to use in
this screen.
Object
Type
Select
Web Application
from the drop-down list box.
Web
Application
Click
Advanced
to display more configuration fields and edit the details
of your SSL application setup. Click
Basic
to display fewer fields.
Server Type
Specify the type of service for this SSL application.
Select
Web Server
to allow access to the specified web site hosted on
the local network.
Select
OWA
(Outlook Web Access) to allow users to access e-mails,
contacts, calenders via Microsoft Outlook-like interface using supported
web browsers. The ZyWALL supports one OWA object.
Select
VNC
to allow users to
manage LAN computers that have Virtual
Network Computing remote desktop server software installed.
Select
RDP
to allow users to manage LAN computers that have Remote
Desktop Protocol remote desktop server software installed.
Select
Weblink
to create a link to a web site that you expect the SSL
VPN users to commonly use.
Name
Enter a descriptive name to identify this object. You can enter up to 31
characters (“0-9”, “a-z”, “A-Z”, “-” and “_”). Spaces are not allowed.
URL
This field displays if the
Server Type
is set to
Web Server
,
OWA
, or
Weblink
.
Enter the Fully-Qualified Domain Name (FQDN) or IP address of the
application server.
Note: You must enter the “http://” or “https://” prefix.
Remote users are restricted to access only files in this directory. For
example, if you enter “\remote\” in this field, emote users can only
access files in the “remote” directory.
If a link contains a file that is not within this domain, then remote users
cannot access it.
Preview
This field displays if the
Server Type
is set to
Web Server
or
OWA
.
Click
Preview
to access the URL you specified in a new IE web browser.
Entry Point
This field displays if the
Server Type
is set to
Web Server
or
OWA
.
This field is optional. You only need to configure this field if you need to
specify the name of the directory or file on the local server as the home
page or home directory on the user screen.
Page 664 / 944
Chapter 43 SSL Application
ZyWALL USG 50 User’s Guide
664
Server
Address(es)
This field displays if the
Server Type
is set to
RDP
or
VNC
.
Specify the IP address or Fully-Qualified Domain Name (FQDN) of the
computer(s) that you want to allow the remote users to manage.
Starting Port
Ending Port
This field displays if the
Server Type
is set to
RDP
or
VNC
.
Specify the listening ports of the LAN computer(s) running remote
desktop server software. The ZyWALL uses a port number from this
range to send traffic to the LAN computer that is being remotely
managed.
Program Path
This field displays if the
Server Type
is set to
RDP
.
You can specify an application to open when a remote user logs into the
remote desktop application.
Web Page
Encryption
Select this option to prevent users from saving the web content.
Ok
Click
Ok
to save the changes and return to the main
SSL Application
Configuration
screen.
Cancel
Click
Cancel
to discard the changes and return to the main
SSL
Application Configuration
screen.
Table 206
Configuration > Object > SSL Application > Add/Edit: Web Application
LABEL
DESCRIPTION
Page 665 / 944
ZyWALL USG 50 User’s Guide
665
C
HAPTER
44
Endpoint Security
44.1
Overview
Use Endpoint Security (EPS), also known as endpoint control, to make sure users’
computers comply with defined corporate policies before they can access the
network or an SSL VPN tunnel. After a successful user authentication, a user’s
computer must meet the endpoint security object’s Operating System (OS) option
and security requirements to gain access. You can configure the endpoint security
object to require a user’s computer to match just one of the endpoint security
object’s checking criteria or all of them. Configure endpoint security objects to use
with the authentication policy and SSL VPN features.
For example, an authentication policy could use an endpoint security object that
requires a LAN user’s computer to pass all of the object’s checking items in order
to access the network. LAN user
A
passes all of the checks and is given access. An
SSL VPN tunnel could use a different endpoint security profile that only requires
the user’s computer to match at least one checked item. SSL VPN user
B
matches
at least one of the items checked by the SSL VPN’s endpoint security object and is
granted access to the system resource defined in the SSL VPN access policy; in
this example a web server. SSL VPN user
C
fails all of the SSL VPN’s endpoint
security check and is not given any access.
Figure 379
Endpoint Security

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top