viii
Configuring RADIUS authentication ·················································································································· 415
Configuring LDAP authentication ······················································································································· 416
Configuring AD authentication ·························································································································· 418
Configuring combined authentication ··············································································································· 419
Configuring a security policy ······································································································································ 420
Customizing the SSL VPN user interface ··················································································································· 424
Customizing the SSL VPN interface partially ···································································································· 424
Customizing the SSL VPN interface fully ··········································································································· 426
User access to SSL VPN ·········································································································································· 427
Logging in to the SSL VPN service interface ············································································································· 427
Accessing SSL VPN resources ····································································································································· 428
Getting help information ············································································································································· 429
Changing the login password ···································································································································· 429
SSL VPN configuration example ···························································································································· 431
Network requirements ················································································································································· 431
Configuration prerequisites ········································································································································· 431
Configuration procedure ············································································································································· 432
Configuring the SSL VPN service ······················································································································· 432
Configuring SSL VPN resources ························································································································· 435
Configuring SSL VPN users ································································································································ 440
Configuring an SSL VPN domain ······················································································································ 443
Verifying the configuration ·········································································································································· 445
Managing certificates ············································································································································· 448
Overview ······································································································································································· 448
Recommended configuration procedure···················································································································· 448
Recommended configuration procedure for manual request ·········································································· 449
Recommended configuration procedure for automatic request ······································································ 450
Creating a PKI entity ···················································································································································· 451
Creating a PKI domain ················································································································································ 452
Generating an RSA key pair······································································································································· 455
Destroying the RSA key pair ······································································································································· 456
Retrieving and displaying a certificate ······················································································································ 456
Requesting a local certificate ······································································································································ 458
Retrieving and displaying a CRL ································································································································ 459
PKI configuration examples ········································································································································· 459
Certificate request from a Windows 2003 CA server ···················································································· 459
Certificate request from an RSA Keon CA server ···························································································· 463
IKE negotiation with RSA digital signature ······································································································· 467
Configuration guidelines ············································································································································· 473
Managing the system ·············································································································································· 474
Configuring Web management·································································································································· 474
Managing the configuration ······································································································································· 474
Saving the configuration ····································································································································· 474
Restoring factory defaults ··································································································································· 475
Backing up configuration ··································································································································· 475
Restoring configuration ······································································································································· 476
Backing up and restoring device files through the USB port ·········································································· 477
Rebooting the device ··················································································································································· 478
Managing services ······················································································································································· 479
Managing users ··························································································································································· 481
Creating a user ···················································································································································· 481
Setting the super password ································································································································ 482