viii
Configuring the SSL VPN service ···················································································································· 35
Configuring Web proxy server resources ········································································································· 36
Configuring TCP application resources ··········································································································· 38
Configuring a remote access service resource ························································································ 38
Configuring a desktop sharing service resource ······················································································ 40
Configuring an email service resource ····································································································· 41
Configuring a Notes service resource ······································································································ 42
Configuring a common TCP service resource ························································································· 44
Configuring IP network resources ···················································································································· 45
Recommended configuration procedure ·································································································· 45
Configuring global parameters ················································································································· 45
Configuring host resources ······················································································································ 46
Configuring a user-IP binding ··················································································································· 48
Configuring a predefined domain name ··································································································· 49
Configuring a resource group ·························································································································· 50
Configuring local users ···································································································································· 52
Adding a local user manually ··················································································································· 52
Importing local users in bulk ····················································································································· 54
Configuring a user group ································································································································· 55
Viewing user information ·································································································································· 57
Viewing online user information ··············································································································· 57
Logging out an online user ······················································································································· 57
Viewing history user information ·············································································································· 57
Performing basic configurations for the SSL VPN domain ·············································································· 58
Configuring the domain policy ·················································································································· 58
Configuring the caching policy ················································································································· 60
Configuring a bulletin ······························································································································· 60
Configuring authentication policies ·················································································································· 61
Configuring local authentication ··············································································································· 62
Configuring RADIUS authentication ········································································································· 62
Configuring LDAP authentication ············································································································· 63
Configuring AD authentication ················································································································· 65
Configuring combined authentication ······································································································· 66
Configuring a security policy ···························································································································· 67
Customizing the SSL VPN user interface ········································································································ 70
Customizing the SSL VPN interface partially ··························································································· 70
Customizing the SSL VPN interface fully ································································································· 71
User access to SSL VPN ·············································································· 73
Logging in to the SSL VPN service interface ··································································································· 73
Accessing SSL VPN resources ························································································································ 74
Getting help information ··································································································································· 75
Changing the login password ··························································································································· 75
SSL VPN configuration example ··································································· 77
Network requirements ······································································································································ 77
Configuration prerequisites ······························································································································ 77
Configuration procedure ·································································································································· 78
Configuring the SSL VPN service ············································································································ 78
Configuring SSL VPN resources ·············································································································· 81
Configuring SSL VPN users ····················································································································· 85
Configuring an SSL VPN domain ············································································································· 88
Verifying the configuration ······························································································································· 90
Managing certificates ···················································································· 93
Overview ·························································································································································· 93
Recommended configuration procedure ·········································································································· 93
Recommended configuration procedure for manual request ··································································· 94
Recommended configuration procedure for automatic request ······························································· 95
Creating a PKI entity ········································································································································ 96
Creating a PKI domain ····································································································································· 97
Generating an RSA key pair ·························································································································· 100