
viii
Configuring the SSL VPN service ····················································································································35
Configuring Web proxy server resources·········································································································36
Configuring TCP application resources ···········································································································38
Configuring a remote access service resource ························································································38
Configuring a desktop sharing service resource ······················································································40
Configuring an email service resource·····································································································41
Configuring a Notes service resource ······································································································42
Configuring a common TCP service resource ·························································································44
Configuring IP network resources····················································································································45
Recommended configuration procedure ··································································································45
Configuring global parameters·················································································································45
Configuring host resources ······················································································································46
Configuring a user-IP binding···················································································································48
Configuring a predefined domain name ···································································································49
Configuring a resource group ··························································································································50
Configuring local users ····································································································································52
Adding a local user manually ···················································································································52
Importing local users in bulk·····················································································································54
Configuring a user group ·································································································································55
Viewing user information··································································································································57
Viewing online user information ···············································································································57
Logging out an online user·······················································································································57
Viewing history user information ··············································································································57
Performing basic configurations for the SSL VPN domain ··············································································58
Configuring the domain policy··················································································································58
Configuring the caching policy ·················································································································60
Configuring a bulletin ·······························································································································60
Configuring authentication policies ··················································································································61
Configuring local authentication ···············································································································62
Configuring RADIUS authentication·········································································································62
Configuring LDAP authentication ·············································································································63
Configuring AD authentication ·················································································································65
Configuring combined authentication·······································································································66
Configuring a security policy ····························································································································67
Customizing the SSL VPN user interface ········································································································70
Customizing the SSL VPN interface partially ···························································································70
Customizing the SSL VPN interface fully ·································································································71
User access to SSL VPN ·············································································· 73
Logging in to the SSL VPN service interface ···································································································73
Accessing SSL VPN resources························································································································74
Getting help information···································································································································75
Changing the login password···························································································································75
SSL VPN configuration example··································································· 77
Network requirements······································································································································77
Configuration prerequisites ······························································································································77
Configuration procedure ··································································································································78
Configuring the SSL VPN service ············································································································78
Configuring SSL VPN resources··············································································································81
Configuring SSL VPN users·····················································································································85
Configuring an SSL VPN domain·············································································································88
Verifying the configuration ·······························································································································90
Managing certificates ···················································································· 93
Overview ··························································································································································93
Recommended configuration procedure··········································································································93
Recommended configuration procedure for manual request ···································································94
Recommended configuration procedure for automatic request ·······························································95
Creating a PKI entity ········································································································································96
Creating a PKI domain·····································································································································97
Generating an RSA key pair ··························································································································100