Zywall ssl vpn file sharing
Configure an address object that defines a range of private IP addresses to assign to user computers so they can access the internal network through a VPN connection. Configure an address object to specify which network segment users are allowed to access through a VPN connection. You cannot delete an object that is referenced by an SSL access policy.
To delete the object, you must first unassociate the object from the SSL access policy. See Endpoint Security for details on endpoint security objects. Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry.
To remove an entry, select it and click Remove. To turn on an entry, select it and click Activate. To turn off an entry, select it and click Inactivate. To move an entry to a different number in the list, click the Move icon. In the field that appears, specify the number to which you want to move the interface. Select an entry and click Object Reference s to open a screen that shows which settings use the entry.
This icon is lit when the entry is active and dimmed when the entry is inactive. This field displays the descriptive name of the SSL access policy for identification purposes. This field displays the user account or user group name s associated to an SSL access policy. This field displays details about the SSL application object this policy uses including its name, type, and address.
Click Apply to save the settings. Click Reset to discard all changes. Use to configure any new settings objects that you need to use in this screen. Enter a descriptive name to identify this policy. Select the zone to which to add this SSL access policy. You use zones to apply security settings such as firewall and remote management. Enter additional information about this SSL access policy.
You can select more than one name. Although you can select admin and limited-admin accounts in this screen, they are reserved for device configuration only. Select this and specify a number of minutes to have the ZyWALL repeat the endpoint security check at a regular interval.
Configured endpoint security objects appear on the left. Select the endpoint security objects to use for this SSL access policy and click the right arrow button to add them to the selected list on the right. Select any endpoint security objects that you want to remove from the selected list and click the left arrow button to remove them. To make the endpoint security check as efficient as possible, arrange the endpoint security objects in order with the one that the most users should match first and the one that the least users should match last.
You can select more than one application. Select this option to create a VPN tunnel between the authenticated users and the internal network.
This allows the users to access the resources on the network as if they were on the same local network.
This includes access to resources not supported by SSL application objects. Clear this option to disable this feature. Select it here.
This allows them to access devices on the local network using domain names instead of IP addresses. You can select more than one network. Click Ok to save the changes and return to the main Access Privilege screen. Click Cancel to discard all changes and return to the main Access Privilege screen. Use this screen to set the IP address of the ZyWALL or a gateway device on your network for full tunnel mode access, enter access messages or upload a custom logo to be displayed on the remote user screen.
Leave this field to the default settings unless it conflicts with another interface. You can specify up to two domain names so you could use one domain name for each of two WAN ports. For example, www. Specify a message to display on the screen when a user logs out and the SSL VPN connection is terminated successfully.
You can upload a graphic logo to be displayed on the web browser on the remote user computer. The ZyXEL company logo is the default logo. Specify the location and file name of the logo graphic or click Browse to locate it. The graphic should use a resolution of x 29 pixels to avoid distortion when displayed. You can create a web-based application that allows remote users to access an application via standard web browsers.
You can also create a file sharing application that specify the name of a folder on a file server Linux or Windows which remote users can access. Remote users can access files using a standard web browser and files are displayed as links on the screen. Refer to the document that comes with your file server. Use this to configure any new settings objects that you need to use in this screen. Select Web Application or File Sharing from the drop-down list box. This field only appears when you choose Web Application as the object type.
Select Web Server to allow access to the specified web site hosted on the local network. Enter a descriptive name to identify this object. Spaces are not allowed. Remote users are restricted to access only files in this directory. If a link contains a file that is not within this domain, then remote users cannot access it. This field is optional. You only need to configure this field if you need to specify the name of the directory or file on the local server as the home page or home directory on the user screen.
Select this option to prevent users from saving the web content. This field only appears when you choose File Sharing as the object type. Specify the IP address, domain name or NetBIOS name computer name of the file server and the name of the share to which you want to allow user access. Enter the path in one of the following formats. Click this to create a new entry. Object References. This field displays the index number. This field displays the name of the object.
0コメント