Netgear SRX5308 SRX5308 Reference Manual - Page 204

Planning for an SSL VPN, SSL port forwarding

Page 204 highlights

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual The SSL capability of the user's browser provides authentication and encryption, establishing a secure connection to the VPN firewall. Upon successful connection, an ActiveX-based SSL VPN client is downloaded to the remote PC to allow the remote user to virtually join the corporate network. The SSL VPN client provides a point-to-point (PPP) connection between the client and the VPN firewall, and a virtual network interface is created on the user's PC. The VPN firewall assigns the PC an IP address and DNS server IP addresses, allowing the remote PC to access network resources in the same manner as if it were connected directly to the corporate network, subject to any policy restrictions that you configure. • SSL port forwarding. Like an SSL VPN tunnel, port forwarding is a Web-based client that is installed transparently and then creates a virtual, encrypted tunnel to the remote network. However, port forwarding differs from an SSL VPN tunnel in several ways: - Port forwarding supports only TCP connections, not UDP connections or connections using other IP protocols. - Port forwarding detects and reroutes individual data streams on the user's PC to the port-forwarding connection rather than opening up a full tunnel to the corporate network. - Port forwarding offers more fine-grained management than an SSL VPN tunnel. You define individual applications and resources that are available to remote users. The SSL VPN portal can present the remote user with one or both of these SSL service levels, depending on how you set up the configuration. Planning for an SSL VPN To set up and activate SSL VPN connections, perform these basic steps in this order: 1. Edit the existing SSL portal or create a new one (see "Creating the Portal Layout" on page 6-4). When remote users log in to the VPN firewall, they see a portal page that you can customize to present the resources and functions that you choose to make available. 2. Create authentication domains, user groups, and user accounts (see "Configuring Domains, Groups, and Users" on page 6-7). a. Create one or more authentication domains for authentication of SSL VPN users. When remote users log in to the VPN firewall, they must specify a domain to which their login account belongs. 6-2 Virtual Private Networking Using SSL Connections v1.0, April 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual
6-2
Virtual Private Networking Using SSL Connections
v1.0, April 2010
The SSL capability of the user’s browser provides authentication and encryption, establishing
a secure connection to the VPN firewall. Upon successful connection, an ActiveX-based SSL
VPN client is downloaded to the remote PC to allow the remote user to virtually join the
corporate network.
The SSL VPN client provides a point-to-point (PPP) connection between the client and the
VPN firewall, and a virtual network interface is created on the user’s PC. The VPN firewall
assigns the PC an IP address and DNS server IP addresses, allowing the remote PC to access
network resources in the same manner as if it were connected directly to the corporate
network, subject to any policy restrictions that you configure.
SSL port forwarding
.
Like an SSL VPN tunnel, port forwarding is a Web-based client that is
installed transparently and then creates a virtual, encrypted tunnel to the remote network.
However, port forwarding differs from an SSL VPN tunnel in several ways:
Port forwarding supports only TCP connections, not UDP connections or connections
using other IP protocols.
Port forwarding detects and reroutes individual data streams on the user’s PC to the
port-forwarding connection rather than opening up a full tunnel to the corporate network.
Port forwarding offers more fine-grained management than an SSL VPN tunnel. You
define individual applications and resources that are available to remote users.
The SSL VPN portal can present the remote user with one or both of these SSL service levels,
depending on how you set up the configuration.
Planning for an SSL VPN
To set up and activate SSL VPN connections, perform these basic steps in this order:
1.
Edit the existing SSL portal or create a new one (see
“Creating the Portal Layout” on
page 6-4
).
When remote users log in to the VPN firewall, they see a portal page that you can customize to
present the resources and functions that you choose to make available.
2.
Create authentication domains, user groups, and user accounts (see
“Configuring Domains,
Groups, and Users” on page 6-7
).
a.
Create one or more authentication domains for authentication of SSL VPN users. When
remote users log in to the VPN firewall, they must specify a domain to which their login
account belongs.