18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table <strong>of</strong> Contents<br />

CHAPTER 13 Setting Up Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . . 373<br />

An overview <strong>of</strong> Web services on <strong>Sidewinder</strong> <strong>G2</strong> . . . . . . . . . . . . . . . . 374<br />

Web access for users on your internal network . . . . . . . . . . . . . . . 374<br />

Access to your Web server by untrusted external users . . . . . . . . 374<br />

Access to your internal network by trusted external users . . . . . . . 375<br />

Implementation options for Web access . . . . . . . . . . . . . . . . . . . . . . 376<br />

Using the HTTP proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378<br />

Setting up Web access using the HTTP proxy . . . . . . . . . . . . . . . . 379<br />

Setting up clientless VPN access for trusted remote users . . . . . . 379<br />

Using the Web proxy server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381<br />

Setting up Web access using the Web proxy server . . . . . . . . . . . 382<br />

Error messages when using the Web proxy server . . . . . . . . . . . . 382<br />

Configuring the Web proxy server . . . . . . . . . . . . . . . . . . . . . . . . . . . 383<br />

Configuring caching options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385<br />

Configuring HTTP filtering options . . . . . . . . . . . . . . . . . . . . . . . . . 386<br />

Manually editing the configuration file . . . . . . . . . . . . . . . . . . . . . . 387<br />

Configuring browsers for the Web proxy server . . . . . . . . . . . . . . . . 389<br />

Mozilla Firefox 1.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389<br />

Internet Explorer 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389<br />

Internet Explorer 5.x/6.x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390<br />

Netscape version 6.x/7.x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390<br />

Certain browsers on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391<br />

CHAPTER 14 Configuring Virtual Private Networks . . . . . . . . . . . . . . . . . 393<br />

<strong>Sidewinder</strong> <strong>G2</strong> VPN overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394<br />

An introduction to IPSec technology . . . . . . . . . . . . . . . . . . . . . . . 395<br />

VPN configuration options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396<br />

Configuring hardware acceleration for VPN . . . . . . . . . . . . . . . . . . 398<br />

Configuring a VPN client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399<br />

Extended Authentication for VPN . . . . . . . . . . . . . . . . . . . . . . . . . . 399<br />

What type <strong>of</strong> VPN authentication should I use? . . . . . . . . . . . . . . . 400<br />

Configuring the ISAKMP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402<br />

Allowing access to the ISAKMP server . . . . . . . . . . . . . . . . . . . . . 403<br />

Configuring the Certificate server . . . . . . . . . . . . . . . . . . . . . . . . . . . 404<br />

Understanding virtual burbs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405<br />

Creating and using a virtual burb with a VPN . . . . . . . . . . . . . . . . 407<br />

Configuring client address pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407<br />

Configuring a new client address pool . . . . . . . . . . . . . . . . . . . . . . 408<br />

Configuring the Subnets tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410<br />

Configuring the DNS and/or WINS servers . . . . . . . . . . . . . . . . . . 411<br />

Configuring the fixed IP map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413<br />

Configuring Certificate Management . . . . . . . . . . . . . . . . . . . . . . . . . 415<br />

Understanding Distinguished Name syntax . . . . . . . . . . . . . . . . . . 416<br />

Selecting a trusted source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419<br />

Configuring and displaying CA root certificates . . . . . . . . . . . . . . . 420<br />

Configuring and displaying Remote Identities . . . . . . . . . . . . . . . . 422<br />

xii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!