18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 13: Setting Up Web Services<br />

Using the HTTP proxy<br />

380<br />

2 Create an IP address network object for the protected server to which your<br />

remote trusted users will be connecting (for example, a Micros<strong>of</strong>t Exchange<br />

Server). For information on creating an IP address network object, see<br />

“Configuring IP address objects” on page 145.<br />

3 Create a Secure Web Application Defense with the following configuration:<br />

Note: For more information on configuring a Secure Web Application Defense,<br />

see “Creating Web or Secure Web Application Defenses” on page 156.<br />

a In the Type field, select Server.<br />

b Select the Decrypt Web Traffic check box.<br />

c [Optional] If you are configuring remote access to an internal Micros<strong>of</strong>t<br />

Exchange Server, select the Rewrite Micros<strong>of</strong>t OWA HTTP check box.<br />

d Select the appropriate Firewall Certificate.<br />

e Select the Encryption/Decryption Methods you want to allow.<br />

f [Optional] Configure additional Secure Web Server Enforcements.<br />

g Click the Save icon to save the new defense.<br />

4 Create an HTTPS proxy rule to allow access. The fields listed below must<br />

be configured as specified:<br />

Note: You can configure rule fields that are not listed below as you see fit. For<br />

more information on creating proxy rules, see “Creating proxy rules” on page<br />

222.<br />

• General tab—Service Type=Proxy, Service=HTTPS, Action=Allow<br />

• Source/Dest tab—Redirect Host=IP Address network object for the<br />

protected server, Redirect Port=80<br />

• [Optional] Authentication tab—If you want to require users to<br />

authenticate via the proxy before being allowed access, you will need to<br />

select Authenticate using SSO.<br />

• [Optional] Time tab—Configure as needed.<br />

• Application Defense tab—Select the defense you created in<br />

step 3.<br />

5 Add the HTTPS proxy rule to the active proxy rule group.<br />

Once this rule is included in the active rule group, the <strong>Sidewinder</strong> <strong>G2</strong> is<br />

ready to allow trusted remote users access to the internal network.<br />

How trusted remote users gain access to the internal network<br />

This section lists the steps required for trusted remote users to gain access to<br />

a protected internal server. The procedure will vary depending on whether you<br />

have configured the HTTPS proxy rule to require authentication.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!