18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 12-3. Access to the<br />

internal network by<br />

trusted external users<br />

Implementation<br />

options for Web<br />

access<br />

Implementation options for Web access<br />

Access to your internal network by trusted external users<br />

You can configure clientless VPN (SSL-based VPN) services for your<br />

trusted external users. Clientless VPN enables trusted external users<br />

(for example, remote employees) to establish an SSL connection to<br />

the internal network without requiring a dedicated VPN client. Trusted<br />

external users can establish a VPN connection from any client that is<br />

capable <strong>of</strong> handling SSL (such as a standard Web browser). A<br />

common example <strong>of</strong> using clientless VPN is to allow a trusted external<br />

user access to an internal mail server, such as Micros<strong>of</strong>t Exchange ®<br />

Server, as shown in Figure 12-3. For information on configuring the<br />

<strong>Sidewinder</strong> <strong>G2</strong> to allow clientless VPN for trusted remote users, see<br />

“Setting up clientless VPN access for trusted remote users” on page<br />

12-8.<br />

Web server<br />

internal mail<br />

server<br />

internal network<br />

HTTPS<br />

proxy<br />

Internet<br />

external network<br />

= VPN tunnel<br />

= Data<br />

trusted clientless<br />

VPN user<br />

Web access can be controlled using a Web proxy (HTTP or HTTPS),<br />

the Web proxy server, or both. These Web options are typically used<br />

in one <strong>of</strong> three configuration options, as shown in the following<br />

examples:<br />

Option 1: HTTP proxy regulates all Web traffic.<br />

Option 2: Web proxy server regulates all Web traffic.<br />

Option 3: Web proxy server regulates traffic from the trusted burbs<br />

and the HTTP proxy regulates traffic from the Internet burb.<br />

Setting Up Web Services 12-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!