18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Using the HTTP proxy<br />

12-8 Setting Up Web Services<br />

After you enable the proxy, you should test it by starting a Web browser<br />

from one <strong>of</strong> your internal systems, and entering the address <strong>of</strong> a Web<br />

site you know is valid—for example, you could attempt to access<br />

Secure Computing at the following URL:<br />

http://www.securecomputing.com.<br />

Note: Make sure you use a system from which you did not deny access.<br />

Setting up clientless VPN access for trusted remote users<br />

This section provides guidance on configuring clientless VPN access<br />

for your trusted remote users. When configuring clientless VPN<br />

access, you can configure whether or not the <strong>Sidewinder</strong> <strong>G2</strong> will<br />

require proxy authentication. If you configure the <strong>Sidewinder</strong> <strong>G2</strong> to<br />

require proxy authentication, you must use SSO authentication.<br />

Follow the steps below.<br />

Note: You must have SSL Decryption and Strong Cryptography licensed to configure<br />

clientless VPN services.<br />

1. Enable the HTTPS proxy for the appropriate burbs. For information on<br />

enabling proxies, see “Configuring proxies” on page 8-28.<br />

2. Create an IP address network object for the protected server to which<br />

your remote trusted users will be connecting (for example, a Micros<strong>of</strong>t<br />

Exchange Server). For information on creating an IP address network<br />

object, see “Configuring IP address objects” on page 5-15.<br />

3. Create a Secure Web Application Defense with the following<br />

configuration:<br />

Note: For more information on configuring a Secure Web Application Defense, see<br />

“Creating Web or Secure Web Application Defenses” on page 6-4.<br />

a. In the Type field, select Server.<br />

b. Select the Decrypt Web Traffic check box.<br />

c. [Optional] If you are configuring remote access to an internal<br />

Micros<strong>of</strong>t Exchange Server, select the Rewrite Micros<strong>of</strong>t OWA HTTP<br />

check box.<br />

d. Select the appropriate Firewall Certificate.<br />

e. Select the Encryption/Decryption Methods you want to allow.<br />

f. [Optional] Configure additional Secure Web Server Enforcements.<br />

g. Click the Save icon to save the new defense.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!