Policy Configuration : SSL VPN > Server Settings

Configuring Remote Access EPC Device Profiles
Configuring a Remote Access EPC Device Profile is a four-part process:
1
Configuring Device Profile Settings (for all Device Profiles)
2
Configuring Security Attributes (for all Device Profiles)
3
Configuring Client Routes (only for Allow Device Profiles)
4
Configuring Client Settings (only for Allow Device Profiles)
Configuring Device Profile Settings
1
On the SSL VPN > Remote Access EPC page, click Add. The Edit Device Profile window displays.
Enter the following information on the Settings tab:
Name – A brief name for the Device Profile.
Description – (Optional) A description of the Device Profile.
Action – Select whether it is an Allow Device Profile or Deny Device Profile.
Zone – (Only for Allow Device Profiles) Select the zone that clients are assigned to when matching this Device Profile. Only zones with type “SSL VPN” can be selected.
Network Address – (Only for Allow Device Profiles) Select the Address Object for the IP address pool for this device profile. Clients that match this profile are assigned an IP address from the pool. Only Address Objects for the zone selected above can be used for the Device Profile. Each Device Profile must use a unique Address Object.
Select Create net network to create a new Address Object. For the Zone Assignment, select the same zone you selected above. For Type, select Range.
Deny Message – (Only for Deny Device Profiles) Enter the HTML text for the message that is displayed to users who are denied access. Click the Example Template to auto-populate the Quarantine Message with formatted HTML text. The pop-up message is displayed in a window that is 500 pixels wide. Edit the text of the message and click Preview to view how it is displayed to users.
Configuring Security Attributes
1
Click on the Security Attributes tab.
2
In the Select Attribute(s) pulldown menu, select the appropriate type of attribute.
3
4
5
When finished click the Client Routes tab and continue to Configuring Client Routes .
Configuring Client Routes
The Client Routes tab is used to govern the network access that is granted to SSL VPN users.
Select Enabled from the Tunnel All Mode drop-down list to force all traffic for NetExtender users over the SSL VPN NetExtender tunnel—including traffic destined for the remote user’s local network. This is accomplished by adding the following routes to the remote client’s route table:
 
Table 40. Added Routes
NetExtender also adds routes for the local networks of all connected Network Connections. These routes are configured with higher metrics than any existing routes to force traffic destined for the local network over the SSL VPN tunnel instead. For example, if a remote user is has the IP address 10.0.67.64 on the 10.0.*.* network, the route 10.0.0.0/255.255.0.0 is added to route traffic through the SSL VPN tunnel.
To configure client routes to grant SSL VPN users network access, complete the following steps:
1
2
Click > to add it to the Client Routes list.
3
4
When finished, click the Client Settings tab. When you are finished with configuring the Device Profile, see the following section on how to configure SSL VPN users and groups for SSL VPN access.
Configuring Users and Groups for Client Routes and Tunnel All Mode
To configure SSL VPN NetEextender users and groups to access Client Routes, complete the following steps:
1
Navigate to the Users > Local Users or Users > Local Groups page.
2
Click Configure for the SSL VPN NetExtender user or group.
3
Click the VPN Access tab.
4
5
6
To configure SSL VPN users and groups for Tunnel All Mode, complete the following steps:
1
Navigate to the Users > Local Users or Users > Local Groups page.
2
Click Configure for an SSL VPN NetExtender user or group.
3
Click the VPN Access tab.
4
Select the WAN RemoteAccess Networks address object and click the right arrow (>) button.
5
6
Configuring Client Settings
The Client Settings tab is used to configure the DNS settings for SSL VPN clients as well as several options for the NetExtender client.To configure Client Settings, complete the following tasks:
1
Click the Default DNS Settings to use the default DNS settings of the SonicWALL security appliance. The DNS and WINS configuration is auto-propagated.
2
Or you can manually configure the DNS information. In the DNS Server 1 field, enter the IP address of the primary DNS server, or click the Default DNS Settings to use the default settings.
3
(Optional) In the DNS Server 2 field, enter the IP address of the backup DNS server.
4
5
(Optional) In the WINS Server 1 field, enter the IP address of the primary WINS server.
6
(Optional) In the WINS Server 2 field, enter the IP address of the backup WINS server.
7
Enable Client Autoupdate - The NetExtender client checks for updates every time it is launched.
Exit Client After Disconnect - The NetExtender client exits when it becomes disconnected from the SSL VPN server. To reconnect, users must either return to the SSL VPN portal or launch NetExtender from their Programs menu.
Uninstall Client After Disconnect - The NetExtender client automatically uninstalls when it becomes disconnected from the SSL VPN server. To reconnect, users must return to the SSL VPN portal.
Create Client Connection Profile - The NetExtender client creates a connection profile recording the SSL VPN Server name, the Domain name, and optionally the username and password.
User Name & Password Caching - Provide flexibility in allowing users to cache their usernames and passwords in the NetExtender client. The three options are Allow saving of user name only, Allow saving of user name & password, and Prohibit saving of user name & password. These options enable administrators to balance security needs against ease of use for users.
8
Click OK to complete the Device Profile configuration process.