SSL VPN : SSL VPN > Client Settings

Configuring the Default Device Profile
Edit the Default Device Profile to select the zones and NetExtender address objects, configure client routes, and configure the client DNS and NetExtender settings.
SSL VPN access must be enabled on a zone before users can access the Virtual Office web portal. SSL VPN Access can be configured on the Network > Zones page by clicking the Configure icon for the zone.
NOTE: For SonicOS to terminate SSL VPN sessions, HTTPS for Management or User Login must be enabled on the Network > Interfaces page, in the Edit Interface dialog for the WAN interface.
Configuring the Settings tab
To configure the Settings tab of the Default Device Profile:
1
Navigate to Default Device Profile section of the SSL VPN > Client Settings page.
2
Click the Configure button for the Default Device Profile. The Edit Device Profile dialog displays.
NOTE: The Name and Description of the Default Device Profile cannot be changed.
3
For the zone binding for this profile, on the Settings tab, select SSLVPN or a custom zone from the Zone IP V4 drop-down menu.
4
From the Network Address IP V4 drop-down menu, select the IPv4 NetExtender address object that you created. See Creating an Address Object for the NetExtender Range for instructions. This setting selects the IP Pool and zone binding for this profile. The NetExtender client gets the IP address from this address object if it matches this profile.
5
Select SSLVPN or a custom zone from the Zone IP V6 drop-down menu. This is the zone binding for this profile.
6
From the Network Address IP V6 drop-down menu, select the IPv6 NetExtender address object that you created.
7
Click the Client Routes tab to proceed with the client settings configuration. See Configuring the Client Routes Tab .
8
Configuring the Client Routes Tab
The Client Routes tab allows you to control the network access allowed for SSL VPN users. The NetExtender client routes are passed to all NetExtender clients and are used to govern which private networks and resources remote users can access via the SSL VPN connection.
The following tasks are configured on the Client Routes tab:
Configuring Tunnel All Mode
Select Enabled from the Tunnel All Mode drop-down list to force all traffic for NetExtender users over the SSL VPN NetExtender tunnel—including traffic destined for the remote user’s local network. This is accomplished by adding the following routes to the remote client’s route table:
 
NetExtender also adds routes for the local networks of all connected Network Connections. These routes are configured with higher metrics than any existing routes to force traffic destined for the local network over the SSL VPN tunnel instead. For example, if a remote user is has the IP address 10.0.67.64 on the 10.0.*.* network, the route 10.0.0.0/255.255.0.0 is added to route traffic through the SSL VPN tunnel.
To configure SSL VPN NetExtender users and groups for Tunnel All Mode, perform the following steps.
1
Navigate to the Users > Local Users or Users > Local Groups page.
2
Click on the Configure button for an SSL VPN NetExtender user or group. The Edit Group dialog displays.
3
Click on the VPN Access tab.
4
Select the WAN RemoteAccess Networks address object.
5
Click the Right Arrow button.
6
7
Repeat Step 1 through Step 6 for all local users and groups that use SSL VPN NetExtender.
Adding Client Routes
Client Routes are used to configure access to network resources for SSL VPN users.
To configure Client Routes for SSL VPN:
1
Navigate to Default Device Profile section of the SSL VPN > Client Settings page.
2
Click the Configure button for the Default Device Profile. The Edit Device Profile dialog displays.
3
Click the Client Routes tab.
4
From the Networks list, select the address object to which you want to allow SSL VPN access.
5
Click the Right Arrow button to move the address object to the Client Routes list.
6
Repeat Step 4 and Step 5 until you have moved all the address objects you want to use for Client Routes.
Creating client routes causes access rules allowing this access to be created automatically. Alternatively, you can manually configure access rules for the SSL VPN zone on the Firewall > Access Rules page. For more information, see Firewall > Access Rules .
To configure SSL VPN NetExtender users and groups to access Client Routes, perform the following steps.
1
Navigate to the Users > Local Users or Users > Local Groups page.
2
Click on the Configure button for an SSL VPN NetExtender user or group.
3
Click on the VPN Access tab.
4
5
Click the Right Arrow button.
6
7
Repeat Step 1 through Step 6 for all local users and groups that use SSL VPN NetExtender.
Configuring the Client Settings tab
NetExtender client settings are configured in the Edit Device Profile dialog.
To configure Client Settings:
1
Navigate to the Default Device Profile section of the SSL VPN > Client Settings page.
2
Click the Configure button for the Default Device Profile. The Edit Device Profile dialog displays.
3
Click the Client Settings tab.
4
In the DNS Server 1 field, either:
Click the Default DNS Settings to use the default settings for both the DNS Server 1 and DNS Server 2 fields. The fields are populated automatically.
5
(Optional) In the DNS Server 2 field, if you did not click Default DNS Settings, enter the IP address of the backup DNS server.
6
(Optional) In the DNS Search List field, type in the IP address for a DNS server
a
Click Add to add it to the list below.
b
Repeat Step a as many times as necessary.
Use the up and down arrow buttons to scroll through the list, as needed.
To remove an address from the list, select it and then click Remove.
7
(Optional) In the WINS Server 1 field, enter the IP address of the primary WINS server.
8
(Optional) In the WINS Server 2 field, enter the IP address of the backup WINS server.
9
To customize the behavior of NetExtender when users connect and disconnect, select Enabled or Disabled for each of the following settings under NetExtender Client Settings. By default, all have been set to Disabled.
Enable Client Autoupdate - The NetExtender client checks for updates every time it is launched.
Exit Client After Disconnect - The NetExtender client exits when it becomes disconnected from the SSL VPN server. To reconnect, users have to either return to the SSL VPN portal or launch NetExtender from their Programs menu.
Uninstall Client After Exit - The NetExtender client uninstalls v when it becomes disconnected from the SSL VPN server. To reconnect, users have to return to the SSL VPN portal.
Create Client Connection Profile - The NetExtender client createa a connection profile recording the SSL VPN Server name, the Domain name, and optionally the username and password.
10
To provide flexibility in allowing users to cache their usernames and passwords in the NetExtender client, select one of these actions from the User Name & Password Caching field. These options enable you to balance security needs against ease of use for users.
11