The
SSL VPN > Client Routes
page allows the administrator to control the network access allowed for SSL VPN users. The NetExtender client routes are passed to all NetExtender clients and are used to govern which private networks and resources remote user can access via the SSL VPN connection.
The following tasks are configured on the
SSL VPN > Client Routes
page:
Select
Enabled
from the Tunnel All Mode
drop-down list to force all traffic for NetExtender users over the SSL VPN NetExtender tunnel—including traffic destined for the remote user’s local network. This is accomplished by adding the following routes to the remote client’s route table:
NetExtender also adds routes for the local networks of all connected Network Connections.
These routes are configured with higher metrics than any existing routes to force traffic destined for the local network over the SSL VPN tunnel instead. For example, if a remote user is has the IP address 10.0.67.64 on the 10.0.*.* network, the route 10.0.0.0/255.255.0.0 is added to route traffic through the SSL VPN tunnel.
To configure SSL VPN NetEextender users and groups for Tunnel All Mode, perform the
following steps.
Step 2
|
Click on the
Configure
button for an SSL VPN NetExtender user or group.
|
Step 4
|
Select the
WAN RemoteAccess Networks
address object and click the right arrow (->
) button.
|
The
Add Client Routes
pulldown menu is used to configure access to network resources for SSL VPN users. Select the address object to which you want to allow SSL VPN access. Select Create new address object
to create a new address object. Creating client routes causes access rules to automatically be created to allow this access. Alternatively, you can manually configure access rules for the SSL VPN zone on the Firewall > Access Rules
page. For more information, see “Firewall > Access Rules”
.
To configure SSL VPN NetEextender users and groups to access Client Routes, perform the
following steps.
Step 2
|
Click on the
Configure
button for an SSL VPN NetExtender user or group.
|