SSL M7.5 User Manual

Add to my manuals
423 Pages

advertisement

SSL M7.5 User Manual | Manualzz

SSL M7.5 User Manual

September 2016

Table of Contents

Table of Contents................................................................................................................................ 1

Declaration.......................................................................................................................................... 7

Preface................................................................................................................................................. 8

About This Manual......................................................................................................................8

Document Conventions...............................................................................................................9

Graphic Interface Conventions................................................................................................... 9

Symbol Conventions................................................................................................................. 10

CLI Conventions....................................................................................................................... 10

Technical Support..................................................................................................................... 11

Acknowledgments.....................................................................................................................11

Chapter 1 Knowing Your Sangfor Device........................................................................................12

Operating Environment.............................................................................................................12

Product Appearance.................................................................................................................. 12

Connecting Sangfor Device...................................................................................................... 13

Chapter 2 Initial Login to Admin Console....................................................................................... 16

Logging in to Admin Console...................................................................................................16

Modifying Administrator Password..........................................................................................17

Chapter 3 System and Network Settings.......................................................................................... 19

Viewing Status.......................................................................................................................... 20

Viewing SSL VPN Status................................................................................................. 20

Viewing Online Users.......................................................................................................22

Viewing Alarm Logs.........................................................................................................24

Viewing Remote Application............................................................................................26

System Settings......................................................................................................................... 30

Configuring System Related Settings...............................................................................30

Configuring License of Device and Function Modules....................................................30

Modifying System Date and Time....................................................................................32

Configuring Console Options........................................................................................... 33

Configuring External Report Center.................................................................................33

Generating Certificate for Sangfor Device....................................................................... 34

Configuring SMTP Server................................................................................................ 37

Configuring Syslog Server................................................................................................38

Configuring SNMP........................................................................................................... 39

Network Settings.......................................................................................................................40

Device Deployment...........................................................................................................40

Setting Multiline Options..................................................................................................44

Configuring Route.............................................................................................................48

Configuring Host Mapping Rule (HOSTS)......................................................................50

Configuring IP Assignment Options (DHCP).................................................................. 51

Configuring Local Subnet.................................................................................................54

Schedules...................................................................................................................................56

1

SANGFOR SSL M7.5 User Manual

Administrator............................................................................................................................ 60

Adding Administrator Group............................................................................................60

Adding Administrator....................................................................................................... 62

SSL VPN Options..................................................................................................................... 64

General Settings................................................................................................................ 64

Configuring User Login Options.............................................................................. 64

Configuring Client Related Options......................................................................... 67

Configuring Virtual IP Pool......................................................................................71

Configuring Local DNS Server................................................................................ 72

Configuring SSO Options.........................................................................................75

Configuring Resource Options................................................................................. 78

Web App Resource Options............................................................................. 78

TCP App Resource Options..............................................................................80

Background Knowledge: What is Smart Recursion?....................................... 82

L3VPN Resource Options.................................................................................84

Other Resource Options....................................................................................85

Network Optimization Related Settings........................................................................... 87

Application Access Optimization............................................................................. 87

Data Transfer Optimization...................................................................................... 88

Webpage Access Optimization.................................................................................91

Web Cache................................................................................................................ 94

User Logging in.................................................................................................................95

Configuring Login Policy......................................................................................... 95

Configuring Login Page............................................................................................97

Uploading Icon to Device....................................................................................... 100

Clustering........................................................................................................................ 102

Terminology............................................................................................................102

Main Features of Cluster.........................................................................................102

Deploying Clustered Sangfor Devices....................................................................105

Deploying Clustered Device in Single-Arm Mode........................................ 105

Deploying Clustered Device in Gateway Mode.............................................106

Deploying Clustered Device with Multiple Lines..........................................107

Viewing Clustered Node Status..............................................................................110

Viewing Cluster Online Users................................................................................ 110

Distributed Nodes................................................................................................... 112

Distributed Deployment..................................................................................112

Viewing Status of Distributed Nodes............................................................. 113

Chapter 4 SSL VPN........................................................................................................................ 114

SSL VPN Users.......................................................................................................................114

Adding User Group.........................................................................................................115

Adding User.................................................................................................................... 121

Searching for Users.........................................................................................................127

Managing Hardware IDs.................................................................................................129

Importing User to Device................................................................................................131

2

SANGFOR SSL M7.5 User Manual

Importing Users from File...................................................................................... 132

Importing Users from LDAP Server.......................................................................134

Moving Users to Another Group.................................................................................... 136

Exporting Users...............................................................................................................137

Associating Roles with User...........................................................................................138

Configuring SSO User Account......................................................................................139

Generating Multiple Certificates for Users.....................................................................140

Configuring Multiple Users Assigned To CA................................................................141

Creating Multiple USB Keys for Users.......................................................................... 142

Viewing Associated Resources of User..........................................................................144

Resources.................................................................................................................................145

Adding/Editing Resource Group.....................................................................................146

Background Knowledge: Load-Balanced Resource Access.................................. 147

Adding/Editing Web Application................................................................................... 149

Adding/Editing TCP Application................................................................................... 155

Adding/Editing L3VPN.................................................................................................. 161

Adding/Editing Remote Application.............................................................................. 166

More Operations......................................................................................................................170

Exporting Resources....................................................................................................... 170

Importing Resources....................................................................................................... 171

Sorting Resources............................................................................................................171

Roles........................................................................................................................................174

Adding Role.................................................................................................................... 175

Getting Privilege Report................................................................................................. 177

Authentication Options........................................................................................................... 180

Primary Authentication Methods....................................................................................181

Local Password Based Authentication................................................................... 181

LDAP Authentication............................................................................................. 182

Configuring LDAP Server.............................................................................. 182

RADIUS Authentication.........................................................................................190

Configuring RADIUS Server..........................................................................190

Certificate/USB Key Based Authentication........................................................... 193

Configuring Local CA.................................................................................... 194

Configuring External CA................................................................................196

Configuring USB Key Model.........................................................................201

Client-Side Domain SSO................................................................................202

Secondary Authentication Methods................................................................................204

SMS Authentication................................................................................................204

Using Built-in SMS Module to Send SMS Message......................................206

Using External SMS Module to Send SMS Message.................................... 208

Using SMS Gateway of ISP to Send SMS Message...................................... 211

Using Webservice Based SMS Platform to Send SMS Message...................211

Using Jasson MAS to Send SMS Message.................................................... 212

Hardware ID Based Authentication........................................................................213

3

SANGFOR SSL M7.5 User Manual

Dynamic Token Based Authentication...................................................................214

Other Authentication Options.........................................................................................214

Priority of LDAP and RADIUS Servers.................................................................214

Password Security Options..................................................................................... 215

Anonymous Login...................................................................................................217

Policy Sets............................................................................................................................... 219

Adding Policy Set........................................................................................................... 220

Remote Servers....................................................................................................................... 230

Adding Remote Application Server................................................................................232

Adding Remote Storage Server...................................................................................... 235

EMM....................................................................................................................................... 240

MDM Policy....................................................................................................................240

Adding Android MDM Policy................................................................................240

Adding iOS MDM Policy....................................................................................... 243

Mobile Devices............................................................................................................... 245

Published Apps................................................................................................................247

App Wrapping.................................................................................................................251

Endpoint Security....................................................................................................................256

Security Rules................................................................................................................. 256

Predefining Basic Rule............................................................................................257

Predefining Combined Rule....................................................................................266

Configuring Security Rule...................................................................................... 268

Security Policy................................................................................................................ 269

Adding User-Level Policy...................................................................................... 271

Adding Role-level Policy........................................................................................273

Configuring Advanced Policy Settings.................................................................. 277

Built-in Rules Update......................................................................................................278

Chapter 5 Firewall...........................................................................................................................281

Defining Firewall Service....................................................................................................... 281

Defining IP Group...................................................................................................................282

Configuring Filter Rule...........................................................................................................283

Rules on Access to Local Device....................................................................................283

Rules on Access among Sangfor Device’s Interfaces.................................................... 283

Configuring NAT Rule........................................................................................................... 284

Configuring SNAT Rule................................................................................................. 284

Configuring DNAT Rule................................................................................................ 286

Configuring IP/MAC Binding................................................................................................ 286

Configuring HTTP Port...........................................................................................................288

Defining URL Group.............................................................................................................. 289

Defining WAN Service...........................................................................................................290

Configuring Access Right of Local Users.............................................................................. 292

Real-time Monitoring..............................................................................................................296

Viewing Real-time Traffic..............................................................................................296

Viewing URL Access Logs.............................................................................................296

4

SANGFOR SSL M7.5 User Manual

Configuring Anti-DoS.............................................................................................................297

Chapter 6 System Maintenance.......................................................................................................299

System Update.........................................................................................................................299

System Upgrade.............................................................................................................. 299

Proxy Options..................................................................................................................299

Viewing Logs.......................................................................................................................... 300

Viewing System Logs..................................................................................................... 300

Viewing Operating Logs.................................................................................................301

Backing Up/Restoring Configurations....................................................................................302

Restarting/Shutting Down Device or Services....................................................................... 304

System Automatic Update.............................................................................................. 306

Chapter 7 Scenarios.........................................................................................................................308

Device Deployment.................................................................................................................308

Deploying Device in Gateway Mode with Single Line..................................................308

Deploying Device in Gateway Mode with Multiple Lines.............................................311

Deploying Device in Single-Arm Mode With Single Line............................................ 315

Deploying Device in Single-Arm Mode With Multiple Lines.......................................317

Configuring System Route......................................................................................................320

Deploying Clustered Sangfor Devices....................................................................................322

Deploying Clustered Device in Gateway Mode............................................................. 322

Deploying Clustered Device in Single-Arm Mode........................................................ 323

Deploying Clustered Device with Multiple Lines..........................................................324

Gateway-mode Sangfor Device with Multiple Lines.............................................325

Single-Arm Sangfor Device with Multiple Lines...................................................325

Adding User............................................................................................................................ 326

Adding User Logging in with Local Password...............................................................326

Adding User Logging in with Certificate....................................................................... 326

Configuring VPN Resource.................................................................................................... 328

Adding Web Application................................................................................................ 328

Masquerading Resource Address............................................................................331

Adding FileShare Type of Web Application..........................................................332

Adding Web Application Enabling Site Mapping..................................................335

Configuring TCP Application.........................................................................................338

Configuring URL Access Control Feature............................................................. 340

Adding L3VPN Application........................................................................................... 341

Adding Remote Application........................................................................................... 343

Configuring Authentication with External CA.......................................................................352

Using External CA Root Certificate to Generate Device Certificate.............................352

Mapping User to Local Group Based on External Certificate....................................... 355

Configuring Resource Enabling SSO..................................................................................... 357

Adding TCP Application Enabling SSO........................................................................ 357

Adding Remote Application Enabling SSO................................................................... 361

Mobile Users Accessing SSL VPN.........................................................................................378

Application for IOS MDM Certificate....................................................................................384

5

SANGFOR SSL M7.5 User Manual

EMM Configuration Case.......................................................................................................387

Configuring Firewall Rule...................................................................................................... 389

Configuring LAN<->VPN Filter Rules..........................................................................389

Adding SNAT Rule.........................................................................................................392

Adding DNAT Rule........................................................................................................ 394

Typical Case Study................................................................................................................. 396

Required Environment.................................................................................................... 396

Configuring Sangfor Device........................................................................................... 396

Appendix A: End Users Accessing SSL VPN................................................................................403

Required Environment............................................................................................................ 403

Configuring Browser and Accessing SSL VPN..................................................................... 403

Configuring Browser.......................................................................................................403

Using Account to Log In to SSL VPN........................................................................... 407

Using USB Key to Log In to SSL VPN..........................................................................409

Using VPN Client to Log In SSL VPN.......................................................................... 410

Appendix B: Sangfor Firmware Updater 6.0..................................................................................416

Updating Your Sangfor Device...............................................................................................416

6

SANGFOR SSL M7.5 User Manual

Declaration

Copyright © 2016 Sangfor Inc. All rights reserved.

No part of the contents of this document shall be extracted, reproduced or transmitted in any form or by any means without prior written permission of SANGFOR.

SINFOR, SANGFOR and the Sangfor logo are the trademarks or registered trademarks of

Sangfor Inc. All other trademarks used or mentioned herein belong to their respective owners.

This manual shall only be used as usage guide, and no statement, information, or suggestion in it shall be considered as implied or express warranty of any kind, unless otherwise stated. This manual is subject to change without notice. To obtain the latest version of this manual, please contact the Customer Service of Sangfor.

7

SANGFOR SSL M7.5 User Manual

Preface

About This Manual

SSL VPN M7.5EN user manual includes the following chapters:

Chapter

Chapter 1 Knowing Your Sangfor Device

Chapter 2 Initial Login to Admin Console

Chapter 3 System and Network Settings

Chapter 4 SSL VPN

Chapter 5 Firewall

Chapter 6 System Maintenance

Describe…

The product appearance, function features and performance parameters of SSL VPN M7.5EN, wiring and cautions before installation.

How administrator logs in to SSL VPN

M7.5EN administrator console for the first time and change initial administrator password.

How administrator configures each function module. The settings include system and network related settings, global settings of SSL

VPN, as well as other system objects such as schedule and administrator.

How administrator configures SSL VPN related setting, including users, resources, roles, user authentication methods, policy sets, remote servers, endpoint security.

How administrator configures firewall related settings.

Maintenance options of this SSL VPN hardware device.

Chapter 7 Scenarios

Appendix B: Sangfor Firmware Updater 6.0

How administrator configures Sangfor device in different deployment mode, and how to configure the device according to different requirements.

Appendix A: End Users Accessing SSL VPN

How end users configure browser and log in to

SSL VPN.

How administrator uses Sangfor Firmware

Updater 6.0 to update the current Sangfor device.

8

SANGFOR SSL M7.5 User Manual

Document Conventions

Graphic Interface Conventions

This manual uses the following typographical conventions for special terms and instructions:

Convention boldface italics

>

Meaning

Page title, parameter, menu/submenu, button, key press, link, other highlighted keyword or item

Example

Page/tab name example:

Navigate to System > Administrator to enter the

Administrator Management page.

Parameter example:

IP Address: Specifies the IP address that you want to reserve for certain computer

Menus/submenus example:

The basic (SSL VPN related) settings are under

System > SSL VPN Options > General.

Button example:

Click the Save button to save the settings.

Key press example:

Press Enter key to enter the administrator console of the Sangfor device.

Link example:

Once the certificate signing request is generated, click the Download link to download the request.

Highlighted keyword/item example:

The user name and password are Admin by default.

Directory, URL Enter the following address in the IE address bar: http://10.254.254.254:1000

Multilevel menu and submenu

Navigate to System > Network Interface to configure the network interfaces.

“ ” Prompt The browser may pop up the prompt “Install ActiveX control”.

9

SANGFOR SSL M7.5 User Manual

Symbol Conventions

This manual also adopts the following symbols to indicate the parts which need special attention to be paid during the operation:

Convention Meaning

Caution

Description

Indicates actions that could cause setting error, loss of data or damage to the device

Warning Indicates actions that could cause injury to human body

Note Indicates helpful suggestion or supplementary information

CLI Conventions

Command syntax on Command Line Interface (CLI) applies the following conventions:

 Content in brackets ([ ]) is optional

 Content in {} is necessary

 If there is more than one option, use vertical bar (|) to separate each option, for example,

ip wccp 60 redirect { in | out }

 CLI command appears in bold, for example: configure terminal

 Variables appear in italic, for example:

interface e0/1

10

Technical Support

For technical support, please contact us through the following:

Website: http://www.sangfor.com

MSN, Email: [email protected]

Skype: sangfor.tech.support

Tel: + 60 12711 7129(7511)

SANGFOR SSL M7.5 User Manual

Acknowledgments

Thanks for using our product and user manual. If you have any suggestion about our product or user manual, please provide feedback to us through phone call or email. Your suggestion will be much appreciated.

11

SANGFOR SSL M7.5 User Manual

Chapter 1 Knowing Your Sangfor Device

This chapter introduces the Sangfor device and the way of connecting Sangfor device. After proper hardware installation, you can configure and debug the system.

Operating Environment

 Voltage input: 110V/230V (AC, alternating current)

 Temperature: 0-45°C

 Humidity: 5%-90%

To ensure endurance and stability of the Sangfor device, please ensure the following:

 The power supply is well grounded

 Dustproof measures are taken

 Working environment is well ventilated

 Indoor temperature is kept stable

This product conforms to the requirements on environment protection. The placement, usage and discard of the product should comply with the relevant national laws and regulations of the country where it is applied.

Product Appearance

Above is the front panel of a SSL VPN hardware device (M5100). The interfaces from left to right are described in the table followed:

Interface Description

CONSOLE Network interface used for high availability (HA) feature or used by device supplier to debug system.

USB

ETH0

Standard USB port, connecting to peripheral device

LAN interface, connecting to the LAN network segment; orange LED on the left

12

ETH1

ETH2

ETH3

POWER

ALARM

SANGFOR SSL M7.5 User Manual side indicates link status, while green LED on the right side indicates data flow.

DMZ interface, connecting to the DMZ network segment; orange LED on the left side indicates link status, while green LED on right side indicates data flow.

WAN1 interface, connecting to the first Internet line; orange LED on the left side indicates link status, while green LED on the right side indicates data flow.

WAN2 interface, connecting to the second Internet line; orange LED on the left side indicates link status, while green LED on the right side indicates data flow.

Power LED

Alarm LED

The picture above (M5100) is just for reference. The actual product you purchased and received may vary.

Connecting Sangfor Device

1. Deploy the Sangfor device in your network. Sangfor device can be deployed in either

Single-arm mode or Gateway mode. For details, please refer to the Device Deployment section in Chapter 3.

2. Plug the power cable into the power interface on the rear panel of the device. Attach and turn on power supply, and then watch the LEDs on the front panel of the Sangfor device.

When the device starts up, ALARM LED will turn on and keep on for 1 to 2 minutes, then turn off; POWER LED (in green) will turn on; ETH2/3 and ETH0 connection status LEDs

(in orange) will also turn on.

After successful bootup, POWER LED (in green), ETH2/3 and ETH0 connection status

LEDs (in orange) will stay on. If data are being transferred through a port, the data flow LED

(in green, beside connection status LED) will blink.

If ALARM LED stays on always, please switch off the power supply and reboot the device.

If ALARM LED still keeps on after reboot, please contact SANGFOR Customer Service.

13

SANGFOR SSL M7.5 User Manual

If the corresponding LED indicates normal working status, turn off and unplug the power supply, and perform the following steps.

3. Use RJ-45 straight-through Ethernet cable to connect the LAN interface (ETH0) to the internal network (LAN).

4. Use RJ-45 Ethernet crossover cable to connect the WAN interface (ETH2) to the external network, (i.e., router, optical fiber transceiver or ADSL Modem for external network).

Multi-line function allows multiple Internet lines to be connected to Sangfor device. When deploy multiple lines, please connect the second Internet line to WAN2 interface (ETH3) and the third Internet line to WAN3 interface (ETH4), and so on.

5. If you want the Sangfor device to provide secure protection for DMZ (Demilitarized Zone), use RJ-45 Ethernet cable to connect ETH1 interface to the devices such as Web server,

SNMP Server that provides services to external networks.

 Use crossover cable to connect WAN interface (ETH2/3) to the external network.

 Use straight-through cable to connect LAN interface (ETH0) to the internal network.

 For direct access to administrator Web console, use crossover cable to connect LAN

(ETH0) interface to the computer.

In case session cannot be established but the corresponding LED indicates normal working status, please check whether the right type of cables are being used. The differences between straight-through cable and crossover cable are shown in the figures below:

14

15

SANGFOR SSL M7.5 User Manual

SANGFOR SSL M7.5 User Manual

Chapter 2 Initial Login to Admin Console

SANGFOR SSL VPN system provides Web-based administration through HTTPS port 4430. The initial URL for administrator console access is https://10.254.254.254:4430 .

Before logging in to administrator console of SSL VPN, please ensure the following:

 Deploy a computer in the subnet where the Sangfor device resides.

 Connect the PC’s network interface card (NIC) and the Sangfor device’s ETH0 interface to a same layer-2 switch, or connect the PC’s NIC to Sangfor device’s ETH0 interface directly with a network cable.

 Ensure any IE browser is installed on the PC. Non-IE browsers Opera, Firefox, Safari and

Chrome are not supported.

Logging in to Admin Console

1. Turn on the PC and Sangfor device.

2. Add an IP address on the PC, an IP address that resides in the network segment 10.254.254.X

(for instance, 10.254.254.100) with subnet mask 255.255.255.0, as shown below:

16

SANGFOR SSL M7.5 User Manual

3. Open the IE browser and enter the SSL VPN address and HTTPS port

( https://10.254.254.254:4430 ) into the address bar. Press Enter key to visit the login page to SSL

VPN administrator Web console, as shown below:

You also can scan the QR code on above page to follow SANGFOR.

4. Enter the administrator username and password and click the Log In button. The default administrator username and password are a dmin (case-sensitive). You can also choose page language at the upper right corner of the login page as per your need .

5. For version information of the software package, click on Version below the textboxes.

Modifying Administrator Password

We strongly recommend you to change the administrator password after initial login, so as to prevent others from logging in to the administrator Web console and using default Admin credentials to make unauthorized changes on the administrator account and initial configurations.

To modify default administrator password, perform the following steps:

1. Navigate to System > Administrator to enter the Administrator Management page. The default administrator account (super administrator) is as seen in the figure below:

2. Click the account name Admin to enter the Add/Edit Administrator page (as shown

17

below):

SANGFOR SSL M7.5 User Manual

3. Modify the password and click the Save button on the above page.

 Password of the account Admin should not be shared with anyone.

 If the Sangfor device is to be maintained by several administrators, create multiple administrator accounts for segregation of duty.

18

SANGFOR SSL M7.5 User Manual

Chapter 3 System and Network Settings

After logging in to the administrator console, status of this SSL VPN and some function modules are seen at the right side of the page, and a tree of configuration modules are seen at the left side of the page.

There are five configuration modules in all:

Status: Shows the running status of the Sangfor device and the related modules.

System: Configures the related licenses of the device, network settings and other global settings such as schedule, administrator, SSL VPN options, etc.

SSL VPN: Configures the SSL VPN related settings, such as SSL VPN account, resources, roles, policy sets, remote servers and endpoint security rules and policies.

Firewall: Configures the internal firewall rule or policy of the Sangfor device.

Maintenance: Shows the logs, backups. It also enables administrator to restore configuration, restart service, reboot or shut down device.

19

SANGFOR SSL M7.5 User Manual

Viewing Status

Viewing SSL VPN Status

There are six panels showing status of SSL VPN, including System Status, External Interface

Status, Throughput, Trends of Concurrent Users, Concurrent Sessions and Byte Cache.

Each panel is selective and display criteria are configurable. To show or hide certain panel, click

Select Panel and then select or clear the checkbox next to the panel name, as shown below:

The other contents on the Status page are described as follows:

Auto Refresh: Specifies the time interval for refreshing the status automatically, or click

Refresh to refresh the page manually and immediately.

System Status: This panel shows the CPU utilization of the SSL VPN system, number of online users and locked users as well as status of SSL VPN service.

View is a link to the

Online User page or Hardware ID page.

20

SANGFOR SSL M7.5 User Manual

Stop Service: Click this button to stop the SSL VPN service.

External Interface Status: This panel shows the status of the external interfaces and Internet, including information of the outbound and inbound speed, Internet connection.

Throughput: This panel shows the overall outbound and inbound speed in graph.

Click the Settings icon (at the upper right of the panel) to specify display criteria, such as time period (realtime, last 24 hours or last 7 days), Internet line and the unit of traffic speed, as shown below:

Trends of Concurrent Users: This panel shows the number of users that are using SSL VPN concurrently during certain period of time, as shown below:

Click the Settings icon (at the upper right of the panel) to specify time period (realtime, last 24 hours or last 7 days), as shown below:

Concurrent Sessions: This panel shows the concurrent sessions initiated by users currently or during certain period of time, as shown below:

Click the Settings icon last 24 hours or last 7 days).

(at the upper right of the panel) to specify time period (realtime,

21

SANGFOR SSL M7.5 User Manual

Byte Cache: This panel shows the byte cache status and optimization effect brought by byte caching, as shown below:

Click the Settings icon (at the upper right of the panel) to specify display criteria, such as time period (realtime, last 24 hours or last 7 days) and direction of traffic speed

(inbound&outbound, outbound or inbound), as shown below:

Viewing Online Users

Navigate to Status > SSL VPN > Online User to view information of the online users, such as number of users connecting to the SSL VPN, the time when these online users connected, the mount of received/sent bytes, as well as the outbound and inbound speed. Administrator can disconnect or disable any of these online users.

The Online Users page is as shown below:

The following are the contents included on Online Users page:

Auto Refresh: Specifies the time interval for refreshing this page, or click Refresh to refresh the page manually and immediately.

Disconnect: Click it and select an option to disconnect, or disconnect and disable the

22

selected user(s), as shown below:

SANGFOR SSL M7.5 User Manual

If Disconnect is selected, the selected user will be forced to disconnect from the SSL VPN.

If Disconnect&Disable is selected and Apply button is clicked (on the pop-up bar at the top of the page), the selected user will be forced to disconnect with SSL VPN after are clicked and be prohibited from logging in again until it is unlocked.

Send Msg: Click it to write and send a message to the selected or all SSL VPN user(s), as shown below:

After receiver is selected, write the message, as shown below:

Click the OK button and the online end user(s) will see the system broadcasting prompt, as shown below:

23

SANGFOR SSL M7.5 User Manual

Viewing Alarm Logs

Navigate to Status > SSL VPN > Alarm Logs to view the alarm-related logs on the Sangfor device, as shown below:

The following are the contents included on Alarm Logs page:

Delete: Click it and the selected alarm log(s) will be removed from the log list.

Select: Click it and three options appear, namely, Current page, All pages and Deselect.

If Current page option is selected, all the logs displayed on this page will be selected.

If All pages option is selected, all the logs (including those on all other pages that are not displayed) will be selected.

If Deselect is selected, all the selected logs will be deselected, as shown in the figure below:

Alarm-Triggering Event: Click it to enter the Alarm-Triggering Event page to specify the event(s) that can trigger email alarm.

24

SANGFOR SSL M7.5 User Manual

The following are the contents included on the Alarm-Triggering Event page:

Line failure: Indicates that there is something wrong with Internet line.

Insufficient SSL VPN user licenses: Indicates the number of concurrent users that are connecting to SSL VPN reaches the maximum number of licenses.

Long-lasting high CPU utilization (over 90%): Indicates that the CPU utilization is too high (above 90%) during 120 seconds. Once it reaches the threshold, the system will send an email to the specified email address to notify the administrator of that, and do so when the CPU utilization of the system returns to normal.

Insufficient memory (free space below 10%): Once system memory keeps insufficient

(below 10%) for 4 minutes, the system will send an email to the specified email address to notify the administrator of that, and do so when the system memory returns to normal.

Clustered node status changes: Once any node of the cluster changes status, the system will send an email to the specified email address to notify the administrator of that.

Byte cache disk runs out: When the byte cache runs out of the assigned disk space, the system will email an alarm event to the specified email address to notify the administrator of that.

Connecting to WebAgent fails: If the WebAgent is inaccessible, the system will email an alarm event to the specified email address to notify the administrator of that.

25

SANGFOR SSL M7.5 User Manual

Admin tries brute-force login: If an administrator successively fails to log in to the

SSL VPN administrator console too many times, the system will email an alarm event to the specified email address to notify the administrator of that.

User tries brute-force login: If a VPN user successively fails to log in to SSL VPN too many times, the system will email an alarm event to the specified email address to notify the administrator of that.

Remote application anomaly: Indicates that the system will generate remote application related alarm once error arises from remote application, and will email an alarm event to the specified email address to notify the administrator of that.

Certificate is about to expire: Indicates that system will generate related alarm once certificate is about to expire, and will email an alarm event to the specified email address to notify the administrator of that.

CF card/disk related: Indicates that the system will generate CF card/disk related alarm once error arises from CF card/disk, and will email an alarm event to the specified email address to notify the administrator of that.

Email Alarm: Click it to enter Email Alarm page. Select the checkbox next to Enable

Email Alarm and configure email recipient and subject. An email notification will be sent to the email address once alarm is triggered by any of the specified alarm-triggering event(s).

Click Send Test Email, and system will send a test email to specified email address automatically.

Click SMTP, and you will be redirected to Status > SSL VPN > SMTP page. For more, refer to Configuring SMTP Server section in Chapter 3.

Viewing Remote Application

Navigate to Status > SSL VPN > Remote Application to view the information and status of the remote application servers that provide services to users over SSL VPN, as shown below:

26

SANGFOR SSL M7.5 User Manual

The above page shows information of the remote servers, including name, address, sessions and status of the remote application server, maximum number of concurrent sessions.

The following are the contents included on Remote Application page:

View: Indicates the object showing up on this page. Options are Servers and Applications, as shown below:

Servers: Mainly offers the information of the involved servers that are providing services to

VPN users. They are the servers configured in SSL VPN > Remote Servers. The page is as shown below:

To view users that are currently connecting to a server, click on server name and the user detailed information of the user is seen, as shown in the figure below:

End Session: Select a desired user and then click it, and the session(s) established between the selected user and that server will be ended.

To view resource usage of a app server, click View in Trends column, as shown below:

27

SANGFOR SSL M7.5 User Manual

To view system resource usage of storage server over the last 24 hours, click View in Trends column, as shown below:

Applications: Mainly offers the information of the involved services that are being accessed by SSL VPN users and presents the use of these services since they have been invoked by the requested resource. They are the application programs configured in SSL VPN > Remote

Servers, as shown below:

28

SANGFOR SSL M7.5 User Manual

To view the users accessing an application, click the application name or View User, information of the users involved are as shown in the figure below:

End Session: Select a desired user and then click it, and the session(s) established between the selected user and that application will be ended.

29

SANGFOR SSL M7.5 User Manual

System Settings

System settings refer to the settings under System module, including System, Network, Schedule,

Administrator and SSL VPN Options.

Configuring System Related Settings

Navigate to System > System and the seven pages are seen, namely, Licensing, Date/Time,

Console Options, External Report Center, Device Certificate, SMTP, Syslog and SNMP, as shown below:

Configuring License of Device and Function Modules

Navigate to System > System > Licensing to activate the license or modify the license key related to this device and each function module.

Under License of Device are the license of this Sangfor device and other authorization you have bought from SANGFOR. Under License of Each Module are licenses that are optional for

Sangfor device. Once license of a function module is activated and that feature is enabled, the corresponding module will work.

The following are the contents included on Licensing page:

Cross-ISP Access Optimization: Cross-ISP access optimization function is an optional function offered by SANGFOR SSL VPN, which helps to facilitate and optimize the data transmission among links provided by different Internet Service Operators (ISP, in China, for example, there are China Telecom, China Netcom, etc). Click Activate to enter license key for Cross-ISP access optimization feature, as shown below:

30

SANGFOR SSL M7.5 User Manual

Upgrade License: The license is used to update the current SANGFOR SSL VPN system with Sangfor Firmware Updater 6.0 (for more details, refer to Appendix B: Sangfor

Firmware Updater 6.0). Every upgrade license has an expiry date, which means prior to this date you can update this device to keep the software version up-to-date.

License Key: Indicates the license of this Sangfor device. The device license determines some other authorization, more specifically, the maximum number of Internet lines and maximum number of connecting VPN users.

Lines: Indicates the maximum number of Internet lines that this Sangfor device can be connected to.

SSL VPN Users: Indicates the maximum number of SSL VPN users that are allowed to access the SSL VPN concurrently.

SSO: With this license, Single Sign-On (SSO) feature can apply to users’ access to the SSL

VPN.

SMS Authentication: With this license, SMS authentication could be enabled to add variety to the authentication methods applying to users' secure access to the SSL VPN. This type of authentication requires the connecting users to enter SMS password that has been sent to their mobile phones.

Byte Cache: Byte cache is an additional but optional network optimization function offered by the SANGFOR SSL VPN. With byte cache being enabled, time for data transmission and bandwidth consumption will be dramatically reduced.

One-Way Acceleration: This license allows you to enable one-way acceleration to optimize transmission rate in high-latency network.

Cluster: This license allows you to enable cluster to couple some scattered Sangfor devices.

It is known that cluster can achieve unified management and greatly improve the performance, availability, reliability of the “network” of Sangfor devices.

Remote Application: With this license, applications launched by remote server can be accessed remotely through SSL VPN by end users from any location, as if they are running on the end user’s local computer.

Max Remote App Users: Indicates the maximum number of users that can access the remote application resources.

Application Wrapping License: This license allows you to wrap application before it is published to users.

31

SANGFOR SSL M7.5 User Manual

EMM License: With this license activated, enterprise mobility management (EMM) is enabled.

Activate: Click this button and then enter the corresponding license key to activate the license.

Modify: Click this button and enter the new license key (or value) to modify the license key

(or number of mobile Sangfor VPN users).

Modifying System Date and Time

1. Navigate to System > System > Date/Time to enter Date/Time page, as shown below:

2. Configure the following:

Date: Specifies the date. To select date, click the icon .

Time: Specifies the time. Enter the time into this field and set it as the current time of this Sangfor device. Date format should be hh: mm: ss.

Sync with Local PC: Click this button to synchronize the date and time of the Sangfor device with your computer.

Synchronize time with NTP server regularly: Select it to specify NTP server.

Update Now: Click on it to synchronize time of Sangfor device with NTP server.

3. Click the Save button to save the settings, or click the Cancel button not to save the changes.

Modifying system date or time requires all services to restart.

32

SANGFOR SSL M7.5 User Manual

Configuring Console Options

1. Navigate to System > System > Console Options to enter Console Options page, as shown below:

2. Configure the following:

Device Name: Specifies the name of the Sangfor device, which helps to distinguish it from other clustered nodes if this device joins cluster.

HTTPS Port: Specifies the HTTPS port used for logging in to this Sangfor device. The default is 4430.

HTTP Port: Specifies the HTTP port used for logging in to this Sangfor device. The default is 1000.

Timeout: Specifies the period of time before administrator is forced to log out of the administrator console if no operation is performed.

Remote Maintenance: Indicates whether to enable or disable administrator to manage this Sangfor device via the WAN interface.

3. Click the Save button to save the settings on this page; otherwise, click the Cancel button.

Configuring External Report Center

Logs generated by Sangfor device can be sent to external report center, such as system logs, user logs, operation logs, alarm logs, etc. Navigate to System > System > External Report Center to enter the External Report Center page, as shown below:

33

SANGFOR SSL M7.5 User Manual

The following are the contents included on this page:

Send logs to external report Center: If it is selected, logs will be sent to external report center.

Server IP: Specifies the IP address of external report center server.

Port: Specifies a port used to communicate with external report center server. Default is

9501.

Sync Password, Confirm: Specifies and confirms sync password for device synchronizing with external report center server. It must be the same as that configured on external report center server.

Test Connectivity: Click it to test the connectivity between the device and external report center server.

Click Save to save the changes; otherwise, click Cancel button.

Generating Certificate for Sangfor Device

Device certificate is intended for establishing sessions between the Sangfor device and client.

Sangfor device supports RSA and SM2 encryption protocol standards. To view current certificate of or to generate certificate for the Sangfor device, navigate to System > System > Device

Certificate, as shown in the figure below:

34

SANGFOR SSL M7.5 User Manual

The following are the contents included on the Device Certificate page:

View: Click it to view the detailed information of the current certificate.

Download: Click it to download the current device certificate.

Update: Click it to import a new certificate to take the place of the current one.

Certificate/USB Key Based Authentication: Click it to configure Certificate/USB key based authentication (for more details, refer to the Certificate/USB Key Based Authentication section in Chapter 4).

Create a CSR for device: Click this button to generate a certificate signing request (CSR) which should be sent to the external CA to generate the device certificate, and configure the required fields, as shown below:

35

SANGFOR SSL M7.5 User Manual

Then click the OK button.

Once the certificate signing request is generated, click the Download link to download the request.

Update: Click it to import the new external-CA-issued device certificate into the Sangfor device to replace the old one.

Process Pending Request: Click it enter the following page:

If you select Process pending request and install certificate and click Next, you need to select a certificate you want to install, as show below:

36

SANGFOR SSL M7.5 User Manual

Click Browse to select a certificate from you local PC, and click Finish to save the settings.

The certificate you want to import must be .crt or .cer.

Configuring SMTP Server

1. Navigate to System > System > SMTP to enter the SMTP page, as shown below:

2. Configure the following:

SMTP Server IP: Specifies the IP address of the SMTP server.

Port: Specifies the port number used by this SMTP server to provide email delivery related services.

37

SANGFOR SSL M7.5 User Manual

Authentication: Select Authentication required and then configure Username and

Password, if this SMTP server requires identity verification.

Sender Address:Specifies email address of sender.

Email Language: Specifies language of email sent by server.

Send Test Email: Click this button to send an email to the specified recipient

(configured under Status > Alarm Logs > Email Alarm) to check whether this SMTP server works normally.

3. Click Save to save the settings on this page; otherwise, click Cancel.

Configuring Syslog Server

1. Navigate to System > System > Syslog to enter the Syslog page, as shown below:

2. Configure the following contents on Syslog page:

Enabled: Select it to enable logs to be sent to Syslog server.

Syslog Server: Specifies IP address of Syslog server.

Port: Specifies the port number used by the device to communicate with Syslog server.

Admin logs: Select it to allow the admin logs to be outputted to Syslog server.

System Logs: If it is selected, system logs of and above the specified level will be outputted.

Lowest Severity: Specifies the severity level of system logs.

User logs:If it is selected, user logs can be sent to Syslog server.

38

SANGFOR SSL M7.5 User Manual

Login/logout: Select it and system will generate logs when user logs in or log out of device, and the logs can be sent to syslog server.

Resource access: If it is selected, massive logs will be outputted. It is not recommended .

3. Click Save to save the changes; otherwise, click Cancel.

Configuring SNMP

SNMP(Simple Network Management Protocol) is used to communicate with SNMP management software or SNMP server in customer network.

39

SANGFOR SSL M7.5 User Manual

Network Settings

Device Deployment

Sangfor device can work in two modes, Single-Arm mode and Gateway mode. Deployment mode is configured in System > Network > Deployment.

If Single-arm mode is selected, the Deployment page is as shown in the figure below:

The following are the contents included on the Deployment page when Single-arm is selected:

(LAN) IP Address: Configures the IP address of the internal interface, LAN. This IP address must be identical as the physical LAN interface IP of the Sangfor device.

Netmask: Configures the netmask of the LAN interface IP.

Default Gateway: Configures the default gateway of the LAN interface.

(DMZ) IP Address: Configures the IP address of the internal interface, DMZ.

Netmask: Configures the netmask of the DMZ interface IP.

Link Status: Indicates the connection status of internal and external interfaces of the Sangfor device, whether the network cables are plugged in.

Preferred DNS: Configures the primary DNS server.

Alternate DNS: Configures the secondary DNS server.

If Gateway mode is selected, the Deployment page is as shown in the figure below:

40

SANGFOR SSL M7.5 User Manual

The following are the contents included on the Deployment page when Gateway is selected:

(LAN) IP Address: Configures the IP address of the internal interface, LAN. This IP address must be identical as the physical LAN interface IP of the Sangfor device.

Netmask: Configures the netmask of the LAN interface IP.

(DMZ) IP Address: Configures the IP address of the internal interface, DMZ.

Netmask: Configures the netmask of the DMZ interface IP.

Link Status: Indicates the connection status of internal and external interfaces of the Sangfor device, whether the network cables are plugged in.

External Interfaces: External interfaces are WAN interfaces of the Sangfor device. To set a

WAN interface, click on the name and the attributes of the corresponding Internet line appears, as shown in the figure below:

41

SANGFOR SSL M7.5 User Manual

The following are the contents included on the Edit Line page, when line type is Ethernet:

Enable this line: Select this option and this line will be enabled.

Line Type: Options are Ethernet or PPPoE.

If line type Ethernet is selected, the fields under Ethernet Settings should be configured, so that the Internet line would be assigned IP address and DNS server.

IP address and DNS server could be assigned automatically or configured manually. The former is achieved by selecting the option Obtain IP and DNS server using DHCP, and the latter means that administrator needs to select the option Use the IP and DNS

server below and configure the IP address, default gateway and DNS servers.

Multi-IP: This button is only available for Ethernet type of Internet line, which means multiple IP addresses can be set on WAN interface. Click this button and the following dialog pops up, as shown below:

42

SANGFOR SSL M7.5 User Manual

To add a new IP address entry, click Add.

To remove an IP address from the list, select the desired entry and click Delete.

In gateway mode, LAN, DMZ, and WAN interfaces cannot be configured on the same subnet.

If line type PPPoE is selected, the fields under PPPoE Settings should be configured, as shown in the figure below:

Username, Password: Configure the ADSL account to get dialup access.

Automatically connect: Select the checkbox next to this option if Sangfor device automatically dials up when Internet connection is dropped.

The changes apply after settings are saved (click the Save button) and services restart. Once the changes have applied, go to this page again to and click the

Connect button to dial up immediately.

For detailed information of dialup, click Details.

Options: Click this button to enter the PPPoE Properties page and configure the parameters for dialup, such as handshake time, timeout, and max tries. Defaults are recommended to be adopted.

43

SANGFOR SSL M7.5 User Manual

Setting Multiline Options

If the Sangfor device needs more than one lines to connect to its WAN interfaces (including the case that Sangfor device is deployed in Single-arm mode), multiline policies should be enabled and configured, more exactly, all the internet lines should be configured.

1. Navigate to System > Network > Multiline Options to configure the multiline options.

The Multiline Options page is as shown below, when deployment mode is Single-arm:

The Multiline Options page is as shown below, when deployment mode is Gateway:

44

SANGFOR SSL M7.5 User Manual

2. Configure Multiline Policy of Sangfor VPN.

Allow Sangfor VPN to Use Multiple Lines: Select this option to enable the multiline policy of Sangfor VPN, the configured Internet lines will be available for users’ access to Sangfor VPN.

To add a line, click Add. The following figure shows the Add Line for Sangfor VPN page while the deployment mode is Gateway:

Name the line, enter the IP address and gateway and specify whether or not this line uses a static IP address. If the line is to use a static Internet IP address, configure IP

Address field.

Enable extranet connection detection: Select this option and configure Interval, and connection status of this line will be detected periodically.

3. Configure Multiline Policy of SSL VPN.

Allow SSL VPN to Use Multiple Lines: Select this option to enable the multiline policy of SSL VPN, if the SSL VPN is to use multiple lines. Then add the lines into the line list, as shown below:

45

SANGFOR SSL M7.5 User Manual

Once multiline policy of SSL VPN is enabled, the line selection policy will help the system automatically detect the lines and choose the optimal one to let the user connect in faster when it accesses the SSL VPN, improving the data transfer and stability of SSL VPN connections.

SSL VPN users connect in directly(local device owns public IP): If Sangfor device is deployed in gateway mode, and owns public IP, then VPN user can connect it directly.

 SSL VPN users connect in via front-end device(local device owns no public IP

address): If Sangfor device is deployed on Intranet and does not own public IP, then

VPN users connect in via front-end device.

 If the Sangfor device is deployed in gateway mode and SSL VPN users connect in via

front-end device(local device owns no public IP address) option is selected, and needs to use multiple Internet lines, map front-end network device’s public addresses to the

Sangfor device and launch the ports, simply by configuring port mapping rules under

Lines Of Front-End Device. To do that, click Add to enter the Edit Line for SSL VPN page, as shown below

Configure the fields included on the Add Line for SSL VPN page:

Line IP/Domain: Specifies the IP address or domain name of the Internet line.

Priority: Specifies the priority of this line. The higher the priority is, this line is more likely to be used.

HTTP Port: Specifies the HTTP port of the front-end device that is to be mapped

46

SANGFOR SSL M7.5 User Manual to the Sangfor device.

HTTPS Port: Specifies the HTTPS port of the front-end device that is to be mapped to the Sangfor device.

 Click Settings to specify line priority and select whether to eliminate security certificate alert, as shown below:

If Eliminate security certificate alert is selected, you need to specify domain name of the line, browser will not prompt certificate security alert any more when user visits

SSL VPN login page.

If the login policy selected is Users use different login pages (under System > SSL

VPN Options > Logging in > Login Policy), multiline policy of SSL VPN is disabled by default and unavailable, which means SSL VPN cannot use multiple lines.

4. Configure the Line Selection Policy which will apply to the Internet access data sent from/to computers in the local area network and handled by the Sangfor device.

This is available when Sangfor device is deployed in Gateway mode, as shown below:

47

SANGFOR SSL M7.5 User Manual

The following are the four line selection methods:

Select the line that owns the largest remaining inbound bandwidth: Indicates that the system will automatically select the line that owns the largest remaining inbound bandwidth, to make full use of the remaining bandwidth.

Select the line that owns the largest remaining outbound bandwidth: Indicates that the system will automatically select the line that owns the largest remaining outbound bandwidth, to make full use of the remaining bandwidth.

Evenly assign the sessions to each line: Indicates that the system will evenly assign the sessions to each line automatically, without considering the remaining bandwidth.

Prefer the first available line(network interface) in the list: Indicates that the system will select the valid line that has been firstly enabled. In case that line fault or unavailability appears, it automatically switches to the next available line.

5. Click the Save button and that Apply button to save and apply the settings.

For more detail about configuring multiple lines, refer to Device Deployment in Chapter 7.

Configuring Route

Route can route data of the Sangfor device itself, and route the data (either VPN data or VPN irrelevant data) to the Sangfor device, which then will forward the data to destination. To add a new route, perform the steps below:

1. Navigate to System > Network > Routes to enter Routes page, as shown below:

48

SANGFOR SSL M7.5 User Manual

2. Click Add > Routes or Multiple routes to add a single route or a batch of routes, as shown below:

3. Enter the destination subnet, network mask and gateway. The following two figures show the two cases of adding a single route and a batch of routes.

49

SANGFOR SSL M7.5 User Manual

Configuring Host Mapping Rule (HOSTS)

HOSTS file is the built-in host file (more specifically, the mapping information of the IP addresses and domain name/hostnames) on the Sangfor device. This file works when SSL VPN users need to access Web resources using domain name or host name, generally in the situation that the internal network (where the Sangfor device resides) is using MS Active Directory.

To add a new Host entry or a batch of Host entries:

1. Navigate to System > Network > Hosts to enter Hosts page, as shown below:

2. Click Add > Host entry or Multiple host entries, as shown below:

If Host entry is selected, the page pops up as follows. Specify the fields on this page.

The following are the contents included on the Add Host Entry page:

IP Address: Indicates the IP address of the server providing resources.

Host Name: Indicates the host name of the server providing resources.

Comment: Description to this host mapping rule.

If Multiple host entries is selected, the pop-up page is as shown below. Enter the IP address and domain into the text box in the format as required.

50

SANGFOR SSL M7.5 User Manual

Configuring IP Assignment Options (DHCP)

Navigate to System > Network > DHCP > Options to view Status of DHCP service and configure the Options. Status tab shows the running status of the DHCP service, the IP addresses that are assigned through each network interface, the related hostname, MAC address, and lease time left; while Options tab contains the DHCP related settings, as shown below:

51

SANGFOR SSL M7.5 User Manual

The following are the contents included on Options tab:

DHCP Service: Click Enabled or Disabled to enable or disable the DHCP service.

Lease: Indicates the DHCP IP address lease, the life cycle that an assigned IP address will be used by the corresponding user.

IP Address Assignment: Configure the IP address range that can be assigned to the SSL

VPN users by each interface.

To view and assign IP address to a network interface, perform the steps below:

1. Click on the name of a network interface to enter the IP Address Assignment page;

2. Configure the IP range, gateway and DNS server address, as shown below:

52

SANGFOR SSL M7.5 User Manual

3. Click the OK button to save the settings.

 In case that some LAN computers are using static private IP addresses, the IP address range configured above should not cover any of those static IP addresses, otherwise, IP address conflict will occur after those IP addresses are assigned to VPN users automatically.

 Generally, the IP address range configured above should not cover the first and the last

IP address of a network segment, for these two IP addresses are network address and broadcast address of a network segment. The correct input is like 192.168.1.1

-192.168.1.254.

Reserved IP Address: The address is reserved IP address (range) for specific host. To reserve IP address for a user, click Add to enter the Reserve New IP Address page, as shown below:

The fields on this page are described as follows:

Interface: Specifies the network interface of this DHCP rule.

53

SANGFOR SSL M7.5 User Manual

IP Address: Specifies the IP address that to be reserved for certain computer. The reserved IP address will not be assigned to VPN users.

Obtain Host Name/MAC: Click this button to obtain the MAC address and host name of the host for which this IP address is reserved.

MAC Address: Specifies MAC address of the host which the IP address is reserved for.

Host Name: Specifies the name of the host which the IP address is reserved for.

Configuring Local Subnet

Local subnets are subnets thought in the LAN where this Sangfor device resides. Configuring local subnet is intended for the case that the VPN users want to communicate with the other subnets of the headquarters (HQ) network.

Assume that the HQ has two subnets (192.200.200.x and 192.200.254.x); the subnet

192.200.200.x is a network segment that is directly connected to the Sangfor device, while the subnet 192.200.254.x is indirectly connected to the Sangfor device. To add a local subnet entry,

1. Navigate to System > Network > Local Subnets to enter Local Subnets page, as shown below:

2. Click Add > Subnet or Multiple subnets, as shown below:

If Subnet is selected, the Add Subnet page appears. Configure the subnet, as shown below:

54

SANGFOR SSL M7.5 User Manual

Since the subnet 192.200.254.x indirectly connects to the Sangfor device (which resides in a different network segment), enter the IP address and netmask into the corresponding fields and then click the Save button.

If Multiple subnets is selected, one subnet or multiple subnets can be added at one step. The

Add Multiple Subnet – Edit Subnet Info page is as shown in the figure below:

The local subnets are deemed as network segments of VPN by the Sangfor device and the client software, which means all the data sent from (or to) these network segments through the Sangfor device or software will be encapsulated into and transmitted through the VPN tunnels. For this reason, if you want to allow the VPN users to access certain subnet, add the related subnet into the list on the Local Subnets page and then go to the Routes page to configure a corresponding route.

When adding subnet, you can add the network segment overlapping with that in which the

LAN interface of Sangfor device resides. When corresponding policy is distributed, the overlapped network segment will be discarded, in order to ensure normal communication.

55

SANGFOR SSL M7.5 User Manual

Schedules

A schedule is a combination of time segments, which can be referenced by SSL VPN account settings, firewall filter rules, user privilege settings and endpoint security rules. The date and time are based on the system time of the Sangfor device.

To create a schedule, for example, named Office hours that consists of time segments 8: 00-12: 00 and 14: 00-18: 00, from Monday to Friday:

1. Navigate to System > Schedule, as shown in the figure below:

2. Click Add to add a new schedule, as shown below:

3. Enter the name into the Name field (in this scenario, it is Office hours). Description is optional.

4. Click and drag over the grids to select the desired time segment (8: 00-12: 00, from Monday to Friday). A prompt dialog will display the exact time segment selected, as shown below:

56

SANGFOR SSL M7.5 User Manual

5. Click the Select button to select the time segment, as shown below:

6. Go on to select the other time segment (14: 00-18: 00, from Monday to Friday) in the same way, as shown below:

7. Click the Select button to select the time segment, as shown below:

57

SANGFOR SSL M7.5 User Manual

8. Click Save to save the settings on this page. The newly-created schedule will show in the schedule list, as shown below:

To deselect and remove a time segment from the schedule, perform the steps below:

1. Click on and drag over the green grids (selected time segments) to select the time segment that you want to deselect. A prompt dialog will display the exact time segment selected, as shown below:

2. Click Deselect to deselect the time segment that has turned to light blue (while green grid indicates that the time segments are selected, and white grid indicates that the time segments are unselected).

3. In case that the selected time segment (in green) and the desired time segment (in light blue) lap, as shown below:

58

SANGFOR SSL M7.5 User Manual

 To select this part, click the Select button, and the grids in light blue (including the overlapped part) will turn to green, being selected, as shown below:

 Or click Deselect, the grids in light blue (including the overlapped part) will turn to white, being removed, as shown below:

59

SANGFOR SSL M7.5 User Manual

Administrator

Through administrator management feature, super administrator of the Sangfor device can create administrators for others to maintain the SSL VPN server.

An administrator can be put into certain group and so be granted with restricted administrative privileges. The Administrator page is shown in the figure below:

The following are some contents included on Administrator page:

Unfold All: Select the checkbox next to it and the subgroups and individual administrators of the selected administrator group (in the left pane) will be seen on the right pane.

Edit, Delete: To edit or delete an administrator or administrator group, select that administrator or administrator group and click Edit or Delete.

View Active Administrators: Click this link to view the administrators that are accessing the administrator Web console currently.

Adding Administrator Group

1. Click Add > Admin group to enter Add/Edit Administrator Group page, as shown below:

2. Configure Basic Attributes and Administrative Privileges and Realms of the administrator group, as shown below:

60

SANGFOR SSL M7.5 User Manual

The following are the information of administrator group:

Name: Specifies the username of the administrator group.

Description: Descriptive information of the administrator group.

Added To: Specifies the administrator group to which this administrator group will be added. This group determines the administrative privileges and realms of this administrator group.

Administrative Privileges: Specifies the configuration modules that the administrator in this group could maintain. Select the checkbox next to each module name and the administrators in this administrator group will be authorized to configure that module.

Realms: Specifies the administrative realms (users, resources and roles) for the administrators in this administrator group, as shown below:

3. Click the Save button to save the settings.

61

SANGFOR SSL M7.5 User Manual

Adding Administrator

1. Click Add > Admin to enter Add/Edit Administrator page, as shown below:

2. Configure Basic Attributes and Login IP Address of the administrator, as shown below:

The following are the information of administrator:

Name: Specifies the username of the administrator account that can used to log in to the administrator console of SSL VPN.

Description: Descriptive information of the administrator account.

Type: Specifies the account type. Options are Admin and Guest. Administrators of

Admin type have the specified administrative privileges to configure some modules through the administrator console; while the administrators of Guest type only have read-only privilege to view the configurations of modules that are specified for that administrator group.

Password, Confirm: Respectively specifies and confirms password of the account that is used by administrator to log in to SSL VPN administrator console.

Added To: Specifies the administrator group to which this administrator account will be added. This group determines the administrative privileges and realms of this

62

SANGFOR SSL M7.5 User Manual administrator.

Login IP Address: Specifies the IP address on which this account can be used by the administrator to log in to the SSL VPN administrator console.

3. Click the Save button to save the settings.

The administrator password is valid if it matches all the following:

 It must contain at least 8 characters.

 It cannot contain username of administrator.

 It must contain any two of the following: upper-case letters, lower-case letters, digits, special characters.

The administrative privilege of an administrator group will never be higher than its parent administrator group. That is to say, administrators’ privilege of maintaining SSL VPN users, resources and roles is authorized by the parent group and will not be more or higher than that.

63

SANGFOR SSL M7.5 User Manual

SSL VPN Options

General Settings

The basic (SSL VPN related) settings under System > SSL VPN Options > General are global settings, including user login options, client options, virtual IP address pool, Single Sign-On (SSO) and resource options.

Configuring User Login Options

1. Navigate to System > SSL VPN Options > General > Login, as shown in the figure below:

64

SANGFOR SSL M7.5 User Manual

2. Configure the following fields under Login Port.

Login Port: Specifies the HTTPS and HTTP port on which the SSL VPN service is being listened.

HTTPS Port: Specifies the HTTPS listening port. It is TCP 443 by default. Enter the port(s) into the field (ports should be separated by comma) or click the Configure button.

HTTP Port: Select this option and enter the HTTP listening port. It is TCP 80 by default.

3. Configure the following fields under Login PPTP/L2TP Connection Options.

Prohibit PPTP/L2TP incoming connection: If it is selected, PPTP/L2TP connection will be denied.

Permit PPTP incoming connection: Select it to allow PPTP incoming connection, and user can access L3VPN resources on mobile phone via VPN.

Permit L2TP incoming connection: Select it to allow L2TP incoming connection. If it is selected, you need to specify L2TP shared secret.

L2TP Shared Secret: Specifies L2TP shared secret, then user can access L3VPN resources on mobile phone via built-in L2TP VPN.

For users accessing VPN though PPTP/L2TP, they can be authenticated on MS Active Directory.

To do that, you need to configure as follows: a. Click LDAP Authentication to enter Add/Edit LDAP Server page, and configure LDAP server to make Sangfor device connect to this server.

65

SANGFOR SSL M7.5 User Manual b. Click AD domain to enter the Client-side Domain SSO page, enable SSO and configure required fields on that page.

 Do not modify the ports unless it is absolutely necessary. Once the port is altered, the new port number should be entered to the end of the URL address when endpoint user enters the address to connect SSL VPN.

 If the checkbox next to HTTP Port is selected, user can use HTTP protocol to communicate with the SSL VPN. Access to SSL VPN is achieved by redirecting HTTP to HTTPS, for instance, http://202.96.137.75 is redirected to https://202.96.137.75. If

HTTP Port is selected and configured, user can only use HTTPS protocol, in which case, he/she needs to visit https://202.96.137.75.

 If Permit L2TP incoming connection is selected, user will be denied to connect to

VPN through standard IPSec VPN, while users will be allowed to connect to VPN through Sangfor IPSec VPN.

4. Select encryption protocol for encrypting data. Options are RSA, SM2, SSL3.0, SSL1.0,

SSL1.1, SSL1.2, as shown below:

5. Configure WebAgent Settings. Select Enable WebAgent for dynamic IP support to enable this feature, and the Sangfor device will be able to get an IP using WebAgent dynamic addressing if it is not using a static Internet IP address. To add a Webagent entry: a. Click Add to enter the Add WebAgent page, as shown below: b. Enter the WebAgent address into the Address field and click the OK button.

c. To check connectivity of a WebAgent, select a WebAgent and click Test. If the address is correct, the Sangfor device can connect to this WebAgent; otherwise, connecting will fail, as shown in the figure below:

66

SANGFOR SSL M7.5 User Manual

Before test begins, certain ActiveX control may need be installed (as shown below).

Click the Check ActiveX Status button to check whether ActiveX control has been installed. If not, click the Install button and follow the instructions to install the

ActiveX control.

d. To remove or edit a WebAgent entry, select the desired entry and click Delete or Edit.

e. To modify password of a WebAgent select the desire entry and click Modify PWD.

Modifying password can prevent unauthorized user from using and updating a false IP address into the WebAgent page, f.

To refresh the status of the WebAgent, click Refresh.

6. Configure Defense Against Man-in-the-Middle Attack option.

Select Enable defense against man-in-the-middle attack option and the user will be required to enter the word verification code and be forced to install the related controls. This feature protects the transmitted data from being altered or intercepted by unauthorized user.

7. Click the Save button to save the settings.

Configuring Client Related Options

Client related options are settings related to the SSL VPN Client software and end users’ access to

SSL VPN at the endpoint.

67

SANGFOR SSL M7.5 User Manual

1. Navigate to System > SSL VPN Options > General > Client Options to Client Options page, as shown in the figure below:

2. Configure the contents under Client Options:

Enable system try: System tray is a taskbar status area showing status of and configure

SSL VPN on the client end. Select this option and the browser window can minimize to a system tray when Resource page is closed.

Put the cursor on the System Tray icon and the brief information of SSL VPN connection status is seen, as shown in the figure below:

Password can be remembered: Select the checkbox next to this option and the SSL

VPN Client will remember the SSL VPN login account (username and password) user entered if user selects the option Remember me when he/she uses SSL VPN Client program to connect SSL VPN, as shown in the figure below:

68

SANGFOR SSL M7.5 User Manual

Allow automatic login: Select this option to allow connecting users to use automatic login feature when they connect to SSL VPN. This option depends on Password can be

remembered option, which means that if you select this option, and Password can be

remembered option will be selected together.

Allow being online always: If selected, client will try reconnecting to VPN again and again after disconnected from VPN. It is used for the unattended endpoint.

Show host address for TCP/L3VPN resource: If selected, host address for

TCP/L3VPN resource will be displayed on Resources page; otherwise, only resource name will be displayed after user logs in to SSL VPN.

Display resources the moment user logs in using SSL VPN client: If selected, associated resources list will be displayed after user logs in using SSL VPN client successfully.

69

SANGFOR SSL M7.5 User Manual

Do not show up: If selected, floating toolbar of Web resource will not show up.

Show up: If selected, floating toolbar of Web resource will show up.

JRE Download Address: Click this link and specify JRE download address.

Connecting users must download and install JRE installation package before accessing

TCP and L3VPN resources with Firefox browser on Linux. The JRE Download

Address page is as shown in the figure below:

3. Customize shortcut icon of VPN client on Windows PC or mobile phone:

Client on Windows PC: Click it to enter the following page:

Shortcut icon will be created automatically after user logs in to SSL VPN. If you want to change shortcut icon of system tray, click Upload to upload a new icon from local PC to take place of the old one. And you can edit the name of shortcut icon in Shortcut Name field.

Client on Mobile Device: It is used for the user logs in SSL VPN using EasyConnect on mobile device, such as mobile phone, tablet, etc. Click it to enter the following page:

70

SANGFOR SSL M7.5 User Manual

Click Upload New to upload a new icon file from local device, or click Restore Default to use default logo of VPN client on mobile device.

Configuring Virtual IP Pool

Virtual IP addresses are assigned to users who are to access L3VPN, Web and TCP applications over SSL VPN.

Navigate to System > SSL VPN Options > General > Virtual IP Pool and the Virtual IP Pool page appears, as shown in the figure below:

The following are the contents included on the Virtual IP Pool page:

IP Range: Range of IP addresses included in the virtual IP pool. The IP addresses should be rarely used IP address, such as 2.0.1.1 - 2.0.1.254.

Assigned To: Indicates the user group whose users will be assigned IP addresses from this IP address pool.

Description: Description of the IP address pool.

Select: Click it and then click All or Deselect to select all the IP address pools or deselect all the selected ones.

Delete, Edit: Select the desired IP range and click it to delete or edit the IP pool.

71

SANGFOR SSL M7.5 User Manual

Add: Click it to create a IP address pool and enter Virtual IP Pool page, as shown below:

When configuration is completed, apply the settings by clicking the Apply button that appears after any change is made.

The IP ranges should not cover IP address of any network interface of the Sangfor device, or conflict with IP address of any running machine in the local area network.

Configuring Local DNS Server

In an enterprise network, local DNS server works well if some internal resources are only accessible to users who request resources by domain names, for local DNS server can provide domain name resolving services when users request resources by domain name.

That is the same with such kind of resource access over SSL VPN. If this type of resources exists in local area network, local DNS servers could provide domain name resolving services to the connecting users.

1. Navigate to System > SSL VPN Options > General > Local DNS to enter the Local DNS page, as shown in the figure below:

72

SANGFOR SSL M7.5 User Manual

2. Configure the following under Local DNS:

Primary DNS: This is the primary local DNS server that is preferred to solve domain names.

Alternate DNS: This is the secondary local DNS server that is used to solve domain names when the primary DNS is unavailable.

If there is only one local DNS server, enter the server address into the Primary DNS field.

3. Configure Client PC uses the above DNS servers option.

With this option selected, address of primary and secondary local DNS servers will be distributed to the network adapter of the SSL VPN client end. The reason to prefer using the local DNS servers is to avoid such conflict when the domain controller also works as a local

DNS server but the local DNS server needs to be authenticated by the domain controller after the user connects to SSL VPN.

If this option is not selected and many application resources are using domain name as their addresses, administrator needs to add the address (in form of domain name) of resource into the list followed after specifying the local DNS servers. Later on, once a user accesses any of these resources by domain name, the local DNS server will resolve the requested domain name first, according to the local DNS server and domain names configured on this tab.

4. Configure Local Domain Name of Resource. This table is available when Client PC uses

the above DNS servers option is not selected.

73

SANGFOR SSL M7.5 User Manual

To select all or deselect the selected the entries, click Select > All or Deselect.

To delete or edit the domain name, select a domain name and click Delete or Edit.

To add an entry, click Add and add enter the domain name of a resource, as shown below:

Make sure that the address is in form of IP address when configuring the address of the resource (refer to the Resource section in Chapter 4).

5. Click the Save button and Apply button to save and apply the settings.

Once the local DNS server is configured and domain name of resources are added, the configuration will work and provide DNS service to the connecting users who request for the resource by domain name.

Beyond local DNS, the internal HOSTS file will also help to resolve the matching domain name and return the resolving result to user (refer to the Configuring Host Mapping Rule

(HOSTS) section in Chapter 3).

74

SANGFOR SSL M7.5 User Manual

 If address of some resources are domain names and there is a specific DNS server in the local area network providing domain name resolving services, the domain name of that resource is recommended to be added to the list. That will have the requests of DNS handled preferentially by the local DNS server. In other cases, do not add any domain name into the list.

 Domain supports wildcards * and ?. * indicates any character string, while ? indicates any character. For example, *.com stands for any domain name ending with .com.

b?s.SANGFOR.com indicates that the second character of that domain name can be any character, such as bbs.SANGFOR.com.

 Maximum 100 entries support.

Configuring SSO Options

SSO (Single Sign-On) is a one-off authentication method. It means that once a user successfully logs in to the SSL VPN and is authorized the right to access certain resource, system or application software, that user does not need to enter the required usernames and passwords ever after when accessing that resource, system or application software over the SSL VPN. That is because the system will automatically fill in the usernames and passwords for that user every time.

1. Navigate to System > SSL VPN Options > General > SSO and the SSO page appears, as shown below:

2. Configure the fields under SSO and Upload SSO Configuration File.

SSO: To enable user to access the corporate resources over SSL VPN without entering username/password, select the option Enabled; or else, select Disabled to disable SSO.

75

SANGFOR SSL M7.5 User Manual

Download SSO Assistant: Click this link to download the SSO Assistant program. This assistant will help the administrator to record the SSO file if user uses the login method

Auto fill in form (specified on the SSO tab when creating the resource) to access the

SSL VPN resources.

Download SSL Config File: Click this link to download the configuration file of SSO.

This file should be downloaded after the SSO page has been configured. The SSO information of a user can be recorded into the downloaded configuration file, with the help of SSO Assistant.

Upload: It is used to upload the SSO configuration file into the Sangfor device. Browse and upload the configuration file (containing the recorded SSO information) to the device.

Allow user to modify SSO user account: To allow user to modify the SSO user account (username and password) after successful access to SSL VPN, select this option.

Then connecting users can modify the SSO user account by performing the steps below: a. Log in to the SSL VPN and enter the Resource page, as shown below: b. Click Settings to enter Personal Setup page and select SSO Options in the left pane. The right pane shows the SSO resources and user accounts, as shown below: c. Click Edit to edit the SSO user account, as shown below:

76

SANGFOR SSL M7.5 User Manual d. Enter the new username and password into Username, Password and Confirm fields.

e. Click Save to save the changes.

Only one type of users can configure SSO page on the Resource page, that is, the private users who have associated with the resources that have applied SSO.

To change SSO user account, you need to select Same with VPN Username and Same with

VPN Password in Input Value field when recording the SSO file with SSO Assistant.

3. Configure Web SSO Options.

There are three tabs under Web SSO Options, namely, Web SSO Encryption, Basic SSO and NTLM SSO.

Web SSO Encryption: Configures the options applied to some B/S applications. To add security to SSO to internal resources, the transmitted data (username or password) is better encrypted first when they are submitted from the client side and then be decrypted by the server using the corresponding algorithm. To achieve that, configure the correct

JavaScript function on this tab.

Basic SSO: Configures the Basic SSO policy. The policies could be referenced as SSO policy when administrator configures SSO options of a Web resource and chooses

Basic SSO as the Login Method. Click Add to add a basic SSO policy, as shown below:

77

SANGFOR SSL M7.5 User Manual

NTLM SSO: Configures the NTLM SSO policy. The policies could be referenced as

SSO policy when administrator configures SSO options of a Web resource and chooses

NTLM SSO as the Login Method. Click Add to add a NTLM SSO policy, as shown below:

4. Click the Save button and Apply button to save and apply the settings.

Configuring Resource Options

Resource options include access mode for each application (Web, TCP and L3VPNs) and allow administrator to customize access-denied prompt page to inform user of the access failure.

Web App Resource Options

Navigate to System > SSL VPN Options > General > Resource Options > Web App to configure the parameters related to Web resource access and object rewritten rule, as shown in the figure below:

78

SANGFOR SSL M7.5 User Manual

The following are the contents included on the Resource Options page:

Access Mode: This determines the source IP address that connecting users will use to access the server resources. The source IP address could be the interface IP address of the Sangfor device or an assigned virtual IP address (to configure virtual IP address, refer to the

Configuring Virtual IP section in Chapter 3).

To have the connecting users take the IP address of the Sangfor device as the source address to visit the server resources, select Take device IP address as source.

To have the connecting users take the assigned virtual IP address as the source to visit the server resources, select Take virtual IP address as source (to configure virtual IP address, refer to the Configuring Virtual IP section in Chapter 3).

Add Rule: Add a rule and some paths of resources being cited by controls (Flash, Java,

Applet, video players) of the Web application will be rewritten so that these resources can be accessed. Click Add Rule and the Add Rule page appears, as shown below:

79

SANGFOR SSL M7.5 User Manual

The following are the contents included on Add Rule page:

HTML Tag: Specifies the HTML tag used for rewriting webpage objects. Options are

Object, Applet and Embed.

Object Identifier: Specifies the identifier (name) of this rule.

Description: Brief description of this rule.

Tag Param: Specifies the parameters in the codes that should be rewritten to revise the webpage.

Object Property: Specifies the object properties in the codes that should be rewritten to revise the webpage.

Object Method: Specifies the object method in the codes that should be rewritten to revise the webpage.

QueryString(<Embed>): Specifies the Querystrings in the codes that should be rewritten to revise the webpage.

Delete, Edit: Select a rule and click Delete or Edit to remove or modify an entry.

Select: Click Select > All or Deselect to select all rules or deselect the selected rules.

Save: Click this button to save the settings.

TCP App Resource Options

Navigate to System > SSL VPN Option > System > Resource Options > TCP App to configure the parameters related to TCP resource access and smart recursion feature, as shown below:

80

SANGFOR SSL M7.5 User Manual

The following are the contents included on TCP App tab:

Access Mode: Specifies the source IP address that connecting users will use to access the server resources, whether it is the interface IP address of the Sangfor device or an assigned virtual IP address (to configure virtual IP address, refer to the Configuring Virtual IP section in Chapter 3).

To have the connecting users take the IP address of the Sangfor device as the source address to visit the server resources, select Take device IP address as source.

To have the connecting users take the assigned virtual IP address as the source address to visit the server resources, select Take virtual IP address as source (to configure virtual IP address, refer to the Configuring Virtual IP section in Chapter 3).

Max Sessions Per User: Specifies a maximum of sessions that one user can establish to access TCP resources concurrently.

Enable: Select this option to enable smart recursion feature for access to TCP resources.

Please note that, to have smart recursion feature take effect, Enabled option should be selected, and option Apply smart recursion on Others tab should also be selected when editing the TCP resource.

Applicable Address: The addresses to which the smart recursion feature will apply. If The

addresses below is selected, smart recursion will apply to all the URL addresses in the list; if

Other addresses rather than the ones below is selected, smart recursion will apply to all

81

other URL addresses except those in the list.

SANGFOR SSL M7.5 User Manual

To add a URL address, click Add. The Add Address page is as shown below:

To remove or modify the rule , select a rule and click Delete or Edit.

To select all rules or deselect the selected rules, click Select > All or Deselect.

Save: Click this button to save the settings.

Background Knowledge: What is Smart Recursion?

It is common that on the homepage of some websites there are many links. If a user wants to visit those link and therefore access the corresponding servers over the SSL VPN, the addresses of those servers must be available on Resource page; otherwise, those server resources will be inaccessible to the user.

However, it is an immense task and tedious work for the administrator to add all those addresses one by one in to the resource address list by hand when editing a resource, and most likely, some of the addresses may be left outside the list. Without a complete list of link resources, connecting user still cannot visit some resources.

Smart recursion functionality is intended for solving the aforementioned troubles. With the help smart recursion, administrator needs only to,

1. Navigate to SSL VPN > Resources page to add a TCP resource. Add the homepage address of a website to the Address field, and select the option Apply smart recursion on Others tab.

2. Navigate to the System > SSL VPN Options > General > Resource Options > TCP App,

82

SANGFOR SSL M7.5 User Manual

Select The addresses below as the applicable addresses and add the URL addresses of the links to the list.

Without taking the links as TCP resources and adding their URL addresses to the resource address list, all the link resources on that homepage will be available for connecting users.

Scenario 4: Configuring and Applying Smart Recursion

Background:

The homepage of a library website is www.library.com. The website contains a great many links to other servers and databases.

Purpose:

Enable users to remotely and securely access the homepage of the library and the links to other servers and databases.

Analysis and Solution:

To meet the requirements, firstly create TCP resource (address of the resource is homepage of the library, www.library.com) and enable smart recursion, secondly configure smart recursion on

Resource Options page.

Below is the configuration procedure:

1. Navigate to SSL VPN > Resources, and click Add > TCP app to add the TCP resource of library homepage.

2. Configure the required fields and add library homepage ( www.library.com

) into the textbox next to the Address field.

3. Click Others tab and select the option Apply smart recursion.

4. Navigate to System > SSL VPN Options > General > Resource Options > TCP App and select Enabled.

5. Specify the applicable addresses by selecting The addresses below.

6. Add the URL address of the library website into list ( *.library.*). If the homepage library contains other URL links, add them into this list.

7. Click Save to save the settings and then click the Apply button on the next page.

8. Edit the user and associate this library resource with the user.

 Currently, smart recursion is applied only to TCP-supported HTTP and HTTPS.

 While user is visiting the resource that applies smart recursion, to access the links, he/she must click on the links on the “root” resource page; however, if the “root” resource page is

83

SANGFOR SSL M7.5 User Manual closed, it can still click the link on the links on the “links” page.

L3VPN Resource Options

Navigate to System > SSL VPN Option > System > Resource Options > L3VPN to configure the parameters related to L3VPN resource, as shown in the figure below:

The following are the contents included on L3VPN tab:

Access Mode: Specifies the source IP address that connecting users will use to access the server resources, whether it is the interface IP address of the Sangfor device or an assigned virtual IP address (refer to the Configuring Virtual IP section in Chapter 3).

To have the connecting user take the IP address of the Sangfor device as the source address to visit the server resources, select Take device IP address as source.

To have the connecting user take the assigned IP address as the source address to visit the server resources, select Take virtual IP address as source (refer to the Configuring Virtual

IP section in Chapter 3).

Transfer Protocol: Specifies the transfer protocol used while L3VPN resource is accessed.

Select TCP and only TCP will be used to transfer data while user is using L3VPN resources; while Auto select makes it apt to start UDP to transfer data.

UDP Port: Indicates the UDP port used for transferring data. It is 442 by default. Assume that the Sangfor device is in Single-arm mode, this port should be mapped from the front-end firewall to the Sangfor device.

Advanced: Click this button and optional advanced options appears, Max Concurrent

Users and IP of Local Virtual NIC. The latter specifies the server-end IP address range to which the virtual NIC is applied.

84

SANGFOR SSL M7.5 User Manual

Changing advanced options may severely affect the performance of the system, therefore, it is recommended to adopt the defaults.

Other Resource Options

Navigate to System > SSL VPN Option > System > Resource Options > Others tab. This tab configures access-denied prompt page that will appear in front of the users when they visit an unauthorized URL address (resource), as shown in the figure below:

The following are the contents included on Others tab:

Page File: For users accessing unauthorized URL of Web application resource, upload a prompt page through Page File field. When any user accesses authorized URL, he/she will be notified that access is denied.

 For the users accessing unauthorized URL address of TCP or L3VPN resource, enter the words into the textbox to inform user that access is denied because they are visiting unauthorized page.

85

SANGFOR SSL M7.5 User Manual

The compressed file should be in format of .zip, smaller than 1M and contain the file

warrant_forbidden.tml.

Unauthorized or authorized URL addresses are configured on URL Access Control tab while editing a Web/TCP/L3VPN resource (refer to the Resource section in Chapter 4).

86

SANGFOR SSL M7.5 User Manual

Network Optimization Related Settings

Navigate to System > SSL VPN Options > Network Optimization and four pages are seen, namely, Application Access, Data Transfer, Webpage Access and Web Cache, which configure the optimization options in terms of application access, data transfer, webpage access and Web cache.

Application Access Optimization

1. Navigate to System > SSL Options > Network Optimization > Application Access to enter

Application Access page, as shown in the figure below:

2. The following contents are under Lossy Compression:

Enabled, Disabled:If enabled, image displayed in remote application will be compressed according to specified image quality so as to speed up transmission.

HQ text display: Select it to keep text displayed clearly when image quality is decreased.

3. Configure image caching: If Enabled is selected, image will be cached in order to make

87

SANGFOR SSL M7.5 User Manual image scroll more smoothly, but it will also increase CPU usage of remote server.

4. The following information are included under Dynamic Image Filter:

Enabled, Disabled: If enabled, dynamic image, like Flash animation, will be filtered so as to save bandwidth and speed up access.

Adaptive adjustment: Select it to make dynamic images filtered adaptively.

5. Click Save to save the changes; or click Cancel to give up.

Data Transfer Optimization

1. Navigate to System > SSL Options > Network Optimization > Data Transfer to enter

Data Transfer page, as shown in the figure below:

2. Configure the following contents on Data Transfer page:

High-Speed Transfer Protocol(HTP): Enable it to speed up access in a wireless network or in poor network environment.

88

SANGFOR SSL M7.5 User Manual

 HTP is the short name of High-Speed Transfer Protocol, which can optimize data transfer over the involved networks.

 At the client end, after user logs in to SSL VPN, he/she needs to enable HTP on

Optimization page.

Advanced: Click this button to enter the HTP Advanced Settings page, as shown below:

Startup Mode indicates the way that HTP is to start up, automatically or manually.

If Manual is selected, HTP needs to be started by hand. If Automatic is selected, HTP will start up automatically according the network state (good, wireless or poor) of the endpoint detected by SSL VPN client software when users connect to SSL VPN.

Network state detection is based on the two conditions: a).

Packet loss rate is or over 7%; b).

Packet loss rate is or over _ % and latency is or over _ ms. Either condition may trigger start up of HTP. Generally, defaults are recommended to be adopted.

Enable HTP option only takes effect when users access TCP resources over SSL VPN via IE browser (other kinds of browsers are not supported).

 Applying HTP needs the support of UDP port 443. If the Sangfor device is deployed in

89

SANGFOR SSL M7.5 User Manual

Single-arm mode, do remember to configure the front-end firewall to map this UDP port to the Sangfor device.

One-Way Acceleration: Enable it to speed up TCP-based tunnel service.

To enable one-way acceleration feature, you need to activate corresponding license first; otherwise,

Enabled option turns gray, and you cannot select it.

Enabled: Select this option so that redundant data will be compressed and that data transmission time and bandwidth consumption could be minimized.

Compression Options: Select Enable compression for Web application and/or Enable

compression for TCP application according. The former mean data related to Web applications will be compressed, while the latter means data related to TCP applications will be compressed.

Advanced: Click this button to specify the compression algorithm for TCP application access,

LZO or GZIP/ZLIB, as shown in the figure below:

90

SANGFOR SSL M7.5 User Manual

Webpage Access Optimization

This kind of optimization utilizes system resources of the Sangfor device to handle images and therefore reduce data stream from/to public networks. It is an ideal feature for the users who are using PDA (Personal Digital Assistant) to access SSL VPN or the user’s computer is in poor network. This feature should not be enabled for users in good network environment.

Navigate to System > SSL VPN Options > Network Optimization > Webpage Access and the

Webpage Access page is as shown in the figure below:

The following are the contents included on Webpage Access page:

Enabled: It is a global switch for webpage access optimization. Select this option and webpage access optimization feature will be enabled.

 To optimized access to webpage, set the image size limit, that is, configure If images is

smaller than _ KB and or larger than _ KB.

Enable image display: Uncheck this option to disable image display and therefore enhance

91

SANGFOR SSL M7.5 User Manual the access speed.

Enable image display only applies to the images with any of the following extensions: .jpg, .png and .gif.

Enable image display achieves the opposite optimization effect, comparing with the effect that Adjust image quality achieves.

Reduce image size: Select it and then select Dynamically or To certain size _% of the

original image to reduce the image size and data. This feature applies to the images with any of the following extensions: .jpg, .png and .gif.

Dynamically indicates that the system will dynamically adjust the image size in accordance with the original size.

To certain size, _ % of the original image indicates that image will shrink based on the original image and the proportion configured.

Adjust image quality: This option leads to quality deterioration of image (jpg image supported only), though it helps to reduce the image data. Four options are available, namely,

Smartly blurred, Slightly blurred, Blurred and Heavily blurred. This feature applies to .jpg images only.

Advanced: Click this button and the Webpage Access Optimization Advanced Settings page appears, as shown in the figure below:

92

SANGFOR SSL M7.5 User Manual

Restrictions: Indicates the thresholds determining when webpage access optimization functionality will start up. These thresholds could minimize the impact that webpage access optimization poses on the running and performance of other modules. The restrictions include those on system memory usage and CPU usage. Each threshold has a default. Select the option Restore Default if you want to.

In no case will any of the thresholds be disabled.

Network Environment Support: This part specifies the types of services and client-end network environment (PDA, PC client, Web app access and/or TCP app access) that can support webpage access optimization.

Applicable Address of Webpage Access Optimization: Configure the URL addresses to have the access to them optimized or not optimized.

The following are contents under Applicable Address of Webpage Access Optimization:

Applicable addresses: If The addresses below is selected, only the access to the added

URL addresses will be optimized. If Other addresses rather than the ones below is selected, access to any other URL addresses (except the added addresses) will be optimized.

Add: Click it to add address into the list.

Select: Click it and then select All or Deselect to select all the addresses or deselect the selected address.

Delete, Edit: Select an entry and click it to remove or modify the address.

 The two types of applicable address are alternative.

93

SANGFOR SSL M7.5 User Manual

 Wildcards "?" and "*", and a maximum of 255 entries are supported.

Web Cache

Web Cache is a feature based on IE caching mechanism. The contents that can be cached by

Internet Explorer are cacheable for the Web Cache. With the Web Cache optimization function caching images, .js scripts, css (compression is not applied to transferring webpage data), response time of user’s access request for the Webpage will be reduced.

Navigate to System > SSL VPN Options > General > Network Optimization > Web Cache and the Web Cache page is as shown in the figure below:

The following are the contents included on the Web Cache page:

Enabled: Select it to enable Web Cache.

Applicable Addresses: If The addresses below is selected, only the access to the added

URL addresses will be optimized. If Other addresses rather than the ones is selected, access to any other URL addresses (except the added ones) will be optimized.

Add: Click it to enter the Add Address page to add an entry, as shown below:

Select: Click it and then select All or Deselect to select all the addresses or deselect the selected address.

Delete, Edit: Select an entry and click it to remove or modify the address.

94

SANGFOR SSL M7.5 User Manual

User Logging in

This section covers configuration on three pages, Login Policy, Login Page and Icon.

Configuring Login Policy

Login policy is a kind of policy that not only sets the login page for connecting users at the client end but also specifies the default login method.

If All users use a same login page is selected, configure the following:

All users use a same login page: A global setting indicates that all the users will use the specified login page.

Login Page: Specifies the login page that users use to log in to SSL VPN. It could be a built-in page or a custom login page.

View Thumbnails: Click to view thumbnails of the built-in page template, as shown below:

If Users use different login pages is selected, a user/group can only use the designated login page to access SSL VPN. Please do the following:

1. Click the Yes button to confirm choosing Users use different login pages as the policy selected. As shown in the following prompt, the HTTP login port and multiline policy of SSL

VPN will be disabled.

95

SANGFOR SSL M7.5 User Manual

2. Click the Configure button on the Login Policy page to customize login pages and assign them to specific users/groups. If change is not saved, the following prompt will pop up:

3. Click the Yes button to save the change and enter the next page, as shown below:

4. Click Add and enter the Add Login Policy page to add a login policy, as shown below:

5. Configure the following fields on the Add Login Policy page:

URL: Specifies the URL address of the homepage of SSL VPN. URL may contain https.

96

SANGFOR SSL M7.5 User Manual

By default, it contains https.

Description: Brief description of the user or group.

Applied To: Specifies the users or groups that are associated with this login policy.

Click this field and Users and Groups page appears, as shown below:

Select the desired users or groups to associate them with this login policy and click OK.

Login Page: Specifies the login page that the specified users or groups will use to log in to SSL VPN. It could be a built-in page or a custom login page.

If Users use different login pages is the login policy, HTTPS port and multiline policy will be disabled. You can click the HTTPS Port and Multiline Policy links to enter the Login page to view HTTPS port settings and Multiline Options page to view the multiline settings respectively.

Configuring Login Page

1. Navigate to System > SSL VPN Options > Login Policy > Login Page. The Login Page is as shown in the figure below:

97

SANGFOR SSL M7.5 User Manual

2. Click Add > By using built-in template to use built-in template as template or select By

uploading custom page to upload a custom page as template to configure login page.

If By using built-in template is selected, the contents are as shown in the figure below:

The following are the contents included in the above page:

Name: Indicates the name of this login page.

Description: Indicates the brief description of this login page.

Template File: Specifies the system template based on which the login policy will be configured. To view the thumbnail of the built-in page template, click View

Thumbnails.

Page Title: Specifies the caption of the login page.

Current Logo: Indicates the logo currently showing on the login page.

New Logo: Upload a new logo to replace the current logo.

Background Color: Indicates the background color of the login page.

98

SANGFOR SSL M7.5 User Manual

Bulletin Message: Enter the message into the textbox. This bulletin message will be seen on the portal after users log in to the SSL VPN. Maximum 1024 characters are allowed and HTML is supported. To preview the bulletin message, click Preview.

Preferred Login Method: Specifies the default login method. Options are Any, Use

password, Use certificate and Use USB key.

Available Links: Indicates the links displayed on login page. It include Download

Client Component, Download Repair Tool and Help Center.

If Anonymous Login is enabled on SSL VPN > Authentication >Anonymous Login

Options page, Preferred Login Method option becomes unavailable.

If By uploading custom page is selected, the contents are as shown in the figure below:

99

SANGFOR SSL M7.5 User Manual

The following are the contents included in the above page:

Name: Indicates the name of this login page.

Description: Indicates the brief description of this login page.

Page File: Upload a page file though this field. The file extension must be .zip. At the right side of the page, there are instructions on how to upload a page file and three sample page files available.

Page Title: Specifies the caption of the login page.

Bulletin Message: Enter the message into the textbox. This bulletin message will be seen on the portal after users log in to the SSL VPN. Maximum 1024 characters are allowed and HTML is supported. To preview the bulletin message, click Preview.

Preferred Login Method: Specifies the default login method. Options are Any, Use

password, Use certificate and Use USB Key.

Available Links: Indicates the links displayed on login page. Options are Download

Client Component, Download Repair Tool and Help Center

3. Click the Save button to save the settings on this page.

Uploading Icon to Device

Recalling from the above section on configuring the login page, we know that when defining a login page, there is a field requiring logo. Except that configuration, images or icons are also needed in some other places. Such kinds of images used by Sangfor device could be uploaded to and managed on Sangfor device.

1. Navigate to System > SSL VPN Options > Login Policy> Icon to enter the Icon page, as

100

shown in the figure below:

SANGFOR SSL M7.5 User Manual

2. Click Add to enter Upload Icon page, as shown in the figure below:

3. Browse an image file and click the OK button.

101

SANGFOR SSL M7.5 User Manual

Clustering

Cluster enables multiple independent servers (nodes) to work as single system and be managed as a single system. A node (in fact, a Sangfor device) in a cluster may be a real server being managed by one node master, or the dispatcher (a real server by nature).

While an Internet user accesses SSL VPN, the dispatcher will do scheduling and assign this session to a reasonable (most idle) real server to have this real server provide services to this user.

In this way, the cluster can achieve the goal of enhancing system capacity and performance, and providing users with the best and most reliable services.

Terminology

Cluster: A cluster is a multi-processor system that is loosely coupled with a group of independent computers. It can achieve the goal of coordinating the communication and data synchronization among the scattered computers.

Dispatcher: It works as the load-balancing device of a cluster. Dispatcher itself is a real server.

Real server: A single Sangfor device that works as real server in a cluster.

Node: A general name for dispatcher and real server.

Cluster IP address: The IP address that the cluster communicates with the networks outside the cluster. This IP address is also used by user to access the SSL VPN if cluster is enabled.

Cluster key: It is the key intended for communication among the clustered nodes, which helps to encrypt the relevant data.

Weight: Performance metric of a cluster node. 0 indicates that node is not reachable.

Dynamical Weighted Least-Connection Scheduling: Or DWLC in short, is the weight reported by each server of the processing ability. It is playing such a role that the number of established sessions to a server could be in certain proportion with the weight while new session is about to assigned to clustered nodes.

Main Features of Cluster

 High performance

 A new connection will be scheduled to an optimal node based on Dynamical Weighted

Least-Connection Scheduling.

 The consequent connections initiated by a same IP address will not be assigned to a different node, unless that IP address disconnects with the SSL VPN.

102

SANGFOR SSL M7.5 User Manual

 Once the dispatcher receives a request, it assigns that request to a real server so that the real server will respond to the user.

 High availability

 If a node gets into fault, this node will be removed from the available node list by the dispatcher when heartbeat detecting (a signal sent from LAN interface) timed out. The removal of this node from the available node list will only pose impact on the users that are being served by that node.

 When a new node joins in the cluster, the dispatcher will add it to the available node list.

 Once the dispatcher gets into fault, another node will be elected as the new dispatcher after two heartbeats in accordance with the priority (the higher priority a node has, the more likely it will be elected as dispatcher; if two nodes are of the same priority, the one that is higher in performance will take the place). Reelection of dispatcher will only pose impact on the users that are being served by the bad dispatcher.

 Consistency of services

 If a new node joins in the cluster, it will download all the configurations and data from the dispatcher to keep consistent with it.

 Administrator is allowed to make configuration changes after it logs in the console of the dispatcher. Logging in to any other node, the administrator has the privilege to configure basic settings related to cluster, but can only view other SSL VPN configurations.

 Changes on any user or user information (such as password, hardware ID and mobile number) will be synchronized to all the other nodes in the cluster.

 Changes on database of any node will trigger data checking which is based on that of the dispatcher. If database of a node is found inconsistent with that of the dispatcher, all the nodes will download the configurations and database from the dispatcher and then restart the related services.

Some configurations and data will not be synchronized among the clustered nodes, but take effect on an individual node if operation is performed. These configurations and state information include network settings, logs, license, SSL VPN running status, restart device, configuration backup and restore, DHCP status, etc.

 No data checking will be performed if there is no change made on database; however, if database of any node changes, database of any other node will be checked.

 System time of the cluster group is synchronized from the dispatcher, keeping consistent with each other.

 System monitoring

 On the dispatcher, administrator can view the resource utilization of each clustered node, or restart SSL VPN service, all services or devices.

 Cluster online user list is also available on the dispatcher, including the information of which node each user is being served and the operation of disconnect the connecting user.

103

SANGFOR SSL M7.5 User Manual

 Hot plug of dispatcher

Single node: A node can be elected as dispatcher in an interval of two heartbeats.

Dispatcher re-election: If the dispatcher gets into fault, another node that has the highest priority will be elected as the new dispatcher in an interval of two heartbeats.

Dispatcher re-election mechanism: If a newly-joining node is configured with the highest priority (the only one in a cluster that has such highest priority), then this node will first become a real server of this cluster group, and in an interval of two heartbeats, become the dispatcher, while the original dispatcher will be degraded and become a real server.

 Hot plug of node

Node joining cluster: During the interval of the first heartbeat, the newly-joining node will download data from the dispatcher, decompress the data and replace the original ones, restart the services and check data. After the above series of operations, it will become a real server officially.

Node getting into fault: During the interval of two heartbeats, the bad node will be removed from the available node list by the dispatcher.

 Reliability

With cluster being enabled, user can use any service provided by SSL VPN as long as at least one clustered Sangfor device keeps running. If user is using a static cluster IP address to access the services but that node gets into fault, the online users related to that node will be disconnected and required to re-login.

104

SANGFOR SSL M7.5 User Manual

Deploying Clustered Sangfor Devices

Deploying Clustered Device in Single-Arm Mode

For clustered nodes deployed in Single-arm mode, the configurations of internal and external interfaces are the same as those on an individual Single-arm Sangfor device (please refer to the

Device Deployment section in Chapter 3). One additional configuration is Cluster IP Address of

LAN interface (under System > SSL VPN Options > Clustering > Cluster Deployment).

Typical network topology of cluster in Single-arm mode is as shown in the figure below:

LAN Cluster IP address on every clustered device should be identical.

LAN interface IP address (configured in System > Network > Deployment) and the

LAN Cluster IP (configured in System > SSL VPN Options > Clustering > Cluster

Deployment) must be of a same network segment.

105

SANGFOR SSL M7.5 User Manual

Deploying Clustered Device in Gateway Mode

For clustered nodes deployed in Gateway mode, the configurations of internal and external interfaces are the same as those on an individual Gateway-mode Sangfor device (please refer to the Device Deployment section in Chapter 3). One additional configuration is Cluster IP Address of LAN interface and WAN interface (under System > SSL VPN Options > Clustering >

Deployment).

Typical network topology of cluster in Gateway mode is as shown in the figure below:

LAN Cluster IP address on every clustered device should be identical; so is the WAN

Cluster IP address.

 WAN interface IP address on every clustered device should be of a same network segment; whereas WAN Cluster IP address and WAN Interface IP address configured on a Sangfor device must NOT be a same network segment.

106

SANGFOR SSL M7.5 User Manual

 Cluster will not work if the Sangfor device works as gateway and dials up to Internet.

Deploying Clustered Device with Multiple Lines

For clustered nodes deployed with multiple lines, the configurations of internal and external interfaces are the same as those on an individual Sangfor device that has multiple lines (please refer to the Device Deployment section in Chapter 3). One additional configuration is Cluster IP

Address of LAN interface and WAN interface (under System > SSL VPN Options >

Clustering > Deployment).

LAN Cluster IP address on every clustered device should be identical; so is the WAN Cluster IP

address. As a Sangfor device has more than one line, the WAN Cluster IP addresses on every clustered device must be consistent.

Single-Arm Sangfor Device with Multiple Lines

Typical network topology of cluster of Single-arm devices is as shown in the figure below:

107

SANGFOR SSL M7.5 User Manual

The cluster IP addresses configured on each clustered node (Sangfor device) should be consistent.

Gateway-mode Sangfor Device with Multiple Lines

Typical network topology of cluster of Gateway-mode devices is as shown in the figure below:

Configuring Newly-Joining Clustered Device

Recalling from the above section, we know that cluster IP address for a newly-joining cluster needs to be configured. This section introduces how to configure the cluster IP address and other cluster related options for a device joining cluster.

1. Go to System > SSL VPN Options > General > Clustering > Cluster Deployment, as shown in the figure below:

108

SANGFOR SSL M7.5 User Manual

2. Configure the following basic settings of the cluster:

Cluster: It is a global switch to enable or disable the cluster functionality of the SSL

VPN system. Select Enabled to enable cluster functionality and proceed to configure the related options.

Cluster Key: Specifies the secret key to be used by the cluster. This field configured on every clustered node should be identical. If not the same, the secret key configured on the dispatcher will be taken as the ultimate key.

Dispatcher: Specifies the way that dispatcher of the cluster is to be elected or specified.

Select Local device preferred to specify this Sangfor device as the dispatcher; or select

Elected by priority level to have the dispatcher be elected in accordance with the priority level that may be high, medium, low or user-defined value.

High means that the node is more likely to be elected as the dispatcher; medium indicates that the node is less likely to be elected as the dispatcher, while low indicates that node is least likely to be elected as the dispatcher.

The value of priority level, however, will be compared with those values configured on other clustered nodes. Opposed to what is indicated by the concept High or Low, the lower the value, the higher priority that node has, and the more likely it will be elected as the dispatcher. The node will be elected as the dispatcher that has the highest priority

(with the lowest value).

For the option This device preferred, only one Sangfor device in a cluster group can use this option.

3. Specify the cluster IP address of LAN interface, DMZ interface and WAN interface.

Any Sangfor device that joins in a cluster should be configured with the same cluster IP

109

SANGFOR SSL M7.5 User Manual addresses as those on other clustered nodes.

LAN Cluster IP: Cluster IP address of LAN interface, being launched to external networks.

DMZ Cluster IP: Cluster IP address of DMZ interface, being launched to external networks.

WAN1 Cluster IP: Cluster IP address of WAN1 interface, being launched to external networks.

Netmask: Indicates the network mask of the corresponding cluster IP address.

WAN1 Interface Gateway: Specifies the gateway of the WAN1 interface.

Cluster IP address is a group of IP addresses of a cluster formed by more than one Sangfor devices, and will be launched to the external networks. These IP addresses configured on each clustered node must be consistent.

4. Click Save to save the settings.

Viewing Clustered Node Status

Clustered node information includes IP address of clustered node, node type (dispatcher or real server), CPU utilization of node, number of licenses each node can grant, connecting users of each node, as well as total licenses and total online users.

Navigate to System > SSL VPN Options > Clustering > Node Status and the Node Status page appears, as shown in the figure below:

To enter the administrator console of a clustered node, click the Login to Node link.

Viewing Cluster Online Users

Cluster online users information includes the number of users connecting to SSL VPN, username,

IP address of user’s host, IP address of the node that is providing services to connecting user and the time when the user connects in.

Navigate to System > SSL VPN Options > Clustering > Cluster Online User and the Cluster

110

Online User page appears, as shown in the figure below:

SANGFOR SSL M7.5 User Manual

The following are the contents included on Cluster Online User page:

View: Select an option to view a specific type of clustered nodes to show. It is All nodes by default.

Refresh: Click it to refresh the status information on the Cluster Online User page.

Disconnect: Click it to disconnect the selected user from the SSL VPN.

View Locked Users: Click it to view the locked users. Administrator can unlock them when viewing the locked users.

Search: To search for a specific user, enter the keyword into Search field and then click the magnifier icon or press Enter key.

111

SANGFOR SSL M7.5 User Manual

Distributed Nodes

Distributed Deployment

With distributed deployment enabled and configured properly, the Sangfor devices scattered over the Internet could keep load-balanced.

Navigate to System > SSL VPN Options > Distributed Nodes to enter the Distributed

Deployment page, as shown in the figure below:

The following are the contents included on Distributed Deployment page:

Distributed Deployment: A global switch intended for enabling or disabling distributed deployment of SSL VPN system. To enable the distributed deployment, select Enabled.

Shared Key: Specifies shared key, no more than 6 characters. It is used for distributed deployment.

Node Name: Specifies the name of the node (Sangfor device). After entering node name, click the Check Validity button to check on the WebAgent whether this name is valid.

Node Type: Specifies the type of node. Master node indicates that the current node is a master node, while Slave Node indicates that the current node is a slave node.

Description: Enter brief description for the node.

All nodes share a same virtual IP pool: Indicates that all nodes share the settings of a virtual IP pool. This option is applicable to the case that administrator specifies a virtual IP address to the user when creating the user account. Users use their own specified virtual IP address to log in to distributed node. Please note that this option is not suitable for dynamic virtual IP assignment, because assignment of virtual IP addresses to connecting users of

112

SANGFOR SSL M7.5 User Manual different nodes may cause IP address conflict.

Each node uses a separate virtual IP pool: Indicates that each node is assigned a different virtual IP range and its connecting users use those IP addresses in that pool only. The user who logs in to a distributed node will use an IP address assigned from its specific IP address pool, which can eliminate the possibility that the IP addresses assigned to users of different nodes conflict.

Set Virtual IP Pool: Click this link to enter the Virtual IP Pool page and configure the virtual IP pools. Virtual IP addresses are to be used by the users while they are accessing the distributed nodes (please refer to the Configuring Virtual IP section in Chapter 3).

Save: Click it to save the settings.

Distributed deployment requires that WebAgent is enabled and configured properly.

If Users user different login page option is enable on System > SSL VPN Options > Login

Policy page, distributed deployment cannot be enabled.

Viewing Status of Distributed Nodes

Status of distributed nodes include real-time status of the master node and slave nodes, such as name, IP address, type, description, status, number of licenses and online users of each distributed node.

Navigate to System > SSL VPN Options > Distributed Nodes > Node Status and the Node

Status page is seen, as shown in the figure below:

To enter the administrator console of a node, click the Login to Node link in the column

Operation.

113

SANGFOR SSL M7.5 User Manual

Chapter 4 SSL VPN

SSL VPN covers configurations of Users, Resources, Roles, Authentication, Policy Sets,

Remote Servers and Endpoint Security.

SSL VPN options are crucial, because they are the core of the entire SSL VPN system, in particular those in Users, Resources and Roles. The relationships among the three factors are:

role is the joint where the user (group) and resource are associated; user in certain group can acquire the right to access certain resource as per the privileges and realms granted to that user

group.

SSL VPN Users

Users and groups are managed in a hierarchic structure. The users with similar attributes could be classified into a group which is further included in another higher-level user group. This kind of management is similar to and compatible with the interior organization structure of an enterprise, facilitating management of VPN users.

Navigate to SSL VPN > Users to enter Local Users page, as shown below:

In the left pane, there is a tree of user groups. Click on a group name, and the subgroups and direct users of that group will be seen in the right pane, with group information ( Group, Location, number of members) displaying above right pane.

To search for a group, enter keyword of the group name into the Search field in the left pane and click the magnifier icon. The group will be highlighted in bold if found.

To see all direct and indirect users of the selected group, click Unfold All.

To delete the selected user or group, click Delete.

To choose the desired entries, click Select > Current page or All pages.

To deselect entries, click Select > Deselect.

114

SANGFOR SSL M7.5 User Manual

To edit the attributes of a user or group, select the user or group and click Edit to enter the Edit

User or Edit User Group page.

Adding User Group

1. Navigate to SSL VPN > Users > Local Users page. Click Add > User Group to enter Add

User Group page, as shown in the figure below:

2. Configure Basic Attributes of the user group. The following are basic attributes:

Name: Enter a name for this user group. This field is required.

Description: Enter brief description for this user group.

Added To: Select the user group to which this user group is added. / indicates root group.

115

SANGFOR SSL M7.5 User Manual

Max Concurrent Users: Indicates the maximum number of users in this group that can concurrently access SSL VPN.

Status: Indicates whether this user group is enabled or not. Select Enabled to enable this group; otherwise, select Disabled.

Inherit parent group’s attributes: Select the checkbox next to it and this user group will inherit the attributes of its parent group, such as the roles, authentication settings and the policy set.

Inherit authentication settings: Select the checkbox next to it and this user group will inherit the authentication settings of its parent group.

Inherit policy set: Select the checkbox next to it and this user group will inherit the policy set of its parent group.

Inherit assigned roles: Select the checkbox next to it and the current user group will inherit the assigned roles of its parent group.

3. Configure Authentication Settings.

Group Type: Specifies the type of this user group, Public group or Private group.

Public group: Indicates that any user account in this group can be used by multiple users to log in to the SSL VPN concurrently.

Private group: Indicates that none of the user accounts in this group can be used by multiple users to log in to the SSL VPN concurrently. If a second user uses a user account to connect SSL VPN, the previous user will be forced to log out.

Primary Authentication: Indicates the authentication method(s) that is (are) firstly applied to verify user when he or she logs in to the SSL VPN. If any secondary authentication method is selected, primary authentication will be followed by secondary authentication when the users log in to the SSL VPN.

At least one primary authentication method should be selected, Local password,

Certificate/USB key or External LDAP/RADIUS. However, two of them can form a combination.

Local password: If this option is selected, the connecting users need to pass local password based authentication, using the SSL VPN account in this user group.

Certificate/USB key: If this option is selected, all the user accounts in this group must own digital certificate or USB key (ordinary or driver-free USB key).

External LDAP/RADIUS: If this option is selected, an external authentication server (LDAP or RADIUS server) should be specified, which means, the account user used to connect the SSL VPN must exist on the selected external authentication server (to configure external authentication server, refer to the

LDAP Authentication section and RADIUS Authentication section in Chapter 4).

Require: It helps to achieve combination of two primary authentication methods.

Options are Both and Either.

116

SANGFOR SSL M7.5 User Manual

Both means that the selected primary authentication methods (if two authentication methods are selected), and the user has to pass both the selected primary authentications.

Either means that the selected primary authentication methods (if two authentication methods are selected), and the user has to pass either of the selected primary authentications.

 The available authentication servers are predefined. If there is no authentication server available in the drop-down list, navigate to SSL VPN > Authentication >

Authentication Options page and configure the LDAP server or RADIUS server accordingly.

Local password and External LDAP/RADIUS are alternative.

Secondary Authentication: Secondary authentication is optional and supplementary authentication methods. Select any or all of them to require the connecting users to submit the corresponding credentials after he or she has passed the primary authentication(s), adding security to SSL VPN access.

Hardware ID: This is the unique identifier of a client-end computer. Each computer is composed of some hardware components, such as NIC, hard disk, etc., which are unquestionably identified by their own features that cannot be forged.

SSL VPN client software can extract the features of some hardware components of the terminal and generate the hardware ID consequently.

This hardware ID should be submitted to the Sangfor device and bind to the corresponding user account. Once administrator approves the submitted hardware

ID, the user will be able to pass hardware ID based authentication when accessing

SSL VPN through specified terminal(s). This authentication method helps to eliminate potential unauthorized access.

As mentioned above that multiple users could use a same user account (public user account) to access SSL VPN concurrently, it is reasonable that a user account may bind to more than one hardware IDs. That also means, an end user can use one account to log in to SSL VPN through different endpoints, as long as the user account is binding to the hardware IDs submitted by the user from those endpoints.

SMS password: Implementation of this authentication requires that user’s mobile number is available. Administrator configures the mobile number while adding or editing user account(for more, refer to Adding User section in chapter 4). If this option is selected, connecting user must enter the received SMS password after he or she passes the primary authentication and is going through SMS authentication, as shown in the figure below:

117

SANGFOR SSL M7.5 User Manual

If the user fails to receive any text message containing SMS password, he or she can click get again to get a new SMS password.

 By default, SMS authentication will not be enabled if mobile number is not configured. SMS authentication comes into use only after, a). mobile number has been configured; b).

SMS password has been selected; c). the required options on

SMS Authentication page have been configured properly.

 Each user account supports only one mobile number. By default, the mobile number starts with China’s international code 86. If necessary, change this number to the international code of your own country (refer to the instructions on SMS

Authentication page to configure SMS message delivery module).

Dynamic token: If this option is selected, a RADIUS authentication server must be specified, which means, the account that user is using to connect SSL VPN must exist on the selected RADIUS authentication server (to configure RADIUS server, refer to the RADIUS Authentication section in Chapter 4).

Enforce its users/subgroups to inherit the authentication settings: If this option is selected, the subgroups and users included in this group will inherit the authentication settings configured above. However, its subgroups and sub-users could still use the other unselected authentication methods or use a different external authentication server, in addition to the inherited ones.

The combinations of authentication methods are as follows: a. Local password + SMS password/Hardware ID/Dynamic token b. Certificate/USB key + SMS password/ Hardware ID/Dynamic token c. External LDAP/RADIUS + SMS password/Hardware ID/Dynamic token d. Local password + Certificate/USB key + SMS password/Hardware ID /Dynamic token

118

SANGFOR SSL M7.5 User Manual e. External LDAP/RADIUS + Certificate/USB key + SMS password/Hardware ID

/Dynamic token

4. Associate policy set with user. A policy set is a collection of various access policies, which should be associated with user or group to control access to and use of SSL VPN (for details, refer to the Adding Policy Set section in Chapter 4).

Click on Policy Set field to enter Policy Set page and select a policy set, as shown below:

To edit a policy set, select a policy and click Edit.

To confirm the selection, click the OK button and the selected policy set will be filled in

Policy Set field.

If the desired policy set is not found in the list, click Create + Associate to create a new policy set and associate it with the user group. The procedures of adding a policy set is the same as that in Adding Policy Set section.

Enforce its users/subgroups to inherit the policy set: If this option is selected, the subgroups and users in this user group will also use this policy.

5. Assign roles to user group. For the procedures of configuring role, refer to the Adding Role section in Chapter 4.

a. Click on Roles field to enter the Assigned Roles page, as shown below:

119

SANGFOR SSL M7.5 User Manual b. Click Add to enter the Select Role page, as shown below: c. Select the checkbox next to the desired roles and click the OK button. The roles are added in to the Assigned Roles page, as shown below: d. Click the OK button and name of the assigned role is filled in the Roles field.

e. If the desired role is not found in the list, click Create + Associate to create a new role and associate with the user group. The procedures of creating a role is the same as that in Adding Role section).

f.

To remove a role from the list, select the role and click Delete.

g. To edit a role, select the role and click Edit.

No user group can be added to Default Group or Anonymous Group.

120

SANGFOR SSL M7.5 User Manual

Adding User

1. Navigate to SSL VPN > Users > Local Users page. Click Add and select User to enter the

Add User page, as shown in the figure below:

2. Configure Basis Attributes of user. The following are the basic attributes:

Name: Enter a name for this user. This field is required.

Description: Enter brief description for this user.

Added To: Select the user group to which this user is added.

Password, Confirm: Enter the password of this user account.

Mobile Number: Enter the mobile phone number of the user. If SMS authentication is applied to this user, mobile phone number must be specified so that user can get SMS password through text message.

Added To: Specifies to which user group this user is added.

Inherit parent group’s attributes: If selected, the current user will inherit its parent group’s policy set and authentication settings. If not selected, the authentication settings and policy set could be different from those of its parent group.

Inherit policy set: Indicates that the policy set of this user is the same with its

121

SANGFOR SSL M7.5 User Manual parent group.

Inherit authentication settings: Indicates that the authentication settings of this user are the same with its parent group.

3. Create and generate digital certificate for this user.

a. To generate a certificate, local CA should be enabled on SSL VPN > Authentication >

Certificate/USB Key Based Authentication page. If it is not enabled, click the

Generate Certificate button and a prompt dialog will pop up, as shown below:

If local CA is enabled, click the Generate Certificate button to enter the Generate

Certificate page, as shown below: b. Configure the fields on the above page. Since these fields are known by their name, we only introduce the following:

Issued To: Indicates the username of the SSL VPN account. This field is read-only.

Certificate Password: This password is required while user imports or installs the digital certificate on his or her computer. Please inform the corresponding user of this password after configuration is completed.

c. Select the checkbox next to Remember and take settings as defaults and the settings in all the fields will be remembered (exclusive of Certificate Password and Issued To)

122

SANGFOR SSL M7.5 User Manual and be re-used when generating certificate for users next time.

d. Click the Generate button to start generating the certificate. When it completes, the following prompt appears: e. Click the Download Certificate button and select a path to save the certificate to the computer. File extension of the certificate is .p12. Then certificate key will be shown in

Certificate/USK Key field, as shown in the figure below: f.

Import Certificate option is used to import user certificate for the user being authenticated with third-party digital certificate. Click Import Certificate to enter the

Import Certificate page, as shown below:

Select certificate file from local PC and specify certificate password and certificate issuer.

Click OK to save the settings. Then you will see the certificate key, as shown below:

Put the cursor on “External CA”, you will see an editing icon . Click on it and you can change user binding field and the external CA to which the certificate belongs.

123

SANGFOR SSL M7.5 User Manual

4. Generate USB key for the current user. The USB key can be with driver or no driver-free.

a. Navigate to SSL VPN > Authentication > Authentication Options and click the USB

Key Driver link and USB Key Tool link to download and install USB key driver (file name is dkeydrv.cab) and USB key tool (file name is DKeyImport.exe) respectively, as shown in the figure below: b. Install the USB key driver as instructed.

c. Run USB Key Tool and install the tool on the computer.

Installing USB Key Tool requires “administrator” privilege on the computer. Otherwise, installation will not be complete.

d. Click the Create USB Key to enter Create USB Key page, as shown below:

If Digital certificate issued by local CA is selected, the USB key should contain a digital certificate issued by the internal CA of the device (local CA) and user information, USB key PIN acting as password. Every time the user logs in to SSL VPN with USB key, he or she has to enter the PIN.

124

SANGFOR SSL M7.5 User Manual

If Digital certificate issued by external CA is selected, the USB key should contain a digital certificate issued by the external CA and user information, USB key PIN acting as password. Every time the user logs in to SSL VPN with USB key, he or she has to enter the PIN.

Above are two of the solutions, using ordinary USB key, which records the digital certificate and writes it into the USB key. The other solution is to use driver-free USB key, which means that the connecting user can directly use the USB key without installing the USB key driver.

If Highly encrypted user information is selected, the USB key will store user’s strictly-encrypted features (unique identifier) based on which the connecting user will be verified, as shown in the figure below:

125

SANGFOR SSL M7.5 User Manual

Enter and Confirm the PIN. Insert USB key into computer and click Create to create

USB key.

To create USB key containing Highly encrypted user information, you could go to

Certificate/USB Key Based Authentication page and configure the USB key models whose plugging in or unplugging can lead to user login or logout (for more details, refer to the Configuring USB Key Model section in Chapter 4), as shown in the figure below:

5. Assign virtual IP address to user. Virtual IP address will be assigned to connecting user automatically or manually when he or she connects to the SSL VPN.

Select either Automatic or Specified to have the system assign an available virtual IP address to the connecting user randomly or specify a virtual IP address to the user.

If Specified is selected, click Get Idle IP to obtain an available IP address or fill in a virtual

IP address into the textbox by hand. This IP address will be assigned to the user in due course.

However, if the entered IP address is not included in the virtual IP pool (that has been assigned to its parent group) or is being used by another user, a prompt of IP conflict will appear, as shown below:

126

SANGFOR SSL M7.5 User Manual

 Automatic virtual IP address assignment applies only to private user.

 By default, user inherits the attributes of its parent group, such as authentication options, policy set, etc. However, you could uncheck the option Inherit parent group's

attributes and specify an authentication solution for a specific user.

6. Configure valid time of the user account.

Expiry Date indicates the date on which this user account will get invalid. If Never is selected, the user account will be valid always. If

Specified is selected, select a date as expiry date.

7. Configure status of the user account. This user account will be enabled (valid) if Enabled is selected or disabled (invalid) if Disabled is selected.

8. Configure Authentication Settings. For details, please refer to the Adding User Group section in Chapter 4.

Public user: Indicates that multiple users can use the user account to access SSL VPN concurrently.

Private user: Indicates that only one user can use the user account to log in to the SSL

VPN at a time. If a second user uses this user account to connect SSL VPN, the previous user will be forced to log out.

9. Associate user with policy set. For detailed guide, please refer to the Adding User Group section in Chapter 4.

10. Assign roles to user group. For detailed guide, please refer to the Adding User Group section in Chapter 4.

11. Click the Save button and the Apply button to save and apply the settings.

Searching for Users

At the upper right of Local Users page, there is a Search tool intended for searching for user or group, as shown below:

127

SANGFOR SSL M7.5 User Manual

To search for user or group by username, description, virtual IP or mobile number, click and select

Search by xxx, enter the keyword and click the magnifier icon or press Enter key.

To search for a specific user or category of users with specific criteria, click Advanced Search.

The criteria for advanced search are as shown in the figure below:

Search criteria are type of keyword, keyword, type of users, authentication method, certificate issuer, expiry date and idleness of the user account.

To sort users by name or description, in ascending or descending order, click column header

Name or Description.

To specified columns to display on this page, click the downwards arrow icon and select the desired Column item in the drop-down list, as shown in the figure below:

To filter users and view only one category of users, click column header Type, as shown below:

128

SANGFOR SSL M7.5 User Manual

Managing Hardware IDs

Among the tools on Local Users page, there is an item Hardware ID. Click it to enter the

Hardware ID page, as shown below:

The following are some optional operations on Hardware ID page:

Delete: Click it to remove the selected user and/or group.

Select: Click Select > All pages or Current page to select all the hardware IDs or only those showing on the present page; or click Select > Deselect to deselect users.

Approve: Click it and the selected hardware ID(s) will be approved and the corresponding user will be able to pass hardware ID based authentication.

View: Filter the hardware IDs. Choose certain type of hardware IDs to show on the page, All,

The approved or Not approved hardware IDs.

Search: Use the search tool on the upper right of the page, to search for hardware ID based on username or hostname.

Import: Click it to import hardware IDs by hand, as shown below:

129

SANGFOR SSL M7.5 User Manual

For the file format and the way of maintaining the file that contains hardware IDs, click the

Download Example File link to download a copy to the local computer and main the hardware ID as instructed.

Overwrite the user owning a same name: If it happens that any imported user owns the name of an existing user, selection of this option would have that user imported and overwrite the existing user, including hardware ID and other information.

Click the Browse button to select a file and then Upload button to upload it.

Export: Click it to export the desired hardware IDs and save them into the computer, as shown in the figure below: a. Specify the hardware IDs that you want to export.

To export all the hardware IDs, select the option All hardware IDs and then click the

OK button. All the hardware IDs will be written into a file that will then be saved on the computer.

To export the desired hardware IDs of a specific user group, select Hardware IDs of

specified group and click the textbox to specify a user group, as shown below:

130

SANGFOR SSL M7.5 User Manual b. Click the OK button and the name of the selected user group is filled in the textbox, as shown in the figure below: c. To also export the hardware IDs of the users that are included in the subgroups of the specified user group, select the checkbox next to Subgroup included. If this option is not selected, only the hardware IDs of the direct users in the selected group will be exported.

d. Click the OK button to write the hardware IDs into a file and download the file into the computer.

Importing User to Device

Ways of importing users fall into two types: one is Import users from file and the other is

Import users from LDAP server, as shown in the figure below:

131

SANGFOR SSL M7.5 User Manual

Importing Users from File

1. On the Local Users page, select Import users from file to enter the Local Users - Import

Users from File page, as shown in the figure below:

2. Select a way of importing.

If Import Users from File (*.csv) is selected, the contents included are as follows:

132

SANGFOR SSL M7.5 User Manual

Select File: Browse a CSV file that contains user information, such as username, path, description, password, mobile number, virtual IP address, etc., among which the username is required, and others are optional. For more details on how to maintain and edit the CSV file, click the Download Example File link to download a copy and refer to the instructions in it.

If no location is specified for user, import it to: This specifies the user group to which these users will be added if the Added to Group column is not filled in for some users in the CSV file.

If the specified group does not exist, create it automatically: This happens if the

Added to Group of some users in the CSV file does not match any of the user groups existing on this Sangfor device.

In case user already exists in local device: This means the imported user’s name conflicts with an existing user’s name. Select Go on importing and overwrite the

existing user to overwrite the existing one, or select Skip importing the user that

already exists not to overwrite the existing one.

Next: Click it to import the users and add them into the specified user group.

If Import Users from Digital Certificate is selected, the contents included are as follows:

133

SANGFOR SSL M7.5 User Manual

Select File: Browse a certificate file with the .cer, .crt, .p12, or .pfx extension; or browse a ZIP file with certificates to import the user accounts of these certificate users.

Certificate Password: If certificate owns a password, fill in the certificate password.

Added to Group: This specifies the user group to which this certificate user is to be added.

Custom attributes: If this option is selected, configure the following fields, namely,

Description, Password, Confirm and Mobile Number. These certificate users will inherit the attributes specified here after they are imported into the specified user group on this Sangfor device; otherwise, these certificate users will inherit the attributes of its parent group (specified by Added to Group), with description, password and mobile number being null by default.

If Import Group Tree From File (*.xml) is selected, the contents included are as follows:

Select File: Browse the XML file that you have edited. For more details of how to maintain the file, click the Download Example File link to download a copy and refer to the instructions in it.

Added to Group: This specifies the user group to which the group tree will be added.

3. Configure the corresponding options on the above pages.

4. Click the Finish button to import the users.

Importing Users from LDAP Server

1. On the Local Users page, select Import users from LDAP server, and the LDAP Server page appears, as shown in the figure below:

134

SANGFOR SSL M7.5 User Manual

2. Click Import Users to enter Import Users from LDAP Server page, as shown below:

3. Configure the Import Users from LDAP Server page.

LDAP Server: This shows the name of the current LDAP server.

Users: Click it to enter the Users page and select the users that you want to export from the LDAP server and add into the list on Local Users page, as shown below:

You could either import user recursively or import individual users. If Importing user

recursively is selected, and the users and groups on the LDAP server will be added into this Sangfor device as a whole, without altering its OU structure. If Importing

individual users is selected, the users to be imported are the selected users.

135

SANGFOR SSL M7.5 User Manual

Added To Group: This specifies the user group to which these users will be added after they are imported into this Sangfor device.

Import: Indicates the solution of importing users. One is Copy user group tree to

target group and import users and the other is Add all users into target group but

ignore user group tree. The former option indicates that the organizational unit (OU) on the LDAP server together with the users will be synchronized to this Sangfor device, while the latter option means that only the users will be added to the specified group.

If User Exists: This means name of LDAP user is the same as that of local user (on the

Sangfor device). Select Go on importing user to overwrite the existing one to replace the existing user with the one that are being imported from the LDAP server, or select

Skip this user, not overwriting the existing one to skip importing the user and go on importing the others without replacing the existing user with a new one.

Automatic Import: This indicates whether the users will be automatically imported into this Sangfor device and added to the specified group in due course. If Enable

automatic import is selected, configure interval to have the users in specified group imported into the Sangfor device periodically. What worth being mentioned is that the auto-importing result could be referred to in Maintenance > Logs.

The objects imported automatically include users and groups.

4. Click the Save and Import Now button to save the changes and import the users. When user import completes, the result will show up at the top of page.

Moving Users to Another Group

1. On the Local Users page, select the desired user/group(s) and click Move (on the toolbar) to enter User Groups page, as shown below:

136

SANGFOR SSL M7.5 User Manual

2. Select a user group to which the user/group(s) is added.

3. Click the OK button.

Exporting Users

1. Navigate to SSL VPN > Users > Local Users page and click More > Export to enter the

Export User File page, as shown in the figure below:

2. Select the objects that you want to export.

Two solutions are available, Export the Group Tree Current Admin is in Charge and

Export Specified Users/Groups. If the former is selected, the organization structure in the current administrator’s administrative realms will be exported. If the latter is selected, users on specified groups will be exported, as shown below:

137

SANGFOR SSL M7.5 User Manual

3. Select the desired user group and then click the Export button. The selected user will be written into a CSV file and saved on the local computer.

The exported user information includes username, group path, password (encrypted by an algorithm developed by SANGFOR), mobile number, virtual IP address, description and the time user logged in last time, as shown below:

Associating Roles with User

1. Navigate to SSL VPN > Users > Local Users page and click More > Associate with role to enter the Roles Associated With xxx page, as shown below:

2. Click Add to enter the Roles page, as shown in the figure below.

138

SANGFOR SSL M7.5 User Manual

The roles on Roles page are all the roles predefined under SSL VPN > Roles > Role

Management.

3. Select the checkboxes next to the roles that you want to associate with the selected user or group.

4. Click the OK button and then the Submit button to save the settings.

Configuring SSO User Account

SSO feature facilitates user to perform one-stop access to the resource that has enabled SSO.

When the connecting user clicks on the resource name on the Resource page, he or she will directly visit that resource with the Sangfor device helping him or her submit the required credentials (username and password of the user account).

SSO user account should be configured if SSL VPN user account has associated with any resource that allows SSO.

To configure SSO user account for a user, perform the following steps:

1. Navigate to SSL VPN > Users > Local Users, select a desired user and click More >

Configure SSO user account to enter the SSO User Accounts page, as shown below:

2. Select the desired resource(s) to edit the SSO user account, as shown below:

3. Enter the username and password of the SSO user account into the corresponding fields, and

139

SANGFOR SSL M7.5 User Manual click the OK button. The newly created SSO user account is configured.

4. Click the Close button and the Apply button on the next page to save and apply the changes.

Generating Multiple Certificates for Users

To save time and trouble, generating certificates for a bunch of users is a good choice.

1. Navigate to SSL VPN > Users > Local Users page and click More > Generate multiple

certificates, as shown below:

2. Select the desired users and click the Next button to create and generate multiple certificates, as shown below:

140

SANGFOR SSL M7.5 User Manual

Configure the fields on the page. The following are the contents:

 Configure the required fields, such as Country, State, City, Company, Department,

Valid To and Certificate Password. E-Mail is not configurable. Issued To shows the username and is not configurable.

Remember and take settings as defaults: If it is selected, the settings in all the fields will be remembered (exclusive of Certificate Password and Issued To), so that they could be reused when generating certificate for a bunch of similar users next time.

3. Click Generate to generate certificates for the specified users one by one, as shown below:

4. To save the certificate to the computer, click the Download Certificate button.

Configuring Multiple Users Assigned To CA

If you want to assign multiple users to one third-party CA, perform the following steps:

1. Navigate to SSL VPN > Users > Local Users page, and click More > Multiple Assigned To

CA, as shown below:

141

SANGFOR SSL M7.5 User Manual

2. Select the desired users and/or group, then specify the CA to which you want to assign these users.

3. Click OK to save the settings.

Creating Multiple USB Keys for Users

To save time and trouble, creating USB keys for a bunch of users is a good choice.

1. Navigate to SSL VPN > Users > Local Users page and click More > Generate multiple

USB keys to enter the following page:

2. Select USB key type (take USB key containing digital certificate for example) and click the

Next button, the next step is as shown below:

142

SANGFOR SSL M7.5 User Manual

3. Select the desired users and/or groups and click the Next button to proceed, as shown below:

4.

Configure the required fields. Click the Create button and the process is as shown below:

143

SANGFOR SSL M7.5 User Manual

5. Every time when the process stops here, insert a physical USB key into the USB port of the computer, enter PIN and click the Create button to write information of the current user into the USB key.

To give up creating USB key for a user, click the Skip button to skip that user.

To rewrite information into the USB key of the previous user, click the Previous button.

To stop writing user information into and generating USB key, click the Finish button.

6. After creating USB key, give the USB key to the corresponding user and the user could use the USB key to log in to SSL VPN.

Viewing Associated Resources of User

To see what resources are available to certain user or group, select that user or group and click

Associated Resource. The resources available to the selected user or group are as shown below:

144

SANGFOR SSL M7.5 User Manual

Resources

The resources we are talking about in this user manual are the resources that can be accessed by specified users over SSL VPN.

Resource type falls into Web application, TCP application, L3VPN and Remote Application.

Navigate to SSL VPN > Resources page appears, as shown below:

A resource group could contain a number of resources entries. Similar to user management, resources could be grouped according to categories and associated user or group, etc. This kind of management is welcomed by majority of administrators because it makes resources more distinguishable.

Navigate to SSL VPN > Resources and click on the resource group, and the resources included in the group are displayed on the right pane. The resource group tree is as shown in the figure on the right.

External resources is a group protected by system and cannot be deleted; however, its attributes could be modified. All the resources contained in this resource group are the resources associated with LDAP users.

Default group is also a group protected by system and cannot be deleted, but its attributes could be modified.

145

SANGFOR SSL M7.5 User Manual

Adding/Editing Resource Group

1. Click Add > Resource Group to enter Edit Resource Group, as shown in the figure below:

2. Configure Basic Attributes of the resource group. The following are the basic attributes:

Name, Description: Indicates the name and description of the resource group respectively. This name will be seen on Resource page after user logs in to the SSL

VPN successfully.

View resource: Indicates the way resources are displayed on Resource page, in icon or in text. If In Icons is selected, define the icon size, 48*48, 64*64 or 128*128, so that the resources will be displayed in icon as wanted. If In Text is selected, you may select

Show description of the resource. To manage icons, refer to the Uploading Icon to

Device section in Chapter 3.

Added To: Indicates the resource group to which this group is added. This also means that the administrative privilege over this resource group is moved from the creator

(who created this resource group) to its high-level administrator, while the creator has no right to edit this resource group and the resources in it.

It is normal that the creator is unable to see the resource group and its resources on the administrator console, if the administrative privilege over a resource has been moved

146

SANGFOR SSL M7.5 User Manual from the creator to its high-level administrator.

3. Specify Authorized Admin who will have the right to manage this resource group and the right to grant other administrators the right to manage this resource group.

4. Configure Load Balancing Resources feature when a resource group has multiple resources of the same type, but with different IP addresses. Sangfor device will distribute the resource, elected by corresponding weight, to client. The resources contained in Load Balancing

Resources tab are attached with weight that ranges from 1 to 9 (by default, it is 5), as shown below:

 A resource could be included in only one resource group.

 Maximum 100 resource groups are supported.

5. Click the Save button to save the settings.

Background Knowledge: Load-Balanced Resource Access

Assume that three resources named Web1, Web2 and Web3 are created based on three servers providing services, and are added into a new group Website homepage. The three resources have the same settings but different IP addresses; weights for load balancing are 5, as shown below:

147

SANGFOR SSL M7.5 User Manual

Working Principle

The background actually ensures that a load-balancing resource has been generated already.

Administrator can see that resource while editing a role to associate user with resources (under

SSL VPN > Roles > Edit Role), as shown in the figure below:

If the associated resource Website hompage_auto_balancer_rc of the role is assigned to users or groups, the first five connecting users will access the resource launched by Web 1, the second five users access the resource launched by Web 2 and the third five connecting users access the resource launched by Web 3. Through this way, load of the three servers is kept balanced (to associate resources with user or group, refer to the Adding Role section in Chapter 4).

The load balancing resources available to the designated user will show as follows after the user logs in to the SSL VPN:

148

SANGFOR SSL M7.5 User Manual

To access the same resource provided by a different server, connecting user needs only to click the

Load Balance button.

Adding/Editing Web Application

1. Navigate to SSL VPN > Resources page and click Add > Web app to enter Edit Web

Application page, as shown below:

2. Configure Basic Attributes of the Web application. The following are the basic attributes:

Name, Description: Indicates the name and description of the Web resource. This name may be seen on the Resource page after user logs in to the SSL VPN successfully.

149

SANGFOR SSL M7.5 User Manual

Type: Options are HTTP, HTTPS, MAIL, FileShare and FTP.

Address: Indicates the address of the resource. Enter the IP address or domain name of the Web server that is to be visited by user while this resource is requested.

If the selected Web application type is HTTP or HTTPS, the fields are as shown below:

 Address field is required. The address must begin with http:// or https://, for example, http://200.200.0.66 and https://200.200.0.66.

 If resource address is domain name or hostname, add a host entry to map the domain name/hostname to the actual IP address (in System > Network > Hosts, refer to the Configuring Host Mapping Rule (HOSTS) section in Chapter 3), or configure the DNS server of the Sangfor device and ensure it can resolve the local domain names (in System > Network > Deployment).

If the selected Web application type is MAIL, enter the IP address of the SMTP server in the Address field and configure SMTP Port, IMAP Port (defaults are recommended) and Domain Name (of the mailbox) the fields, as shown below:

150

SANGFOR SSL M7.5 User Manual

To enable users to use this type of email receiving and sending, the mail server must support protocol IMAP.

If the selected Web application type is FTP, enter IP address or domain name of the

FTP server into the Address field, and configure FTP Port of the FTP server that users are going to connect to (default is recommended), as shown below:

After entering domain name into the Address field and completing the configuration, go to System > Network > Hosts and add a Host entry to map the domain name or host name to the IP address of the FTP server.

Added To: Indicates the resource group to which this resource is added. By default, the selected resource group is Default group (to configure resource group, refer to the

Adding/Editing Resource Group section in Chapter 4).

Icon: Indicates the icon for this resource, which could be seen on the Resource page if this resource is added to a group that has its resources shown in icons. Select an icon, or click on the icon to upload a new one.

To browse an image and upload it from the local PC to the device, click Upload (for detailed guide, refer to the Uploading Icon to Device section in Chapter 3).

Visible for user: To have connecting users see this resource on the Resource page, select this option. Invisibility here only means that the resource will not be seen on the

Resource page; in fact, it is still accessible to the user.

Enable resource address masquerading: To conceal the true IP address of the resource,

151

SANGFOR SSL M7.5 User Manual select this option.

3. Configure SSO tab.

To enable user to access corporate resources over SSL VPN using SSO, select Enable SSO option and configure the SSO page (under System > SSL VPN Options > General. For more details, refer to the Configuring SSO Options section in Chapter 3). Enable SSO on

SSO tab and specify login method, as shown below:

4. Configure Authorized Admin tab.

Specify the administrators who will have the right to manage this resource and the right to grant other administrator the privilege to manage this resource.

 The authorized administrators cannot edit the resource. They only have the right to assign this resource to users (in other words, to associate resources with the role under

SSL VPN > Roles > Edit Role) and to grant other administrators (in its permitted realm) the privilege to manage this resource, rather than the privilege of editing the resource.

 Please it keep in mind that the privilege of editing a resource always belongs to the creator who has created this resource as well as the administrator with higher privilege.

The authorized administrators cannot see those resources in Resources page, but can see and associate them with users on the Add Role or Edit Role page.

5. Configure Accounts Binding tab, as shown in the figure below.

152

SANGFOR SSL M7.5 User Manual

If Verify user by analyzing packet is selected, the SSL VPN account will bind to the account for resource access, in the way that packet is obtained as specified according to

Packet Format and the others settings. For end user, he or she needs to use the corresponding SSL VPN account and resource access account to access the resource over

SSL VPN, other user accounts being unable to match the credential.

Web application, TCP application and L3VPN support accounts binding.

Applying Verify user by analyzing packet does not need SSO to be enabled.

6. Configure URL Access Control tab. This achieves the control over users’ access to certain directory of a server, user being able or unable to access the specified directory.

Select Only allow access to the URLs below to allow user to access the specified ULR in the list, or select Only deny access to the URLs below to forbid user from accessing the specified ULR in the list. To add a new URL, click Add to enter the Add URL page, as shown below:

153

SANGFOR SSL M7.5 User Manual

Please note that the URL access control feature is only available while Web application type is HTTP, HTTPS or FileShare. The other two types of Web application (MAIL and FTP) do not support this feature.

7. Configure Site Mapping tab.

Select Enabled to enable site mapping feature. Administrator can specify a VPN port or domain name mapping to this Web resource. VPN User accesses this Web resource via the specified VPN port or domain name.

If VPN Port is selected, you need to enter VPN port number in Port field, which cannot conflict with other ports in use; if Domain is selected, the domain name is required, and it should be a public URL of SSL VPN. To ensure the domain name can be resolved on client PC, add a Host entry on client PC. User cannot connect to SSL VPN though the specified domain name if

Domain is selected.

To rewrite webpage on client, select Rewrite webpage contents. Checking this option is recommended.

Site mapping and resource address masquerading features cannot be enabled together.

Site mapping feature is only available while Web application type is HTTP, HTTPS. The other types of Web application (FileShare, MAIL and FTP) do not support this feature.

154

SANGFOR SSL M7.5 User Manual

For the resource enabling site mapping feature, it can be accessed only through clicking resource link. It is not accessible through typing resource address into the URL field.

8. Click the Save button and the Apply button to save and apply the settings.

After the user logs in to the SSL VPN, he or she will see the available resources on the

Resource page, as shown below:

To access an available Web resource, the user needs only to click the resource link, or enter resource address into the URL field and click the Go button.

Web resources could be accessed via all types of browsers including non-IE browsers.

Adding/Editing TCP Application

TCP application is a type of resource that allows end users to use TCP-based application on their local computer to access corporate resources and servers over SSL VPN.

1. Navigate to SSL VPN > Resources and click Add > TCP app to enter the Edit TCP

Application page, as shown in the figure below:

155

SANGFOR SSL M7.5 User Manual

2. Configure Basic Attributes of the TCP application. The following are the basic attributes:

Name, Description: Indicates the name and description of the TCP resource. This name may be seen on the Resource page after user logs in to the SSL VPN.

Type: Indicates the type of the TCP application. Some common types are built in the

Sangfor device.

This selection determines the port number entered in the Port field automatically. If the

TCP application is not any of the built-in types, select Other and configure the port manually.

Address: Indicates the address of the TCP resource. To add one entry of address (IP address, domain name or IP range), click the Add Address tab. To add multiple entries of addresses, click the Add Multiple Addresses tab, as shown in the figures below:

156

SANGFOR SSL M7.5 User Manual

Port indicates the port used by this TCP application to provide services. For built-in types of TCP applications, this port is predefined. For Other type of TCP application, enter the corresponding port number.

 If resource address is domain name, navigate to System > SSL VPN Options >

General > Local DNS to configure local DNS server (for detailed guide, refer to the Configuring Local DNS Server section in Chapter 3).

Program Path: Indicates path of the client software program that may be used by C/S

(client/server) application.

Added To: Indicates the resource group to which this resource is added. By default, the selected resource group is Default group (to configure resource group, refer to the

Adding/Editing Resource Group section in Chapter 4).

Visible for user: To have connecting users see this resource on the Resource page, select this option. Invisibility here only means that the resource is not seen on the

157

SANGFOR SSL M7.5 User Manual

Resource page, in fact, it is still accessible to the user.

Enable resource address masquerading: To conceal the true IP address of the resource, select this option.

3. Configure SSO tab.

To enable connecting users to use SSO feature to access corporate resources over SSL VPN, select Enable SSO option and configure the SSO page (under System > SSL VPN

Options > General > SSO. For more details, refer to the Configuring SSO Options section in Chapter 3).

4. Configure Authorized Admin tab.

Specify the administrators who will have the right to manage this resource and the right to grant other administrator the privilege to manage this resource.

 The authorized administrators cannot edit the resource. They only have the right to assign this resource to users (in other words, the right to associate resources with the role under SSL VPN > Roles > Edit Role) and to grant other administrators (in its permitted realm) the privilege to manage this resource, rather than the privilege of editing resource.

 Please it keep in mind that the privilege of editing a resource always belongs to the creator who has created this resource as well as the administrator with higher privilege.

The authorized administrators cannot see those resources in the Resources page, but can see and associate them with users on the Add Role or Edit Role page.

5. Configure Accounts Binding tab, as shown in the figure below.

158

SANGFOR SSL M7.5 User Manual

If Verify user by analyzing packet is selected, the SSL VPN account will bind to the account for resource access, in the way that packet is obtained as specified according to

Packet Format and the others settings.

If Resource is accessible to user using the designated SSO user account is selected, end user has to use the corresponding SSL VPN account and designated SSO user account to access this TCP resource over SSL VPN, other user accounts being unable to match the credential.

Web application, TCP application and L3VPN support accounts binding.

 To enable end users to single sign in to a resource, enable SSO for that resource (under

SSL VPN > Resources > Edit TCP Application > SSO tab) and bind the SSL VPN account to the SSO user account (to configure SSO user account, refer to the

Configuring SSO User Account section in Chapter 4).

 Applying Verify user by analyzing packet does not required SSO to be enabled.

6. Configure URL Access Control tab.

This achieves the control over users’ access to certain directory of a server, user being able or unable to access the specified directory.

Please note that URL access control feature is only available while the selected TCP application type is HTTP. The other types of TCP applications do not support this feature.

7. Configure Others tab. This tab covers two options, Protect crucial files and Apply smart

recursion, as shown in the figure below:

159

SANGFOR SSL M7.5 User Manual

Apply smart recursion: Select this option to apply smart recursion to this resource.

Before doing so, go to System > SSL VPN > General > Resource Options > TCP

App to enable and configure smart recursion. For more details, please refer to the

Background Knowledge: What is Smart Recursion? in Chapter 3 and Scenario 4:

Configuring and Applying Smart Recursion in Chapter 3.

Protect crucial file: This feature is intended to lock some crucial files that might be invoked by the process while user is accessing the Internet by using Socket connection, so that these crucial files will not be altered during SSL VPN access. If any of these protected processes and crucial files is altered, the corresponding resource would not be accessible to the user.

To add crucial files, perform the following steps: a. Click the Edit button next to Crucial File to enter the Files page, as shown below: b. Click Add > Process related file to select the process (file extension is .exe).

c. The selected file and all the involved DLL files are added to the Files page, with the information of file directory and MD5, as shown in the figure below: d. To view a specific type of file, dll, exe or pdb, specify the file type in the textbox at the upper right of the page. By default, all files are displayed.

e. To remove an entry, select the checkbox next to the entry and click Delete.

f. Click the OK button to save the settings.

160

SANGFOR SSL M7.5 User Manual

 While any user is accessing the resource, none of the protected files can be altered.

 The first time TCP resource is accessed by end user over SSL VPN, the TCP component may be installed on the computer automatically. However, installation of TCP component requires administrator privilege on the computer. If any firewall or anti-virus software is installed and runs on the client PC, it will block installation process. To ensure the component installed successfully, terminate the firewall or anti-virus software first.

8. Click the Save button and then the Apply button to save and apply the settings.

Adding/Editing L3VPN

L3VPN is a type of resource based on IP protocol, allowing end users to use TCP/UDP/ICMP based application on their computer to remotely access corporate resources and servers over SSL

VPN.

1. Navigate to SSL VPN > Resources page and click Add > L3VPN to enter the Edit L3VPN page, as shown in the figure below:

161

SANGFOR SSL M7.5 User Manual

2. Configure Basic Attributes of the L3VPN. The following are the basic attributes:

Name, Description: Indicates the name and description of the L3VPN. This name may be seen on the Resource page after user logs in to the SSL VPN successfully.

Type: Indicates type of the L3VPN. Some common types are built in the Sangfor device.

This selection determines the port number entered in the Port field automatically. If the

L3VPN is not any of the built-in types, select Other and configure the port by hand.

Protocol: When the selected L3VPN type is Other, Protocol is selectable. Options are

All, TCP, UDP and ICMP. Select the protocol according to the L3VPN you are defining.

Address: Indicates address of the L3VPN. To add one entry of address (IP address, domain name or IP range), click the Add Address tab. To add multiple entries of addresses, click the Add Multiple Addresses tab, as shown in the figures below:

162

SANGFOR SSL M7.5 User Manual

Port indicates the port used by this L3VPN to provide services. For the built-in types, this port is predefined. For Other type of L3VPN, enter the port number that is to be used by the L3VPN you are defining.

 If resource address is domain name, navigate to System > SSL VPN Options >

General > Local DNS to configure local DNS server (for detailed guide, refer to the

Configuring Local DNS Server section in Chapter 3).

Program Path: Indicates path of the client software program that may be used by some

C/S application.

Added To: Indicates the resource group to which this resource is added. By default, the selected resource group is Default group (to configure resource group, refer to the

Adding/Editing Resource Group section in Chapter 4).

Visible for user: To have connecting users see this resource on the Resource page, select this option. Invisibility here only means that the resource is not seen on the

163

SANGFOR SSL M7.5 User Manual

Resource page, in fact, it is still accessible to the user.

3. Configure SSO tab.

To enable connecting users to use SSO feature to access corporate resources over SSL VPN, select Enable SSO option and configure the SSO page (under System > SSL VPN

Options > General. For more details, refer to the Configuring SSO Options section in

Chapter 3).

4. Configure Authorized Admin tab.

Specify the administrators that will have the right to manage this resource and the right to grant other administrator the privilege to manage this resource.

 The authorized administrators cannot edit the resource. They only have the right to assign this resource to users (in other words, the right to associate resources with the role under SSL VPN > Roles > Edit Role) and to grant other administrators (in its permitted realm) the privilege to manage this resource, rather than the privilege of editing resource.

 Please it keep in mind that the privilege of editing a resource always belongs to the creator who has created this resource as well as the administrator with higher privilege.

The authorized administrators cannot see those resources in the Resource Management page, but can see and associate them with users on the Add Role or Edit Role page.

5. Configure Accounts Binding tab, as shown in the figure below.

164

SANGFOR SSL M7.5 User Manual

If Verify user by analyzing packet is selected, the SSL VPN account will bind to the account for resource access, in the way that packet is obtained as specified according to

Packet Format and the others settings.

If Resource is accessible to user using the designated SSO user account is selected, end user have to use the corresponding SSL VPN account and designated SSO user account to access this L3VPN resource, other user accounts being unable to match the credential.

Web application, TCP application and L3VPN support accounts binding.

 To enable end users to single sign in to a resource, enable SSO for that resource (under

SSL VPN > Resources > Edit L3VPN > SSO tab) and bind the SSL VPN account to the SSO user account (to configure SSO user account, refer to the Configuring SSO

User Account section in Chapter 4).

 Applying Verify user by analyzing packet does not require SSO to be enabled.

6. Configure URL Access Control tab.

This achieves the control over users’ access to certain directory of a server, user being able or unable to access the specified directory.

165

SANGFOR SSL M7.5 User Manual

URL access control feature is only available while the selected L3VPN type is HTTP. The other types of L3VPN do not support this feature.

7. Click the Save button and Apply button to save and apply the settings.

 The first time L3VPN resource is accessed over SSL VPN, L3VPN component may be installed on the user’s PC automatically. However, installation of L3VPN component requires administrator privilege on the computer. If any firewall or anti-virus software is installed and runs on the computer, it will block installation process. To ensure the component installed successfully, terminate the firewall or anti-virus software first.

 Among the L3VPN resources, there is a system-protected L3VPN resource named All

Subnet L3VPN resources. This resource stands for all L3VPN resources with the addresses on the subnets where LAN and DMZ interfaces reside and those resources on the subnets where LAN and DMZ interfaces reside, using the protocol TCP, UDP or

ICMP (port: 1-65535). Like other L3VPN resource, it can be associated with users; however, no attribute of it can be modified except for the name, description and visibility.

If the subnet resources do not reside in the same network segment as the LAN and DMZ interface of the Sangfor device, which means, there is layer-3 router or switch on the way, add the subnet on the Local Subnets page (under System > Network) and a corresponding route on Routes page (under System > Network) to make that subnet

“local”. That will enable the machines on the two subnets to communicate directly.

Adding/Editing Remote Application

Remote applications are applications launched by remote servers and accessed by end users over

SSL VPN. User runs the program on the local computers but access the data on the remote server in the remote application session.

1. Navigate to SSL VPN > Resources and click Add > Remote Application to enter the Edit

Remote Application Resource page, as shown below:

166

SANGFOR SSL M7.5 User Manual

2. Configure Basic Attributes of the remote application. The following are the basic attributes:

Name, Description: Indicates the name and description of the remote application. This name may not be seen on the Resource page after user logs in to the SSL VPN successfully.

Added To: Indicates the group to which this resource is added. By default, the selected resource group is Default group (to configure resource group, refer to the

Adding/Editing Resource Group section in Chapter 4).

Icon: Icon specified for this resource, which could be seen on the Resource page if this resource is added to a group that has its resources show in icons.

Program: Specifies the applications provided by remote application server. Click on

Select to select the desired application, as shown in the below figure:

167

SANGFOR SSL M7.5 User Manual

Working Directory:Indicates the path of the application on remote application server.

Command Line Argument: Specifies the parameters that may be used when some application program starts.

If Maximize window after program is launched is selected, program window will be maximized once program is launched.

In case that Single instance is allowed is selected and user has launched an application, user will be redirected to the previously-launched application if user clicks on the resource link again, instead of launching a new instance. If command line argument is configured, this options is not recommended to enable.

3. Click the App Server tab and select remote application servers, so that they can provide the application (to configure remote server, refer to the Adding Remote Application Server section in Chapter 4).

4. Configure SSO License tab.

If SSO feature is enabled and SSO information is recorded, SSO will be performed automatically when user accesses specific remote application over SSL VPN.

168

SANGFOR SSL M7.5 User Manual

As to remote application, SSO feature only supports the method of auto fill in form.

If you want to deliver a browser allowing SSO, only IE-cored browser can be delivered.

When recording SSO information for remote application, only IE is taken as B/S-based resource, all the other resources are taken as C/S-based resource.

5. Configure Authorized Admin tab.

Specify the administrators who will have the right to manage this resource and the right to grant other administrator the privilege to manage this resource.

 The authorized administrators cannot edit the resource. They only have the right to assign this resource to users (in other words, the right to associate resources with the role under SSL VPN > Roles > Edit Role) and to grant other administrators (in its permitted realm) the privilege to manage this resource, rather than the privilege of editing resource.

 Please it keep in mind that the privilege of editing a resource always belongs to the creator who has created this resource as well as the administrators with higher privilege.

The authorized administrators cannot see those resources in the Resources page, but can see and associate them with users on the Add Role or Edit Role page.

169

SANGFOR SSL M7.5 User Manual

More Operations

More operations include Export resource, Import resource and Resource Sorting. Click More on Resources page, you will see the following figure:

Exporting Resources

This feature helps export the existing resources from the current Sangfor device to the computer.

1. Navigate to SSL VPN > Resources and click More > Export resource to enter the Export

Resource page, as shown the figure below:

2. Select the checkboxes next to the resources or resource groups that you want to export.

3. Click the Export button. By default, the exported resource will be saved in a csv file named

rclist.csv.

170

SANGFOR SSL M7.5 User Manual

Importing Resources

This feature helps import resources from the computer to the Sangfor device.

1. Navigate to SSL VPN > Resources and click More > Import resource to enter the Import

Resource page, as shown in the figure below:

2. Configure the following included on Import Resource page:

Download Example File: Before uploading the csv file, make sure that format of each resource entry in it is proper. It is recommended to download the example file and edit the resources based on the example file. After editing the csv file, upload it through the above page.

Customize resource attributes: The two fields below it define the attributes of the imported resources, the description and the target group to which they are to be added.

Overwrite existing resources: If this option is checked, the existing resource will be replaced by the imported resource that owns a same name.

3. Click the Import button.

Sorting Resources

Sorting resource is a feature applying to resource group. You can change the resource order by clicking Move to Top, Move Up, Move Down or Move to Bottom button. The resource order in the group determines the order of the resources that end users see on the Resource page.

1. Navigate to SSL VPN > Resources and click More > Import resource to enter the Import

Resource page, as shown in the figure below:

171

SANGFOR SSL M7.5 User Manual

2. To move an entry to top of the list, click the entry and click Move to Top.

3. To move an entry to bottom of the list, click the entry and click Move to Bottom.

4. To move an entry up and exchange order with the upper entry, click the entry and click Move

Up.

5. To move an entry down and exchange order with the lower entry, click the entry and click

Move Down.

6. To edit the selected resource, click Edit; to remove the selected resource, click Delete on

Resources page, as shown below:

7. To select the resources on current page, click Select > Resource > Current page, or click

Select > Resource > All pages to select the resources on all pages, as shown below:

172

SANGFOR SSL M7.5 User Manual

8. To deselect the selected resource, click Deselect.

9. To move a resource to other resource group, select the resource and click Move.

Please note that resource group cannot be moved.

10. To view associated user of a selected resource, click View Association, as shown below:

11. To view resource of specific type, you can specify the desired resource type in View field on

Resources page. Options are All, Resource group, Web app, TCP app, L3VPN, Remote

Application and Easylink app.

173

SANGFOR SSL M7.5 User Manual

Roles

A role is an intermediate that builds a connection between user/group and resource, more specifically, designates internal resources to user or group. Users can only access the designated internal resources over SSL VPN.

This kind of association enables one or multiple users or groups to associate with one or multiple resources, facilitating control over users’ access to corporate resources.

Navigate to SSL VPN > Roles and the Role Management page appears, as shown below:

The following are some contents included on Role Management page:

Search By Name/Description/User(Group): To search for specific role or type of roles, select an option, enter the keyword into the textbox and click the magnifier icon.

Name/description indicates the name/description of the role. User/group indicates the user and/or group that the role is assigned to.

Role Name: Indicates name of the role.

Description: Indicates description of the role.

Add: Click it to add new role directly or using an existing role as template.

Edit: Click it to edit a selected role.

Delete: Click it to remove the selected role(s).

Select: To select roles on all pages, click Select > All pages; click Select > Current page to select roles on current page. To deselect entries, click Select > Deselect.

174

SANGFOR SSL M7.5 User Manual

Adding Role

1. Navigate to SSL VPN > Roles and click Add > Role to enter the Add Role page, as shown in the figure below:

2. Configure the Basic Attributes of the role. The following are basic attributes:

Name: Configures name of the role.

Description: Configures description of the role.

Assigned To: Configures the user and/or group that can access the associated resources.

To specify user and group, click the Select User/Group button, and all the predefined users and groups on Local Users page are seen in the list, as shown below:

175

SANGFOR SSL M7.5 User Manual

Select the user or group to which the role is to be assigned and click the OK button.

Security Policy: This policy enforces host checking when user logs in to the SSL VPN.

If user fails any security check, he or she cannot access the associated resources.

To specify a role-level policy, click the Select Role-level Policy button and all the predefined role-level policies are seen (to configure role-level policy, refer to the

Adding Role-level Policy section in chapter 4), as shown in the figure below:

If no role-level policy is configured, you do not need to configure security policy.

3. Configure associated resources. Click Select Resources to enter the Select Resource page and select resources that the associated users of this role can access, as shown below:

176

SANGFOR SSL M7.5 User Manual

4. Click the Save button on the Add Role page to save the settings.

Getting Privilege Report

Privilege report is a kind of report telling what resources the specified users can access, or what users can access the specified resources.

1. Click Get Privilege Report to get started, as shown below:

2. Select the type of report you want to generate. There are two types of privilege reports,

User-based report and Resource-based report. The former type of report presents what internal resources the selected users can access, while the latter type of report presents what users can access the selected resources

To generate user-based privilege report, perform the following two steps: a. Select User-based report… and click the Next button, as shown below:

177

SANGFOR SSL M7.5 User Manual b. Select the desired user(s) and click the Finish button to download the .csv file. The download user-based privilege report file is as shown below:

To generate resource-based privilege report, perform the following two steps: a. Select Resource-based report… and click the Next button, as shown below:

178

SANGFOR SSL M7.5 User Manual b. Select the desired resource(s) and click the Finish button to download the .csv file. The download resource-based privilege report file is as shown below:

179

SANGFOR SSL M7.5 User Manual

Authentication Options

Authentication Options covers settings related to primary and secondary authentication methods.

Navigate to SSL VPN > Authentication and the Authentication Options page appears, as shown in the figure below:

180

SANGFOR SSL M7.5 User Manual

Primary Authentication Methods

There are five primary authentication methods, namely, local password based authentication,

LDAP authentication, RADIUS authentication, certificate/USB key based authentication and

client-side domain SSO authentication.

Local Password Based Authentication

The settings related to local password based authentication include password security options and username options.

Navigate to SSL VPN > Authentication to enter the Authentication Options page (as shown in the figure above). Click the Settings button following Local Password, and the Local Password

Based Authentication page appears, as shown in the figure below:

181

SANGFOR SSL M7.5 User Manual

The following are some contents included on the Local Password Based Authentication page:

Password Security Options: Configures the password strength, the ways that users change password. If enabled is selected, password security check will be performed when user logs in to SSL VPN. If user password fails to match the password security policy configured in this field, user will be asked to change password.

Username Options: If the option Ignore case of username is selected, case of username would be ignored when users enter credentials to log in to SSL VPN. If any same usernames in different case already exist in user organization structure before this option is enabled, such as “HSw”, “hsw”, this user will fail to modify personal information after Ignore case of

username is selected, he/she needs to modify its username first. Then enable this option.

Password Security Options and Username Options only apply to the user accounts in local

Sangfor device.

LDAP Authentication

Sangfor device supports third-party LDAP server to verify the users connecting the SSL VPN.

Configuring LDAP Server

1. Navigate to SSL VPN > Authentication to enter the Authentication Options page. Click the Settings button following LDAP and the LDAP Server page appears, as shown below:

2. Click Add to enter the Add/Edit LDAP Server page, as shown below:

182

SANGFOR SSL M7.5 User Manual

3. Configure the Basic Attributes of the LDAP server. The following are basic attributes:

Server Name, Description: Configures the name and description of the LDAP server.

Server Address: Configures the usable IP address and port of the LDAP server. You can add multiple IP addresses and ports. Generally, only the first IP address/port is active and the others are standby. If the first IP address/port is unavailable, the second IP address/port will take the place; if the second IP address/port is unavailable, the third IP address/port will take the place, and so on; if none of the configured server IP addresses/ports is available, the server will be disconnected.

To add an entry of server address and port, click the Add icon next to the Server

Address field. The Add Server Address page is as shown in the figure below:

183

SANGFOR SSL M7.5 User Manual

To remove an entry, click the entry and click Delete icon

To edit an entry, click the entry and click Edit icon next to Server Address.

next to Server Address.

To adjust order of an entry, click the entry and click Move Up icon icon .

or Move Down

Admin DN, Password: Configure the administrator account to read the organizational units (OU) and security groups on the LDAP server. The administrator account should be in DN format.

This administrator must have privilege to read path of users on the LDAP server.

Base DN: Configures the location of the LDAP users that are to be verified.

Subtree included: Select this option so that the users contained in the sub-OU of the

OU specified in Base DN field are included in. Otherwise, only the direct users in the specified OU level will be verified.

Authentication Timeout: Configures the time period that user authentication gets timed out if LDAP server gives no response.

Status: Indicates whether the LDAP server is enabled.

4. Configure the Advanced options. The values in these fields must be consistent with those on the LDAP server

184

SANGFOR SSL M7.5 User Manual

Protocols supported are LDAP and MS Active Directory (AD). For MS AD, user authentication is achieved using attribute sAMAccountName and filter

objectCategory=person. For LDAP, user authentication is achieved using attribute uid and filter objectclass=person. However, the attribute names could be modified.

5. Configure Group Mapping tab.

Group mapping only applies to the LDAP users that have not been imported to the Sangfor device. The users in specified OU on the LDAP server will be mapped to a local group after successful login, and therefore have the same privilege as the users that they are mapped to.

The following are contents included on the Group Mapping tab:

Add: To add a group mapping rule to map specified LDAP users to the local group, click it to enter the Add Group Mapping Rule page, as shown in the figure below:

OU: Configures the OU that will be mapped to a local group, in format of DN.

Map to Group: Configures the local group to which users of the specified OU will be mapped.

Sub-OU included: If this option is selected, users in the sub-OU will also be included and mapped to the local group. If not selected, only the users in the

185

SANGFOR SSL M7.5 User Manual specified OU level will be mapped to the local group.

If LDAP user matches none of the above mapping rules, map the user to group: For the users that match none of the group mapping rules, select this option and specify a local group, so that those LDAP users will be mapped to that group automatically.

Delete: To delete a group mapping rule, select the rule and click Delete.

Edit: To edit a group mapping rule, select the rule and click Edit.

Automatic Mapping: This feature simplifies the process of adding a batch of mapping rules. Administrator needs only to select the LDAP user and/or group on the Auto

Create Group Mapping Rule – Step 1: Select OU page (as shown in the figure below) and configure Map to Group field, without adding mapping rule one by one, and the involved mappings will be added to the group mapping rule list automatically. To configure automatic mapping, please perform the following steps: a. Click Automatic Mapping to enter the Auto Create Group Mapping Rule –

Step 1: Select OU page, as shown below: b. Select a mapping method, Mapping for each selected OU or Mapping for

selected top-level OU, and then select the organizational units (OU).

If the selected method is Mapping for each selected OU, every selected LDAP user group will be mapped to the respective local group (name of target group is the same as the OU name) specified in Map to Group field, organizational units

(OU) not being changed.

If the selected method is Mapping for selected top-level OU, only one group will be created on the Sangfor device, name of the target group being the same as the top-OU name. All the users under the top-OU and/or the sub-OUs will be mapped to that group.

c. Configure Map to Group. The specified group is a local user group to which the

186

SANGFOR SSL M7.5 User Manual specified LDAP users will be mapped.

d. Click the Next button and the automatically added mapping rules are as shown below: e. Click the Finish and Save buttons and go back to Local Users page. Check whether the groups created through automatic mapping are in user group list, as shown below:

6. Configure Role Mapping tab (if you are adding an MS Active Directory server).

Role Mapping helps map the security groups from the MS Active Directory server to the roles on this Sangfor device. Once a user matches certain role mapping rule and is mapped to the role on the Sangfor device, the associated user will be permitted to access the resources that are associated with that role. The Role Mapping tab is as shown in the figure below:

The following are the contents included on the Role Mapping tab:

187

SANGFOR SSL M7.5 User Manual

Add: Click it to add a role mapping rule, mapping the security groups on MS Active

Directory server to the local groups. To configure role mapping, please perform the following steps: a. Select Enabled to enable role mapping feature.

b. Click Add to enter the Add Role Mapping Rule page, and configure the Security

Group and Map to Role fields, as shown below:

Delete: To delete a role mapping rule, select the rule and click Delete.

Edit: To edit a role mapping rule, select the rule and click Edit.

Automatic Mapping: Click it and some role mapping rules will be generated automatically according to the security groups on the MS Active Directory server. To configure automatic mapping, please perform the following steps: a. Click Automatic Mapping and the following page pops up, as shown below: b. Select the desired role mapping rules and click the OK and Save buttons. The two selected roles are then added to Role Management page, as shown below:

7. Configure LDAP Extensions.

LDAP Extensions are extended attributes of the users on LDAP server. This feature enables some resources and virtual IP addresses of the users to be stored and maintained on the

LDAP server.

188

SANGFOR SSL M7.5 User Manual

The following are the contents included on the LDAP Extensions tab:

Attribute names of associated resources: These are resource attributes according to which the LDAP users will be assigned some resources, after these LDAP users are authenticated successfully.

To add a new attribute name of resource, click the Add icon

Name of the associated resource.

. Then enter Attribute

Inherit resources of all its parent groups: Besides the resources with the specified attributes, all other resources (available to users in the specified OU and parent OUs of certain LDAP user) with the configured attributes will be displayed on Resource page and seen by the LDAP user once he or she logs in to the SSL VPN.

Attribute name of virtual IP: Select this option and configure the attribute name of the virtual IP address of the users stored on the LDAP server. When an LDAP user logs in to the SSL VPN, the LDAP server returns the virtual IP address of this user to the

Sangfor device.

The option Attribute names of associated resources only applies to the LDAP users who do not have a corresponding account on the Sangfor device. For the LDAP users that already exist on the User Management page (under SSL VPN > Users), this option is invalid.

8. Configure Password Encryption tab.

This feature enables user password to be encrypted before it is forwarded to LDAP server.

189

SANGFOR SSL M7.5 User Manual

The following contents are included on above page:

Enabled: Select it to enable password encryption feature.

Encryption Protocol: Specifies encryption protocol. Options are MD5 and SHA1.

Size: Specifies the size of encryption key. It can be 32-bit or 16-bit.

Character Case: Specifies character case of password.

9. Click the Save button and then the Apply button to save and apply the settings.

RADIUS Authentication

Sangfor device supports third-party RADIUS server to verify the users connecting the SSL VPN.

Configuring RADIUS Server

1. Navigate to SSL VPN > Authentication to enter Authentication Options page. Click the

Settings button following RADIUS and RADIUS Server page appears, as shown below:

2. Click Add to enter the Add/Edit RADIUS Server page, as shown below:

190

SANGFOR SSL M7.5 User Manual

3. Configure the Basic Attributes of the RADIUS server. The following are basic attributes:

Server Name, Description: Configures name and description of the RADIUS server.

Server Address: Configures the usable IP address and port of the RADIUS server. You can add multiple IP addresses and ports. Generally, only the first IP address/port is active and others are standby. If the first IP address/port is unavailable, the second IP address/port will take the place; if the second IP address/port is unavailable, the third IP address/port will take the place, and so on; if none of the configured server IP address/port is available, the server will be disconnected.

To add a server address/port, click the Add icon next to Server Address field. The

Add Server Address page is as shown in the figure below:

To remove an entry, click the entry and click Delete icon

To edit an entry, click the entry and click Edit icon next to Server Address.

next to Server Address.

191

SANGFOR SSL M7.5 User Manual

To adjust order of an entry, click the entry and click Move Up icon icon .

or Move Down

Authentication Protocol: Options are PAP, CHAP, Microsoft CHAP, Microsoft

CHAP2 and EAP-MD5. Select the protocol as needed.

Shared Secret: Configures the shared key used for RADIUS authentication.

Character Set: Configures the character set used for RADIUS authentication.

Authentication Timeout: Configures the time period that user authentication times out if RADIUS server gives no response.

Status: Indicates whether the external RADIUS server is enabled.

4. Configure RADIUS Extensions, as shown below:

Mobile number ID: Configures attribute ID and sub-attribute ID of the RADIUS user mobile number attribute. Once a RADIUS user logs in to the SSL VPN, the RADIUS server will return the attribute value to the Sangfor device.

Virtual IP address ID: Configures the attribute ID and sub-attribute ID of RADIUS user’s virtual IP address. When a RADIUS user logs in to the SSL VPN, the RADIUS server will return the attribute value to the Sangfor device.

 Mobile number ID only works in association with SMS authentication.

5. Configure Group Mapping rule.

The users with specified class attribute will be mapped to the corresponding group on the

Sangfor device after successful login, and therefore have the same privilege as the users under the group to which they are mapped.

192

SANGFOR SSL M7.5 User Manual

The following are the contents:

Add: Click it to enter the Add Group Mapping Rule page and configure the two fields

Class and Map to Group. The specified class attribute value on the RADIUS server will be mapped to the specified local group, as shown in the figure below:

Delete: To delete a group mapping rule, select that rule and then click Delete.

Edit: To edit a group mapping rule, select that rule and then click Edit.

 If RADIUS user matches none of the above mapping rules, map the user to group:

For the users that match none of the group mapping rules, select this option and specify the local group to which the RADIUS users will be mapped automatically.

6. Click the Save button and then the Apply button to save and apply the settings.

Certificate/USB Key Based Authentication

Sangfor device not only supports built-in CA, but also supports external CA or more than one external CA, and can offer some certificate information. If Sangfor device is deployed in HQ, branch users can use certificate issued by different third-party CA for authentication when logging into SSL VPN. It increases flexibility of SSL VPN deployment. Certificates could be generated and configured through the Certificate/USB Key Based Authentication page.

Navigate to SSL VPN > Authentication to enter the Authentication Options page.

193

SANGFOR SSL M7.5 User Manual

To download and install USB key driver manually, click USB Key Driver.

To download and install USB key tool manually, click USB Key Tool.

Click the Settings button following Certificate/USB Key and the Certificate/USB Key Based

Authentication page appears, as shown in the figure below:

Configuring Local CA

The following contents are under Local CA section:

View: Click it to view root certificate of local CA, as shown below:

194

SANGFOR SSL M7.5 User Manual

Update: Click it to update root certificate, as shown in the figure below:

When RSA Encryption Standard is selected in Key Encryption field, key size can be 1024, 2048 or 4096, while SM2 Encryption Standard is selected, key size can be 256 only. Configure all the required fields above and then click Finish to save the setting, and then a root certificate will be created, and it will be also taken as device certificate.

195

SANGFOR SSL M7.5 User Manual

Country must be a two-letter abbreviation of country, for example, CN indicates China.

Email address should not contain any full-angle characters.

Issue Certificate: Click it to enter the Issue a Certificate page. The issued certificate can be used as user certificate or a server certificate.

To generate the certificate, configure all the fields and click OK to save the changes.

Configuring External CA

The following contents are under External CA section.

Add: Click it to to enter the Add External CA page, as shown below:

196

SANGFOR SSL M7.5 User Manual

Specify the CA name and select a root certificate from local PC. Click OK to save the changes. Then you will see the newly-imported external CA, as shown in the figure below:

A maximum of seven external CA is supported.

Click on the External CA in Name column. You will see the following page:

197

SANGFOR SSL M7.5 User Manual

The following information are included on above page:

Username Attr: Indicates the field used to store username in certificate issued by this

CA. The username will be displayed on the homepage of client. Options are CN, Email

Prefix and OID.

Binding Field: Indicates the certificate field binding to a user. It takes effect when current certificate is imported into Sangfor device.

License Key: If it is selected, CA will issue a new certificate when the certificate gets expired. As the license key of new certificate has changed, user needs to imports this new certificate on Local Users page.

CN: If it is selected, user does not need to import new certificate when user certificate is updated. Before selecting this option, user needs to make sure the DN of each certificate is different.

OID: It is similar with DN. Generally, user also needs to specify OID attribute for storing username.

CA Encoding: Indicates the encoding used by this certificate.

CA Options: It determines whether the users are trusted if they own certificate issued by the current external CA, that is to say, whether they are allowed to log in to the SSL VPN.

If Trust the users who have imported certificate issued by current is selected, only after the users certificates have been imported to the Sangfor device can they use their own certificates to log in to the SSL VPN.

If Trust all the users who own certificate issued by current CA is selected, all the users who own valid certificates issued the current external CA will be able to log in to the SSL

VPN with their own certificates.

Click on the link Configure Mapping Rule to enter the Configure Mapping Rule page, as shown in the figure below:

198

SANGFOR SSL M7.5 User Manual

Configure the Mapping Rule that can map the certificate users of certain certificate DN to a group on the Sangfor device, so that they will have the same privilege as others under the target group.

To delete a mapping rule, select the rule and click Delete.

To edit a mapping rule, select the rule and click Edit.

To add a new mapping rule, click Add and the Add External Certificate User Mapping

Rule page appears, as shown below:

Certificate DN: Configures DN of certificate, which can be referred to in certificate subject.

Map to Group: Configures the local group to which the certificate users will be mapped if their certificates have the configured DN.

 For user matching none of the above group mapping rules, map the user to group:

Configures the local group to which the certificate users will be mapped automatically if they match none of the mapping rules.

199

SANGFOR SSL M7.5 User Manual

Certificate Revocation List (CRL): Click the link Import File or Configure

Auto-Update Server to import certificate or enable auto-update, as shown below:

To have the CRL updated automatically and regularly, click the Auto Update Options link and configure the fields on the Auto Update Options page, as shown in the figure below:

Configure Online Certificate Status Protocol(OCSP). This part includes options related to

OCSP that supports online check of certificate validity, as shown in the figure below:

200

SANGFOR SSL M7.5 User Manual

The contents under Online Certificate Status Protocol(OCSP) are as follows:

Enable OCSP: Select this option and OCSP will be enabled and related options will appear.

Server Address, Server Port: Configure the address and port of OCSP server that provides OCSP service.

Authentication required: Select this option and the OCSP server will verify identity of the Sangfor device.

Test Connectivity: Click it to check whether the Sangfor device can connect to the

OCSP server.

Configuring USB Key Model

Under Supported USB Key Model, configure the model of third-party USB keys that can be identified by the Sangfor device while USB key of this model is plugged in to the end user’s PC.

Unplugging key will lead to automatic logout.

The contents under this part are as shown below:

To add a new USB key model, click Add to enter Add USB Key page, as shown below:

201

SANGFOR SSL M7.5 User Manual

The following are the contents included on Add USB Key page:

Name: Specifies name of this USB key model.

Model: Specifies the model of USB key that supports automatic logout while end user unplugs the USB key.

DLL File Path: Specifies the path of DLL file that is used to provide interface for SM2 encryption function. It is required when adding third-party USB key supporting SM2 encryption algorithm.

Status: Configures whether this model of USB key is enabled or not, that is, whether to enable the feature of automatic logout while end user unplugs the USB key of this model.

To remove an entry from the list, select the entry and click Delete.

To edit an entry, select the entry and click Edit.

Client-Side Domain SSO

Client-side domain SSO can achieve that when users logs in using VPN client, user does not need to type username and password and domain SSO will be performed automatically after client-side

PC is joined AD domain. This feature is not applicable to user logging using Portal.

1. Navigate to SSL VPN > Authentication to enter Authentication Options page. Click the

Settings button following Client-Side Domain SSO and Client-Side Domain SSO page appears, as shown below:

202

SANGFOR SSL M7.5 User Manual

2. Configure Basic Attributes on above page:

Enabled: Click it to enable client-side domain SSO feature.

Status: Indicates whether this feature takes effect.

Device Name: Indicates name of Sangfor device.

Domain Name:Specifies the domain name of domain server

Short Domain Name: Specifies the abbreviation of the domain name

Domain Controller Name: Specifies the name of domain controller in Window domain.

Domain Controller IP: Specifies the IP address of the domain controller in Window domain.

Admin Username, Admin Password: Specifies the administrator username and password used to log in to Window domain.

203

SANGFOR SSL M7.5 User Manual

Secondary Authentication Methods

There are three secondary authentication methods, namely, SMS authentication, Dynamic Token based authentication and Hardware ID based authentication.

SMS Authentication

SMS authentication is a type of authentication method that requires connecting user to enter the received SMS password when he/she is logging in to and has passed the primary authentication(s).

The SMS password is a password dynamically generated and sent to the mobile phone of connecting user. Only after user enters and submits the SMS password can he/she access SSL

VPN and the internal resources.

Navigate to SSL VPN > Authentication to enter the Authentication Options page. Click the

Settings button following SMS and the SMS Authentication page appears, as shown below:

In case that the SMS license is invalid or has not been activated, tips show up under the subtitle

SMS Message, saying “SMS authentication license key is invalid. Please click here to activate the license”. To modify or activate the SMS license, click the click here link to enter Licensing page.

As shown on the above page, there are three sections related to SMS authentication, namely, SMS

Message, Message Delivery Module and Message Delivery Parameters.

The following are the contents on SMS Authentication page:

Authentication: Indicates whether SMS authentication is enabled or not. Options are

204

SANGFOR SSL M7.5 User Manual

Enabled and Disabled.

Set Phone Number: If the option User can set phone number on login is selected, user can specify mobile phone number on login page. When adding user, administrator does not need to specify mobile phone number if SMS password is selected as secondary authentication.

Then, user could specify mobile phone number to receive OTP. After successful authentication, the mobile phone number will be bound with the user account.

Reset password through SMS: To enable users to reset password through SMS, select the option Resetting password through SMS is allowed.

Delivery Interval: Specifies the interval for resending a SMS message.

Pwd Validity Period: Configures the validity period of the SMS password. If user fails to enter and submit the SMS password within the time since the SMS password is sent, the

SMS password will get invalid. Login with invalid SMS password will lead to login failure.

The validity period should be between 1 and 1440 minutes.

Message Text: Customizes the text of the SMS message that is to be sent to the end user.

Restore Default: Click this link and the system default text will replace the current message text.

Message Delivery Mode: There are two types of modules, built-in SMS module and SMS module installed on external server. Select either option and configure the other required fields.

Gateway Type: Specifies the ways of delivering SMS messages.There are seven types of gateway, GSM modem, SANGFOR CDMA modem, CNMA modem, China Mobile V2,

China Mobile V3, China Unicom, China Telecom V3, HTTP, Jasson MAS(WebService port).

You can use GSM modem (connected to the server’s COM port) or using gateway (such as

China Mobile V2/V3, China Unicom and China Telecom V3, gateways usually used by enterprises) to send SMS messages.

SMS Center: Indicates the SMSC number of corresponding ISP.

COM Port: Indicates the COM port used to connect to SMS modem. Options are COM1 and COM2.

205

SANGFOR SSL M7.5 User Manual

 Baud Rate: Specifies the baud rate of the specified COM port of Sangfor device. Default is

9600.

Send Test SMS Message: Click this link to check whether SMS message can be sent to end user successfully through the configured GSM modem or gateway. A Send Text Message

to… page will pop up asking for mobile number, as shown in the figure below:

Using Built-in SMS Module to Send SMS Message

The so-called built-in SMS module indicates the module built in the Sangfor device.

To use GSM modem as the way to deliver SMS message, prepare a GSM modem and an IC telephone card, and then perform the steps below:

1. Insert the SIM card of a cellular phone into the GSM modem.

2. Use the serial cable (one end is male connector and the other end is female connector; attachment of Sangfor device when product is delivered) to connect the GSM modem to the

CONSOLE interface on the rear panel of the Sangfor device. Please screw the plug/jack in until they are tightly attached.

3. On the SMS Authentication page, select gateway type GSM modem.

4. Enter the SMSC number of the local ISP into the SMS Center field. For example, if you are in Shenzhen, enter the number 8613800755500.

5. Select COM0 as the COM Port.

6. Configure Baud Rate (of the serial port) for communication between the Sangfor device and the GSM modem. It is 9600 by default. Change this value to keep it relevant to the GSM modem being used.

7. Click the Save button to save the settings. The configured fields are as shown below:

206

SANGFOR SSL M7.5 User Manual

8. Go to SSL VPN > Users > local Users page to add or edit user. Configure the mobile number, select user type Private user, and select secondary authentication SMS password, as shown in the figure below:

9. End user logs in to the SSL VPN. After passing the primary authentication, user will be asked for SMS password, as shown in the figure below:

10. Enter the received SMS password, and click the Submit button. If user fails to receive the text message for a long time, he/she can click get again to get a new SMS password.

207

SANGFOR SSL M7.5 User Manual

Using External SMS Module to Send SMS Message

This type of module is installed on an external server, through which the SMS messages are sent.

To use GSM modem as the way to deliver SMS message, prepare a GSM modem and a computer

(SMS server) that has COM port and has installed the SMS software provided by SANGFOR.

What should be noted is that they may not work if the facilities are placed in a machine room where electromagnetic shielding measures may be taken.

Network deployment is as shown in the figure below:

1. Insert the SIM card of a cellular phone into the GSM modem.

2. Use the serial cable (one end is male connector and the other end is female connector; attachment of Sangfor device when product is delivered) to connect the GSM modem to the

COM port of SMS server. Please screw the plug/jack in until they are tightly attached.

3. On the SMS server, install the SMS software package provided by SANGFOR.

Once installed, the software will run automatically as a system service. The process

SMSSP.exe can be checked through Windows Task Manager.

For the running status of SMS service, see the SMS service icon on the task bar, as shown in the two figures below. The figure on the left shows normal running status, while the figure on the right shows service error.

If the software is installed on other drive rather than system drive C, the service might still refuse to work. In that case, uninstall the SMS software and reinstall it on the default drive.

4. Go to Start > SmsService to open the console or right-click the icon and select Config, and configure SMS service software.

208

SANGFOR SSL M7.5 User Manual

What needs to be configured for the SMS service is the listening port (TCP port). Make sure the configured listening port is not providing other services. To check if port conflict exists, use the command netstat –na to check all other listening ports used by this server.

If the SMS server has installed firewall software, make sure that the firewall allows data transmission on the listening port.

5. Log in to the administrator console of the Sangfor device and navigate to SSL VPN >

Authentication > SMS Authentication to configure SMS authentication.

SMS Center IP: Enter the IP address of the SMS server into the field. Make sure the

Sangfor device and SMS server can communicate with each other, that is, the Sangfor device is connected to the SMS server.

SMS Center Port: Enter the listening port that has been configured for the SMS software.

Gateway Type: Select the option GSM modem.

SMS Center: Enter the SMSC number of the SIM card that has been inserted into the

GSM modem. If the SMSC number of the SIM card is unknown, ask your ISP for that.

COM Port: Select the port being used to provide SMS service. If there is only one COM port, choose COM0; if there are two COM ports and the SMS modem is connecting to the second COM port, choose COM1.

Baud Rate: Select the default value 9600. The configured fields are as shown below:

209

SANGFOR SSL M7.5 User Manual

6. Add or edit user. Configure the mobile number, select user type Private user, and select secondary authentication SMS password, as shown in the figure below:

7. End user logs in to the SSL VPN. After passing the primary authentication, user will be asked to enter the received SMS password, as shown in the figure below:

8. Enter the received SMS password, and click the Submit button. If user fails to receive the

210

SANGFOR SSL M7.5 User Manual text message for a long time, he/she can click get again to get a new SMS password.

Using SMS Gateway of ISP to Send SMS Message

If the enterprise network is already deployed with SMS gateway of ISP, such as China Mobile,

China Unicom, no other facility is needed except the Sangfor device. Configure the following:

Gateway Type: Select a gateway type that is available to the enterprise network.

SMS Center IP: If the message delivery module is installed on an external server, enter the

IP address of the server on which the SMS module is installed.

SMS Center Port: Enter the port number being used to listen to SMS service.

Message Delivery Parameters: Configure the required fields according to the information provided by the corresponding ISP.

Using Webservice Based SMS Platform to Send SMS Message

Sangfor device can communicate with Webservice-based SMS platform for sending SMS message to end users, enhancing the stability. Navigate to SSL VPN > Authentication > SMS

Authentication page and select HTTP as Gateway Type. Configure the required fields, URL of webservice-based SMS platform, SOAP version, request mode and URL template.

Click the link Configure URL Template to enter the Configure URL Template page, as shown below:

211

SANGFOR SSL M7.5 User Manual

Configure the fields on above page and click OK to save the changes.

Using Jasson MAS to Send SMS Message

Sangfor device can use Jasson MAS for sending SMS message so as to enhance stability.

212

SANGFOR SSL M7.5 User Manual

Configure the following contents included on above page:

URL: Enter the URL of Jasson MAS.

Database Server IP: Enter the IP address of database server on Jasson MAS.

Port: Enter the database port according to your case. Default value is 3306.

Database Name: Enter the name of database server on Jasson MAS. You need to confirm with the network administrator that the database name you entered is correct.

Database Admin, Password: Enter the username and password of internal database on MAS.

If you do not know the username or password, contact with the network administrator.

Web Interface: Enter the interface of Jasson MAS used to send SMS message.

Login Name, Password: Specifies username and password to log in Jasson MAS.

Hardware ID Based Authentication

Hardware ID is a unique serial number generated using the extracted features of hardware components in a computer, according to certain algorithm. The uniqueness of computer components makes the generated hardware ID unique.

Navigate to SSL VPN > Authentication to enter the Authentication Options page. Click the

Settings button following Hardware ID and the Hardware ID Based Authentication page appears, as shown in the figure below:

The following are the contents included on Hardware ID Based Authentication page:

Collect hardware ID only: If this option is selected, hardware IDs of endpoint computers will be collected, but hardware ID based authentication will not be enabled.

Enable hardware ID based authentication: If this option is selected, hardware ID of endpoint computers will be collected and hardware ID based authentication enabled.

Message on Collecting: This will turn out to be a prompt seen by end users when they go through hardware ID based authentication.

213

SANGFOR SSL M7.5 User Manual

Auto approve any hardware ID: Indicates that any hardware ID submitted by end user will be approved, and administrator need not approve them manually.

Allow login on approved endpoint, with any account: Indicates that hardware IDs submitted by any user from certain endpoint(s) will be approved automatically if administrator has ever approved the hardware ID of the endpoint(s).

Save: Click this button to save the settings when configuration is completed.

Dynamic Token Based Authentication

Dynamic token based authentication is an extension of RADIUS authentication, using a RADIUS server to distribute passcode to connecting user when they go through dynamic token based authentication. Dynamic token based authentication is a secondary authentication and can add security to SSL VPN access.

Navigate to SSL VPN > Authentication to enter the Authentication Options page. Click the

Settings button following Dynamic Token and the following prompt appears:

To go to RADIUS Server page to configure RADIUS server, click the Yes button. For procedures of configuring RADIUS server, please refer to the RADIUS Authentication section in Chapter 4.

Other Authentication Options

This section includes configurations of Priority of LDAP/RADIUS Servers, Password Security

Options related to password and brute-force login prevention, and Anonymous Login related settings.

Priority of LDAP and RADIUS Servers

If there are more than one LDAP servers or RADIUS servers available for user authentication, it becomes necessary to consider choosing an LDAP or RADIUS server as the first server from which the matching account will be searched for when user is connecting to SSL VPN and going through LDAP/RADIUS authentication.

214

SANGFOR SSL M7.5 User Manual

Administrator can adjust the order (priority) of the available external LDAP/RADIUS servers on the Sort External Authentication Servers page .

Navigate to SSL VPN > Authentication to enter the Authentication Options page. Click the

Settings button following Priority of LDAP/RADIUS Servers and the Sort External

Authentication Servers page appears, as shown in the figure below:

Since the order indicates priority, the external authentication server sitting at the top of the list has the highest priority. User will go through this server first to find the matching account while connecting to SSL VPN.

If the connecting user is not found on the first external authentication server, the matching process will not stop. User will then go through the second (or third, or fourth) external authentication server until the right user account is matched. If no account is matched eventually, user authentication will fail.

To adjust order of an external authentication server, select the server and click Move to Top,

Move Up, Move Down or Move to Bottom.

When configuration is completed, click the Save button to save the changes.

Password Security Options

Password security options are settings related to login when user submits username and password to access the SSL VPN, including two parts, Logon Security Options and Brute-force Login

Prevention.

Navigate to SSL VPN > Authentication to enter the Authentication Options page. Click the

Settings button following Password Security Options and the Password Security Options page appears, as shown in the figure below:

215

SANGFOR SSL M7.5 User Manual

The following are the contents included on the Password Security Options page:

Enable on-screen keyboard: On-screen keyboard is a virtual keyboard available on the login page to the SSL VPN and can prevent input disclosure, adding security to SSL VPN access. The other two options Random letter key layout and Random number key layout can have the letter keys and number keys on the virtual keyboard change positions randomly every time user uses this keyboard.

When user logs in to the SSL VPN and wants to call the on-screen keyboard, he or she needs only to click the keyboard icon next to the Password field on the login page, as shown in the figure below:

Brute-force Login Prevention: This security feature enables the system to take actions to stop brute-force login attempt. If user fails to log in many times, the login IP address or the user account would be locked up or word verification be enabled for a period of time. The prompt given is as shown below:

216

SANGFOR SSL M7.5 User Manual

Word Verification: It is also a feature that adds security to SSL VPN access. If this option

If consecutive logon failures reach N, activate word verification” is selected, 0 means word verification will be enabled forcibly; for non-Windows client-side, if the input value is less than 3, it will still be taken as 3. Once word verification is activated, end user will be required to enter the word he or she sees on the picture when visiting the login page and logging in to the SSL VPN, as shown below:

Anonymous Login

Anonymous login is a kind of login method that does not require connecting user to enter username and password, user accessing SSL VPN anonymously under the anonymous login user account and being able to access the resources that are associated with Anonymous group.

Navigate to SSL VPN > Authentication to enter the Authentication Options page. Click the

Configure button following Anonymous Login and the Anonymous Login Options page appears, as shown in the figure below:

217

SANGFOR SSL M7.5 User Manual

The following are the contents included on the Anonymous Login Options page:

Enabled, Disabled: If Disabled is selected, no user could log in to the SSL VPN anonymously. If Enabled is selected, anonymous login is enabled, and end users can access the SSL VPN anonymously, simply by clicking the Anonymous button on the login page, as shown below:

All users access SSL VPN anonymously: If this option is selected, all users can access SSL

VPN anonymously (enter the Resource page, or the redirected-to page if this feature is enabled in the associated policy set), without submitting any credential through login page.

Edit Anonymous Group: Click this button to configure the attributes of Anonymous group.

For detailed guide, please refer to the Adding/Editing Resource Group section in Chapter 4.

The attributes of Anonymous group are as shown in the figure below:

Assigned Roles: Click this button to select and assign roles to the anonymous users. For detailed guide, please refer to the Adding Role section in Chapter 4.

Save: Click it to save the settings. To apply changes, click the Apply button on the next page.

218

SANGFOR SSL M7.5 User Manual

Policy Sets

A policy set is a collection of policies controlling end user’s access to SSL VPN, rights at client end, and access rights on Security Desktop, including settings of Client, Account Options,

Remote Application and Cloud Storage.

Navigate to SSL VPN > Policy Sets to enter the Policy Sets page, as shown below:

On the page displayed above, Name indicates the name of a policy set, Description indicates the descriptive information of a policy set and Applied to User/Group indicates the users/groups to which the corresponding policy set applies.

The following are some optional operations on the Policy Set Management page:

 To create a new policy set, click Add > Policy set.

 To create a policy set based on an existing policy set, select a policy set as template and click

Add > By using template.

 To delete one or more policy sets, select the policy sets and then click Delete.

 To edit a policy set, select the policy set and then click Edit.

 To select policy sets on all pages, click Select > All pages.

 To select policy sets on the current page, click Select > Current pages.

 To deselect entries, click Select > Deselect.

 To search for a specific policy set, select Search by Name, Search by Description or

Search by User/Group, enter the keyword and click the magnifier icon next to the textbox.

219

SANGFOR SSL M7.5 User Manual

Adding Policy Set

1. Navigate to SSL VPN > Policy Sets and click Add > Policy set to enter the Add Policy Set page, as shown below:

2. Specify the name and descriptive information for the policy set.

3. Configure the following client-related options on the Client tab:

Privacy Protection: Specifies the contents to be automatically deleted at user’s logout to protect user’s privacy. Select Temporary Internet files, Cookies, Browsing history and/or Form data.

Temporary Internet files: Indicates the copies of webpages, images and media that are saved for faster viewing.

Cookies: Indicates the files stored on users’ computer by websites to save preferences.

Browsing history: Indicates the links to the pages that users have visited.

Form data: Indicates the saved information that users have typed into forms.

Bandwidth/Sessions Restrictions: Specify limits on TCP app sessions and bandwidth for client, and select whether to preferentially enable byte cache.

Enable TCP app sessions limit: Check it to enable limit on TCP app sessions at client and then specify the maximum number of TCP application sessions allowed.

The value range is 1 to 500. Unchecking it means no limit on TCP app sessions.

Enable bandwidth limit: Check it to enable limit on bandwidth for using Web applications, TCP applications and L3VPN at client and then specify maximum

220

SANGFOR SSL M7.5 User Manual outbound and inbound bandwidth (KBps) allowed at client. The minimum value for this field is 32 KBps and 0 means no limit. This function avoids the situation that some users preempt most of the HQ bandwidth with insufficient bandwidth left for others. Unchecking it means no limit on bandwidth used at client end.

Preferred to enable byte cache: Check it to have the corresponding user preferentially enjoy the speedup of file access or downloading when the number of concurrent users reaches the maximum. Unchecking it means the corresponding user has no privileges to preferentially enjoy optimization.

To make the Preferred to enable byte cache option available here, select the

Enable Byte Cache option (in System > SSL VPN Options > Network

Optimization > Data Transfer > Byte Cache Options. Please refer to the

Network Optimization Related Settings section in Chapter 3 ).

Permit PPTP/L2TP incoming connection: Select whether to allow mobile users to log in through PPTP/L2TP.

Enable Dedicated SSL VPN Tunnel: If this option is checked, users can only access the internal resources over SSL VPN. Unchecking it means users can access internal resources as well as the Internet after connecting to the SSL VPN. This feature is only applicable to the Windows or Android based client end.

Each user may own multiple hardware IDs, maximum: Specify the maximum of hardware IDs that each use account can bind to. The value range is 1 to 100.

After configuring policy set completes, you need to associate it with user or user group when adding or editing user/group; otherwise, it will not work .

4. Click Account Options tab to enter the Account Options page and specify the account-related options, as shown below:

221

SANGFOR SSL M7.5 User Manual

The following are the contents included on the Account Options tab:

Account Options: Configure whether to log users’ access, enable system tray and specify redirected-to resource, and specify valid period only during which user is allowed to login, maximum number of days required for a user account to be disabled due to not being used, and user idle timeout after login.

Log access events: Check it to log all the user’s access events over SSL VPN.

Enable system tray: Check it to enable system tray for the user associated with this policy set (please refer to the Configuring Client Related Options section in

Chapter 3).

The Enable system tray option under System > SSL VPN Options > General >

Client Options is a global option for all users. If it is checked, the Enable system

tray option here is selected by default.

On user’s logon, redirect to resource: Specify the resource to which the page will be redirected after user logs in to SSL VPN. Select this option and click the textbox to enter the Resources page, as shown below, and then select the resource (the resources available here are predefined in SSL VPN > Resources. Please refer to the Resource section in Chapter 4).

222

SANGFOR SSL M7.5 User Manual

User can only log in during the schedule: Specify the period of time only during which the user is allowed to access SSL VPN. Select a schedule from the drop-down list (the schedules available here are predefined in System > Schedule; please refer to the Schedules section in Chapter 3).

Account becomes invalid if user has not logged in for N days: Specify the number of days required for a user account to be disabled due to not being used.

Connection Timeout: Specifies the period of time to disconnect user due to inactivity for two logout scenarios.

Allow Private User to Modify Account: Select Password, Description and/or Mobile

Number if you allow private user to modify the password, description and mobile phone number.

If a private user is allowed to modify the password, description and mobile number, the user can click Settings (at upper right of the page) to modify its password, description and mobile number after logging in to SSL VPN.

To allow a user to modify mobile number, enable SMS authentication for the user while adding or editing the user.

223

SANGFOR SSL M7.5 User Manual

5. Click Remote Application tab to enter the Remote Application page and configure the related options.

The following are the contents included on the Remote Application tab:

Logon to Remote Server: Specifies what user account and privilege type is used by user to log into remote server.

User Account: Specifies what account can be used by mobile user to log in to remote server, as shown below:

Type: It appears when Create Windows account as per SSL VPN account is selected as User Account. It indicates the type of the created Windows account.

Deletion: If this option is selected, related account and data created on remote server will be removed together when user is removed from local device.

Allow Use of Local Devices/Resources in Session: Select the device and/or resource you wan to use in session, as shown below:

Drives: If it is selected, VPN users can save file onto local drives when accessing

224

SANGFOR SSL M7.5 User Manual remote application resource.

Clipboard: Select it to enable user to duplicate data from client end to remote server .

Printer: If this option is selected, user can use the printer at client end to print the document in remote application after printer driver is installed on remote server.

Virtual Printer: If it is selected, user can choose Sangfor virtual printer at remote server side to print file without need to install driver of local printer on remote server.

Permitted Direction of Data Flow: It is available only when Clipboard option is selected.

Permitted Virtual Printer Software: It is configurable only when Virtual Printer option is selected. There are three types of virtual printer software, Sangfor PDF Reader,

Foxit PDF Reader and Adobe PDF Reader.

Sangfor PDF Reader is selected by default, which provides a better printing effect and supports more file types. If Sangfor PDF reader does not work, use Foxit or Adobe PDF reader instead. If you want to use Adobe

PDF reader, it is recommended to use Adobe 9.4.

Paper Options: Click it to configure paper-related options, as shown below:

Click Add to enter the Add Paper page, specify the paper size and margin and click

OK to save the changes, as shown below:

225

SANGFOR SSL M7.5 User Manual

Application Access Privileges: Specifies accessible subnet/domain for specific user, so as to achieve control over privilege of access to remote applications.

All subnets: Indicates user can access all subnets.

Specified subnet/domain: Specifies accessible subnet/domain for user. Click

Setting to enter the Permitted IP Addresses page, click Add to add a entry, as shown in the figure below:

Advanced Privilege: Click to configure application-related advance options, as shown below:

226

SANGFOR SSL M7.5 User Manual

6. Click Cloud Storage to enter the Cloud Storage tab, and specify related options, as shown in the below figure:

It specifies the storage privilege on remote server for users and server group used for

EasyFile cloud storage.

Storage Directory: Specifies the storage directory on remote server. Options are

Private Directory and Public Directory. Click following Private Directory or

Public Directory to select desired directory. If no remote storage server is configured, you need to add storage server on SSL VPN > Remote Servers > Storage Server page(for details, refer to Adding Remote Storage Server in Chapter 4).

If Private Directory is selected, click following it to enter the following page:

227

SANGFOR SSL M7.5 User Manual

If Public Directory is selected, click shown below: following it, and you will see the figure, as

EasyFile Cloud Storage: Specifies the remote server group on which corresponding application will be invoked to open the file when the file on cloud is opened on mobile device, such as mobile phone, tablet.

228

SANGFOR SSL M7.5 User Manual

7. Click EMM tab to enter the EMM tab. Enterprise mobility management(EMM) is to manage mobile devices that are connected to SSL VPN.

The following are contained on EMM tab:

Allow mobile device to register: Determines whether mobile device is allowed to register.

Android MDM Policy: Specifies MDM policy for Android devices.

iOS MDM Policy: Specifies MDM policy for iOS devices.

8. Click Save to save the settings or Cancel not to save the settings. To have settings take effect, click the Apply button at upper right of the next page.

229

SANGFOR SSL M7.5 User Manual

Remote Servers

Remote server falls into application server and storage servers. Remote application servers are servers providing remote applications to SSL VPN users. After connecting to SSL VPN, users can use the remote applications even though they have not installed the corresponding application programs on their local computers. Remote storage servers are servers where the data or files can be saved in the remote application session. Before adding remote server, you need to install

“Terminal Services” and “RemoteAppAgent” on remote server, and make sure these programs can work properly.

Navigate to SSL VPN > Remote Servers to enter the App Server page, as shown below:

The following are the contents included on the App Server page:

Name: Displays the name of a remote server.

Address: Displays the IP address of a remote server.

Port: Displays the communication port of a remote server.

Description: Displays the descriptive information of a remote server.

Type: Displays the type of a app server, Server or Server Group.

Status: Displays the status of a app server, Online or Offline.

Enabled: Displays whether the app server is enabled or not.

The following are some optional operations on the App Server page:

 To add a app server, click Add > App Server or Add > Storage Server.

 To delete one or more app servers, select the remote servers and then click Delete.

 To edit a app server, select the remote server entry and then click Edit.

 To select app servers on all pages, click Select > Server >All pages.

 To select app servers on the current page, click Select > Server > Current pages.

 To cancel the selection, click Select > Deselect.

 To move the selected app server to a specified server group, click Move to enter the Select

Server Group page, as shown below:

230

SANGFOR SSL M7.5 User Manual

 To add multiple programs for one or more app servers, select the app servers and click Add

Multiple Programs, and a dialog will appear, displaying the application programs available on existing remote servers. Please note that only the online app server can be associated with multiple programs.

 To allow delivered applications to invoke third-party programs, click Program White List and then specify third-party programs according to the specific case.

If Allow delivered application to user third-party programs below is selected, specify the allowed third-party programs in the textbox.

 To configure global settings for remote application servers, click Server Options.

231

SANGFOR SSL M7.5 User Manual

 To download RemoteApp Agent and save it to local PC, click Download RemoteApp

Agent.

 To update one or more app servers, select the app servers and then click Update.

 To view the status information of remote servers, click Status to enter Status > SSL VPN >

Remote Application page.

 To search for a specific app server, select Search by Name, Search by Description, Search

by IP or Search by Program, enter the corresponding keyword and then click the magnifier icon next to the textbox.

Adding Remote Application Server

1. Navigate to SSL VPN > Remote Servers to enter the App Server page.

2. Click Add > Server to enter the App Server page, as shown below:

232

SANGFOR SSL M7.5 User Manual

3. Configure Basic Attributes of the application server. The following are the basic attributes:

Server Name, Description: Enter a name and description for the remote application server.

Server Address: Enter the IP address of the remote application server that the Sangfor device will connect to.

Server Port: Specify the communication port of the remote server, through which the

Sangfor device will connect to. It is 7170 by default.

Admin Account: Enter the administrator name for logging into the remote application server.

Password: Enter the administrator password for logging into the remote application server.

Added To: Specifies a server group to which this app server is added.

Max Concurrent Sessions: Specify the maximum number of concurrent connections to the remote application server.

Status: Select whether to enable the current app server.

4. Select and add the application programs under Remote Application Programs.

 To select application programs already available on the server, click Select from Server to open the following page, as shown below:

233

SANGFOR SSL M7.5 User Manual

 If the desired program is not available on the server, click Add Manually under Remote

Application Programs to open the following dialog and then type the full path of the program, as shown below:

Click Submit to add the program, as shown below:

234

SANGFOR SSL M7.5 User Manual

To delete the programs, select the program(s) and click Delete.

To edit a program, select the program and click Edit.

To select the programs on the current page, click Select > Current pages.

To select the programs on all pages, click Select > All pages.

To cancel the selection, click Select > Deselect.

To associate selected application program with existing resource quickly, click the

Associated Resources and a dialog appears, which shows all the resources owing name with that application program.

5. Click Save and then Apply to save and apply the settings.

If you want to add server group, click Add > Server Group to enter the Add Server Group page, as shown below:

Enter the name and description for the server group and click OK to save the changes.

For how to deliver remote application, refer to Adding Remote Application in Chapter 7.

Adding Remote Storage Server

Remote storage server is used to save file modified in remote application. Private directory and public directory can be created on it.

1. Navigate to SSL VPN > Remote Servers > Storage Server page to enter the following page:

The contents included on above page are similar with those on App Server page. For related description, refer to Remote Servers section in this chapter.

235

2. Click Add to add a storage server, as shown below:

SANGFOR SSL M7.5 User Manual

3. Configure Basic Attributes of the storage server. The following are the basic attributes:

Server Name, Description: Enter a name and description for the remote storage server.

Server Address: Enter the IP address of the remote storage server that the Sangfor device will connect to.

Server Port: Specify the communication port of the remote storage server, through which the Sangfor device will connect to. Default port is 7170.

Admin Account: Enter the administrator name for logging into the remote storage server.

Password: Enter the administrator password for logging into the remote storage server.

Status: Select whether to enable the current remote storage server.

4. Under Directories, specify directory as private and/or public directory on the remote storage server.

236

SANGFOR SSL M7.5 User Manual

Private Directory: Each user owning private directory can see the private directory when he/ she logs in to SSL VPN. This user has full privilege of this directory, he/she can create sub-directory, add, or delete file/file folder.

Public Directory: All users can see public directory associated with them. They can read file under this directory. The administrator has administrative privilege to determine whether user can write the file under this directory. If user has the right to write the file, he/she can save the modified file to the public directory.

To specify private directory or public directory, click Add > Private directory or Public

directory to enter the Private Directories page or the Public Directories page, and then select a directory as the private or public directory.

When an end user accesses to the remote application, a personal folder will be automatically created in the specified directory which is configured in the associated policy set, as shown in the figure below.

The difference between private directory and public directory is that each folder in private

237

SANGFOR SSL M7.5 User Manual directory can only be read and written by one user (the owner); while the folders in public directory can be read by all connecting users (if Write, Upload or Download are not selected).

The directory configured here can be configured as a shared folder on remote server. You can configure folder permission on remote server, as shown below:

238

SANGFOR SSL M7.5 User Manual

5. Click Save and then Apply to save and apply the settings.

For how to apply remote storage server, refer to Cloud Storage section when Adding/Editing

Policy set in Chapter 4.

239

SANGFOR SSL M7.5 User Manual

EMM

Enterprise mobility management (EMM) enables users to deal with businesses on the go to with a smart device, and enables enterprise to manage the authorized use of smart devices.

MDM Policy

Navigate to SSL VPN > EMM > MDM Policy to enter MDM Policy page, as shown below. In

MDM Policy, you can specify MDM policy for Android devices and iOS devices.

To add MDM policy for Android devices and iOS devices, click Add and select the corresponding option.

Adding Android MDM Policy

In SSL VPN > EMM > MDM Policy, click Add and select Add Android MDM Policy, to configure the Restrictions, Password strength requirements and Inactivity Solutions for the connecting Android devices, as shown below:

240

SANGFOR SSL M7.5 User Manual

The following are the contents included in the Android MDM policy:

Name: Specifies name of the Android MDM policy.

Description: Specifies description for the policy.

Added to Policy Set: Specifies the policy set to which the Android MDM policy will be added.

Restrictions: Specifies restrictions for mobile devices.

The following contents are included on Restrictions tab:

Do something to rooted device: If mobile device is rooted, you can choose to lock it or erase application data.

App Program Whitelist/Blacklist: A blacklisted app program cannot be accessed by end users through smart phones, while whitelisted app program can be accessed.

Not allow use of blacklisted apps: This makes alert message be sent to the network administrator. If Blacklist is selected above, application programs in the list are blacklisted;If Whitelist is selected above, application programs outside the list are blacklisted.

Password: Specifies password strength requirements for mobile devices, as shown below:

241

SANGFOR SSL M7.5 User Manual

The following contents are included on Password tab:

Enable password strength requirements: Enable password strength requirements for mobile endpoints.

Simple password: Indicates that there is no requirements for password strength.

Complex password: Specifies complex password. You can specify password length, enable auto screen lock, require password change and specify password expiry date.

Enable login attempts restriction: If number of login attempts reaches the threshold, application data will be erased.

Inactivity Solution: Specifies the actions if system loses contact with the mobile device for specific days.

The following are contents on Inactivity Solution tab:

Lost contact for N days, notify network admin: Specifies threshold. If system loses contact with mobile device for specific days, notify network administrator.

Lost contact for N days, take the following action: Specifies threshold and action to the mobile device. You may lock the mobile device or erase application data if it loses

242

SANGFOR SSL M7.5 User Manual contact with system for specific days.

Adding iOS MDM Policy

In SSL VPN > EMM > MDM Policy, click Add and select Add iOS MDM Policy, to configure the Restrictions, Password strength requirements and Inactivity Solutions for the connecting iOS devices.

The following are contents included in iOS MDM policy:

Name: Specifies name of the iOS MDM policy

Description: Specifies description of the iOS MDM policy

Added To Policy Set: Specifies policy set that the iOS MDM policy will be added to.

Restrictions: Specifies restrictions for mobile devices.

The following contents are included on Restrictions tab:

Do something to jailbroken iOS device: When mobile iOS devices are jailbroken, you can choose to Lock device or Erase application data.

Not allow use of iCloud: Once enabled, mobile iOS devices cannot use iCloud.

App Program Options: There are two options: AppStore App Not Allowed and App

Program Whitelist/Blacklist. If Blacklist is selected, application programs in the list are blacklisted;If Whitelist is selected, application programs outside the list are blacklisted. Use of blacklisted application program will trigger alarm.

Password: Specifies password strength requirements for mobile iOS endpoints, as shown

243

SANGFOR SSL M7.5 User Manual below:

The following contents are included on Password tab:

Enable password strength requirements: Enable password strength requirements for mobile endpoints.

Simple password: Indicates that there is no requirements for password strength.

Complex password: Specifies complex password. You can specify password length, enable auto screen lock, require password change and specify password expiry date.

Enable login attempts restriction: If number of login attempts reaches the threshold, application data will be erased.

Inactivity Solution: Specifies the actions if system loses contact with the mobile device for specific days.

The following are contents on Inactivity Solution tab:

Lost contact for N days, notify network admin: Specifies threshold. If system loses contact with mobile device for specific days, notify network administrator.

Lost contact for N days, take the following action: Specifies threshold and action to the mobile device. You may lock the mobile device or erase application data if it loses contact with system for specific days.

244

SANGFOR SSL M7.5 User Manual

Mobile Devices

Mobile Devices: Displays relations among SSL VPN users, user groups and applications.

Navigate to SSL VPN > EMM > Mobile Devices to enter Mobile Devices page, as shown below:

On the Mobile Devices page, user (group) list is on the left panel, while Model, Operating

System, Added Since, and Status are on the right panel. To show subgroups and users under current suer group, click Unfold All. To show abnormal mobile devices, select Show abnormal devices only.

You can enter search term of the target user in the search bar on the right corner. Click magnifier icon to search. Then user groups that have been searched will be highlighted in the user(group) list.

To search specific entries, you may search by device name, model, associated user, OS,

IMEL/UDID.

The following are contents on right panel:

Device Name: Shows name of mobile devices.

Associated Users: Shows users associated with mobile devices.

Model: Shows model of mobile devices.

Operating System: Shows OS of mobile devices.

Added Since: Shows time when mobile device is registered.

Status: Shows status of devices, normal, erased, lost or it loses contact.

To deliver message to specific mobile device, select Device Name and click Deliver Msg. Then, the following Deliver Msg dialog pops up and you can type message contents in this dialog.

245

SANGFOR SSL M7.5 User Manual

To view message delivery history, click Message Delivery History, as shown below:

To lock screen, unlock screen, remove screen lock password, erase application data and remove device, click Operation and select the corresponding option, as shown below:

To mark mobile devices as lost or as found, click Mark and select the corresponding option .

To enable and configure mobile device management, click Settings, as shown below:

246

SANGFOR SSL M7.5 User Manual

The following are the contents included on the Settings page:

Mobile Device Management (MDM): Select this option to enable mobile device management.

VPN Address: Specifies IP address/domain name and port number for accessing the SSL

VPN device from public network. On that IP address, mobile device may register to access the SSL VPN, admin may manage and deliver message to the connecting mobile devices.

iOS MDM Certificate: To enable mobile device to register, you need to upload MDM certificate, or else iOS device fails to register. To apply for MDM certificate, please refer to the instruction in Application for IOS MDM Certificate.

1. Once VPN address is changed, mobile devices previously registered will be lost control and become unassociated.

2. Dst ports must be consistent. Arbitrary ports are not supported (441 port of firewall to non-441 port of SSL).

3. Firewall or routers can not contain ports already used by SSL VPN, for example, log in to console port 443, 80 and etc.

Published Apps

Published Apps: Manages published mobile Apps, and displays basic information of mobile

Apps.

247

SANGFOR SSL M7.5 User Manual

Navigate to SSL VPN > EMM > Published Apps to enter Published Apps page, as shown below:

App Name: Name of Apps

OS: Operating system applicable to mobile endpoints.

Version: Version information of Apps

Package Size: Size of Apps

Distribute App To: Users Apps distributed to

Downloads: Count downloads

Time Published: Time when Apps are published

Status: Status of Apps

Click Refresh to refresh information displayed on the page

Click Publish to publish wrapped Apps, as shown below:

App Name: Name of the App.

Package Size: Size of Apps

Version: Current version of Apps

248

Status: In my Apps and not in my Apps

Description: Description of Apps

Mobile Device: Smartphone or Tablet

SANGFOR SSL M7.5 User Manual

Select All users, all users are allowed to download this application.

Select Specified users, only selected users or user group can download, as shown below:

Click Delete to delete selected Apps.

249

SANGFOR SSL M7.5 User Manual

Click Edit to edit selected Apps.

Click Select to select information displayed on the page, as shown below:

Click Operation to list or remove Apps from my Apps, as shown below:

Click Settings to enable Web-based Apps and configure external access address for published

Apps, as shown below:

1. Please make sure the SSL certificate is trusted, to enable mobile apps to be installed.

SSL certificate comes with the SANGFOR SSL device is issued by SANGFOR. Users should

250

SANGFOR SSL M7.5 User Manual pay extra money to SSL certificate supplier to buy trusted SSL certificate.

2. External network address of Published Apps matches with the trusted SSL certificate domain name.

3. If SSL service of the device uses non-default port 443, then you should enter the same

SSL service port in external access address.

Search for Apps by name. Enter search term in Search and then click .

App Wrapping

App Wrapping: Wrap App to SSL VPN to realize secure access and visit.

Navigate to SSL VPN > EMM > App Wrapping to enter App Wrapping page, as shown below:

Click Delete to delete the selected application.

Click Edit to edit the selected application.

Auto Refresh: Configures refresh interval. Click Refresh to refresh the page, as shown below:

251

SANGFOR SSL M7.5 User Manual

Select Search by Name, Search by Type or Search by Status to search for applications.

Enter search term in Search and then click .

Click Settings to configure login page template and iOS certificate of App Wrapping, as shown below:

Click Delete to delete selected entry.

Click Edit to edit selected entry.

Click Add to add login page to VPN (Account or certificate based authentication). Upload iPhone, iPad, Android phone or Android Pad pictures, as shown below:

252

SANGFOR SSL M7.5 User Manual

IOS Certificate: App wrapping for an .ipa file requires uploading an iOS enterprise digital certificate, as shown below:

Upload iOS enterprise digital certificate, and then import iOS certificate, and wrap IPA application.

Android Keystore: Import Android Keystore to conduct APP wrapping for an .apk file, as shown below:

253

SANGFOR SSL M7.5 User Manual

Click Add to add wrapping, as shown below:

Click Browse... to find an apk or ipa file, and click Upload to upload corresponding applications.

254

SANGFOR SSL M7.5 User Manual

App Name: Name of the App

Authentication: Select Anonymous access, Public account, Account or certificate based

authentication.

Anonymous access: Wrapped App anonymously accesses VPN. The anonymous access function should be enabled on SSL VPN with no authentication page.

Public account: Public account and password are required. Wrapped app accesses SSL VPN with the public account with no authentication page.

Account or certificate based authentication: Private authentication. Account is required for wrapped App to access SSL VPN. Download wrapped APP from console and install it.

255

SANGFOR SSL M7.5 User Manual

Endpoint Security

Endpoint security is ensured by host check at endpoint, based on security policies. Only when user’s computer meets the requirements set by security policy can the user pass through pre-authentication or post-authentication check and connect to SSL VPN or access internal resources.

A security policy is a combination of predefined rules that fall into basic and combined rules and can further form a security rule. These rules are about operating system, file of anti-virus software, process, service pack installed, etc.

Pre-authentication check is carried out before user logs in to the SSL VPN. If user fails the pre-authentication check, which means, user fails to satisfy the requirements set by the associated security policy (user-level policy and/or role-level policy), he/she will be unable to access SSL

VPN or the role’s associated resource. Post-authentication check is carried out periodically, after user logs in to the SSL VPN or is accessing a resource. If user fails to satisfy the post-authentication check, which means, user fails to satisfy the requirements set by the associated security policy (user-level policy and/or role-level policy), the connection or session will be dropped. To conduct periodic check, administrator needs to set the interval (refer to the

Configuring Advanced Policy Settings section in Chapter 4).

Security Rules

Security rule defining on the Sangfor device falls into two phases, the first phase is to predefine the rules that cannot be referenced directly by any security policy and should be combined with other basic rules and/or combined rules to form a “real” rule (security rule). The second phase is to configure “real” rules. Only “real” rule can be referenced by security policy.

A basic rule is the smallest unit among the policy factors, while combined rule consists of one more basic rules. Basic rules and/or combine rules could be combined further to form “real” rule.

Navigate to SSL VPN > Endpoint Security > Rules to predefine security rules, as shown below:

256

SANGFOR SSL M7.5 User Manual

The following are the contents included on Rule Predefining page:

Name: Indicates name of the rule.

Type: Indicates type of the rule, basic rule or combined rule.

Inspected Object: Indicates the object that will be checked if the connecting user does not satisfy the object restriction. Authentication check will fail. The objects are operating system, file, process, registry, source IP, WAN interface IP, login time and endpoint feature.

Add: To add a new rule, click Add > Basic rule to configure a basic rule or Add >

Combined rule to combine basic rules in one combined rule.

Delete: Click it to delete the selected rule.

Edit: Click it to edit the selected rule.

Select: Click Select > Current page or All pages to choose the desired entries on this page or all pages; or click Select > Deselect to deselect entries.

View: Select a type of rules, All, Built-in rules or Custom rules, to display that type of rules only.

Predefining Basic Rule

1. Navigate to SSL VPN > Endpoint Security > Rules to enter the Rule Predefining page and click Add > Basic rule, as shown in the figure below:

257

SANGFOR SSL M7.5 User Manual

2. Configure the following fields on the above page.

Rule Name: Configures the name of the basic rule. The rule name will be seen in a prompt when user fails to pass the authentication check.

Description: Configures the description of the basic rule. The description will be seen in a prompt when user fails to pass the authentication check.

Inspected Object: Configures the item that will be checked on user’s computer and connecting user. Options are Operating system, File, Process, Registry, Source IP,

WAN interface IP, Login time, Endpoint features and Antivirus software .

Operating System: If the inspected object is Operating system, the options related to

258

SANGFOR SSL M7.5 User Manual operating system will appear, as shown in the figure below:

If any operating system is selected, the end user’s PC must have installed the corresponding operating system if he or she wants to log in to SSL VPN.

For Windows OS, administrator can also specify the service pack (SP) that end users should install on their computer. Version number of the SP is entered in the Install at

least SP field.

To save this rule, click the Save button.

To save this rule and add another rule, not going back to the previous page, click the

Save and Add button.

To cancel saving this rule, click the Cancel button.

If more than one operating systems are selected, the operating systems are with OR logic, that is to say, user would satisfy this rule if any of the selected operating systems is installed on user’s computer. If SP is configured, the SP would be taken as a requirement for the operating system.

File: If the inspected object is File, the options related to file will appear, as shown below:

259

SANGFOR SSL M7.5 User Manual

The following are the contents under File:

Specified file exists on user’s PC: If this option is selected, the specified file must exist on the hard disk of user’s computer. Otherwise, authentication check will fail.

Specified file does not exist on user’s PC: If this option is selected, the specified file should not exist on the hard disk of user’s computer. Otherwise, authentication check will fail.

File Path: Specifies the directory of the file on end user’s computer. It can be absolute path, or system variable, such as, %SystemRoot%\log.txt.

This field is required. The letters entered are case-insensitive.

File’s update can be late for maximum _ days: If this option is selected and a maximum of days is configured (for example, 5 days), the specified file’s update should not lag behind over 5 days.

File Size: If this option is selected and file size is obtained (click Load File, browse and select the file), size of the file on user’s PC must be exactly the same with this file, that is to say, the file must not be edited by end user, otherwise, access to SSL VPN will be denied.

File MD5: If this option is selected and MD5 of this file is obtained (click Load

File, browse and select the file), contents in the file on user’s PC must be exactly the same with this file, that is to say, the file must not be altered by end user, otherwise, access to SSL VPN or resource will be denied.

The first time administrator clicks Load File to get MD5 or size of a file, the browser will ask whether the ActiveX control WebUICtrl has been installed, as shown in the figure below:

260

SANGFOR SSL M7.5 User Manual

Click the Check ActiveX Status button to check if WebUI Ctrl has been installed.

If not installed, click the Install button to enter another page and follow the pop-up prompt to install the ActiveX control.

When seeing the warning, click the Install button.

If the browser does not give any pop-up prompt of installing the ActiveX control, click the Install link to install it manually, as shown in the figure below:

The option under File are with AND logic. Only when all the options are satisfied will this rule is matched.

Process: If the inspected object is Process, the options related to process will appear, as shown below:

261

SANGFOR SSL M7.5 User Manual

The following are the contents under Process:

Specified process must be running: If this option is selected, the specified process must exist on user’s computer before and/or after user logs in to the SSL

VPN or resource. Otherwise, authentication check will fail.

Specified process should not be running: If this option is selected, the specified process should not exist on user’s computer before and/or after user logs in to the

SSL VPN or resource. Otherwise, authentication check will fail.

Process Name: Specifies the name of the process that will be checked on end user’s computer.

Window Name: Specifies the name of the window in which the process runs.

File MD5: If this option is selected and MD5 hash checksums of this file is obtained (click Load File, browse and select the file), contents in the file on user’s

PC must be exactly the same with this file, that is to say, the file must not be altered by end user, otherwise, access to SSL VPN or resource will be denied.

File Size: If this option is selected and file size is obtained (click Load File, browse and select the file), size of the file on user’s PC must be exactly the same with this file, that is to say, the file must not be edited by end user, otherwise, access to SSL VPN or resource will be denied.

The option under File are with AND logic. Only when all the options are satisfied will this rule is matched.

Registry: If the inspected object is Registry, the options related to registry will appear, as shown below:

262

SANGFOR SSL M7.5 User Manual

The following are the contents under Registry:

Specified item exists in registry: If this option is selected, the specified item must exist in the registry of user’s computer before and/or after user logs in to the SSL

VPN or resource. Otherwise, authentication check will fail.

Specified item does not exist in registry: If this option is selected, the specified item should not exist in the registry of user’s computer before and/or after user logs in to the SSL VPN or resource. Otherwise, authentication check will fail.

Key: Specifies the key that will be checked. It should be the location of the key in the registry.

The option under Registry are with AND logic. Only when all the options are satisfied will this rule is matched.

Source IP: If the inspected object is Source IP, the contents are as shown below:

Start IP, End IP: Specifies the start IP address and end IP address of the IP range IP range from which user can log in to SSL VPN.

WAN Interface IP: If the inspected object is WAN Interface IP, the contents are as shown below:

263

SANGFOR SSL M7.5 User Manual

IP Address: Specifies the IP address of the WAN interface on Sangfor device. End user can connect to SSL VPN only through this WAN interface.

Login Time: If the inspected object is Login time, the contents are as shown below:

In the above figure, the green part is selected time segments while white part is unselected time segments. Configuration is the same as that in Schedules section.

Endpoint Features: If the inspected object is Endpoint features, the contents are as shown below:

The hardware IDs listed under Endpoint Features come from Hardware ID page

(please refer to the Managing Hardware IDs section in Chapter 4).

To select an entry, select the checkbox next to the entry. Selecting entry or entries means that the connecting user must have at least one of the hardware IDs. Otherwise, authentication check will fail.

To view the hardware IDs in descending or ascending order by hardware ID, hostname or MAC address, click on the column header, Hardware ID, Hostname or MAC

264

SANGFOR SSL M7.5 User Manual

Address respectively.

To search for a specific entry, click Search by Hostname/MAC Address, enter the keyword and click the magnifier icon .

Antivirus Software: If the inspected object is antivirus software, the contents are as follows:

If any antivirus program is selected, the end user’s PC must have installed the corresponding program if he or she wants to log in to SSL VPN. If Latest version required is also selected, user is required to install latest version of corresponding antivirus program.

If more than one antivirus programs are selected, the antivirus programs are with OR logic, that is to say, user would satisfy this rule if any of the selected antivirus programs is installed on user’s computer. If Latest version required is selected, the latest version would be taken as a requirement for the antivirus program.

3. Click the Save button to save the settings.

265

SANGFOR SSL M7.5 User Manual

Predefining Combined Rule

1. Navigate to SSL VPN > Endpoint Security > Rules to enter the Rule Predefining page and click Add > Combined rule, or click Combine Selected Rules, as shown below:

To use Combine Selected Rules, select the desired basic rules first and then click Combine

Selected Rules to create a combined rule with the selected basic rules, as shown below:

Combined rule can only consist of basic rules. To view the selected basic rules that are to be included in this combined rule, put the cursor on View.

Enter name and description for this new combined rule and click the OK button to save the settings.

2. Or click Add > Combined rule to configure the combined rule, as shown below:

266

SANGFOR SSL M7.5 User Manual

Name: Configures the name of the combined rule.

Description: Configures the description of the combined rule.

3. Click Select Rule to enter the Select Rule page and specify the basic rules that this combined rule will include. The Select Rule page shows all the predefined basic rules, as shown below:

4. Click the OK button to close the above page.

5. Click the Save button and then the Apply button to save and apply the settings.

267

SANGFOR SSL M7.5 User Manual

Configuring Security Rule

Security rule consists of basic rules and/or combined rules. When the connecting user satisfies one of these basic or combined rules, the security rule is matched. If the connecting user satisfies none of the basic or combined rules, the security rule will not be matched and user will fail the authentication check.

To add a security rule:

1. Navigate to SSL VPN > Endpoint Security > Rules > Rule and click Add to enter the Edit

Rule page, as shown in the figure below:

2. Configure name and description for the security rule.

3. Click Select Rule to enter the Select Rule page and specify the basic rules that this combined rule will include.

The Select Rule page shows all the predefined basic rules, as shown in the figure below:

268

SANGFOR SSL M7.5 User Manual

4. Click the OK button to close the above page.

5. Click the Save button and then the Apply button to save and apply the settings.

The rules in the security rule are with OR logic. If any of the basic or combined rules is satisfied, the security rule is matched.

Security Policy

Based on security policy, endpoints will be checked when users connect to or have logged in to

SSL VPN. There are two types of security policies. One is user-level policy and the other is role-level policy.

User-level policy is applied to users and checks the endpoints when users access SSL VPN

(pre-authentication check) or after users log in to SSL VPN (post-authentication check). The connecting users have to satisfy the basic or combined rules included in the associated user-level policy. If the policy is satisfied, end users can enter the login page or stay connected to the SSL

VPN, as shown in the figure below:

269

SANGFOR SSL M7.5 User Manual

If user fails the security check, he or she will be informed of the security policy that makes him or her fail the security check, as shown in the figure below

Role-level policy is applied to roles that are associated with users, and checks the endpoint when the associated users access SSL VPN (pre-authentication check) or are accessing to the resource

(post-authentication check). The connecting users have to satisfy basic or combined rules included in the associated role-level policy. If the policy is satisfied, end users can visit the associated resource or continue accessing the resource over SSL VPN; otherwise, security check will fail and the associated resources will be put into Unauthorized Resource List and therefore be unavailable to users, as shown in the figure below:

Click on any of the unauthorized resources, a prompt will pop up telling user which policy he or she fails to comply with, as shown in the figure below:

270

SANGFOR SSL M7.5 User Manual

In case that a user is tied to a user-level policy and its associated role is tied to a role-level policy, when the user connects to SSL VPN, he/she goes through user-level security check first. If user fails the user-level security check, he/she cannot log in to the SSL VPN. Once user passes the user-level security check, he/she will then goes through role-level security check, however, if user fails to pass role-level security check, the role’s associated resources will be put into the

Unauthorized Resource List and be unavailable to the user.

Navigate to SSL VPN > Endpoint Security > Policies and the User-level Policy page appears, as shown in the figure below:

The following are the contents included on User-level Policy page:

Policy Name: Indicates name of the user-level policy.

Description: Indicates description of the user-level policy.

Applicable User/Group: Indicates the users and/or groups that are associated with the user-level policy.

Status: Indicates the status of the security policy, enabled or disabled.

Add: Click it to add a new user-level policy.

Delete: Click it to remove the selected user-level policy from the list.

Edit: Click it to edit a selected user-level policy.

Select: Click Select > All pages or Current page to select all the entries or only those showing on the present page; or click Select > Deselect to deselect entries.

Applicable Role: Select and click a user-level policy to view the user and/or group to which this policy is applied. You can also select more users or remove user from the list.

Adding User-Level Policy

1. Navigate to SSL VPN > Endpoint Security > Policies to enter the User-level Policy page and click Add, as shown below:

271

SANGFOR SSL M7.5 User Manual

2. Configure the Basic Attributes of the user-level policy. The following are basic attributes:

Policy Name: Configures name of the user-level policy.

Description: Configures description of the user-level policy.

Enable Policy: Select this option to enable the policy.

Applied To: Click the Select User/Group button to enter the Users and Groups page and select the users and/or groups that are to be associated with this user-level policy.

The applicable users’ computer will be checked based on this user-level policy when the users connect to or have logged in to SSL VPN. The Users and Groups is as shown below:

To search for certain group, enter the group name into the Search filed on the left pane,

272

SANGFOR SSL M7.5 User Manual and click the magnifier icon . The user group will be highlighted in bold if found.

To search for certain user, enter the user name into the Search filed on the right pane, and click the magnifier icon .

To unfold all the groups and see all the users under the selected group, click Unfold all

.

To fold all the groups and click Fold all .

To select all the subgroups of a group, select the group on the left pane, click Select >

Group > Select all subgroups on the right pane.

To deselect all the subgroups of a group, select the group on the left pane, click Select >

Group > Deselect all subgroups on the right pane.

To select all the direct users of a group, select the group on the left pane, click Select >

User > Select all immediate users on the right pane.

To deselect all the direct users of a group, select the group on the left pane, click

Select > User > Deselect immediate users.

To save the settings, click the OK button.

3. Specify the security rules that will be included in this policy and applied to the associated users and/or groups. Click Select Rule to enter the Security Rules page and select the rule, as shown in the figure below:

4. Click the Save button to save the setting.

Adding Role-level Policy

1. Navigate to SSL VPN > Endpoint Security > Policies > Role-level Policy page and click

Add, as shown below:

273

SANGFOR SSL M7.5 User Manual

2. Configure the Basic Attributes of the role-level policy. The following are basic attributes:

Name: Configures name of the role-level policy.

Description: Configures description of the role-level policy.

Roles: Click Select Role to enter the Assigned Roles page, and then select the roles that are to be associated with this security policy. Computers of the users corresponding to the selected roles will be checked based on this role-level policy when the users log in to SSL VPN. The Assigned Roles page is as shown in the figure below:

274

SANGFOR SSL M7.5 User Manual

To select and add role, click Add to enter the Select Role page, as shown below:

Select the desired roles and click the OK button, and the selected roles are added to the assigned roles list, as shown in the figure below:

275

SANGFOR SSL M7.5 User Manual

To remove a role from the list, select the role and click Delete.

To add more roles, click Add again, select and add other roles into the list.

To save the settings, click the OK button.

Before selecting the desired role, make sure the role has been created. For detailed guide on how to configure role, refer to the Adding Role section in Chapter 4.

5. Specify the security rules that will be included in this policy and applied to the associated users and/or groups. Click Select Rule to enter the Security Rules page and select the rule, as shown in the figure below:

6. Click the Save button to save the setting.

276

Configuring Advanced Policy Settings

SANGFOR SSL M7.5 User Manual

As mentioned above, there are check before login and post-authentication check.

Post-authentication is conducted periodically after user’s login to SSL VPN or access to resource.

The following are the contents included on Advanced Settings page:

Perform check before login: Select this option and endpoint security check will be conducted on connecting users when they log in to SSL VPN. Once users fail the check, they cannot log in. Administrator needs to click the Select a Solution link to enter the Client

Options page and choose a solution.

This option is a global setting. Once it is selected, pre-authentication check will apply to all the users connecting to SSL VPN.

Pre-authentication Check Policy: Click this button to enter the Rules of

Pre-authentication Check Policy page to select the security rules that will be included in this policy, as shown in the figure below:

277

SANGFOR SSL M7.5 User Manual

Post-authentication Check: Select this option and endpoint security check on connecting users will be conducted periodically after they have connected to the SSL VPN.

Administrator needs to configure the time interval for periodical check. Enter the time interval into Every field. The interval is in minute and ranges from 1 to 60.

When users log in to the SSL VPN, they will go through user-level security check first and then role-level security check.

Built-in Rules Update

Built-in rules are a set of rules provided by SANGFOR, more specifically, a database of commonly-used security rules that will be updated periodically.

Navigate to SSL VPN > Endpoint Security > Built-in Rules Update, and the Update of Built-in

Rule Database page appears, as shown in the figure below:

278

SANGFOR SSL M7.5 User Manual

The following are the contents included on Built-in Rules Update page:

Rule Database Version: Shows the information of the rule database, the previous version, current version on the Sangfor device, and the latest version.

Roll Back: Click this button and the current rule database will roll back to the previous version that this Sangfor device was using.

Obtain Info: Click this button and information of the latest version of rule database will be obtained. To do so, administrator needs to specify the update server.

Install: Click this button to install the latest rule database.

Install Rule Update Package: Browse and load the rule update package through From File field, and then click the Upload and Install button. Before browsing the update package from the PC, administrator needs to click the Download link and go to the SANGFOR official website to download the update package by hand.

Update Options: During update process, if name of a built-in rule conflicts with name of an existing custom rule, update will proceed but that built-in rule will not be imported or a suffix “_fix” will be appended to the name of that built-in rule.

Auto-Update Options: Select Enable auto-update and specify the link to the update server, and the Sangfor device will check for updates on the specified update server to update the

279

built-in rules automatically.

Save: Click this button to save the settings.

SANGFOR SSL M7.5 User Manual

280

SANGFOR SSL M7.5 User Manual

Chapter 5 Firewall

The Sangfor device, integrated the enterprise-level stateful firewall with high availability, can protect enterprise network against attacks initiated from Internet or other local area networks connected to VPN. Besides, the built-in anti-DoS function enables the Sangfor device to defend against DoS attacks from extranet as well as inside the intranet.

Defining Firewall Service

As the software and communication applications running over network may use different transfer protocols and ports, you need to define these transfer protocols and ports here before configuring the corresponding filter rules.

Navigate to Firewall > Services to enter the Services page, as shown below:

For example, to configure filter rules on Sangfor device to filter the service data of SQL server, you need first define the protocol and port used by the SQL server.

Click Add to enter the Edit Firewall Service page, as shown below.

Then specify the service name, protocol and port, and click Save to save the settings.

281

SANGFOR SSL M7.5 User Manual

Defining IP Group

IP groups are predefined objects that can be referenced by firewall rules, as source or destination

IP address.

To view and define IP group, navigate to Firewall > IP Group to enter the IP Group page, as shown below:

For example, to configure filter rules specific to the data requested from the 192.168.1.0/24 subnet, you need first add the IP subnet into the list on IP Group page.

Click Add to enter the Edit IP Group page, specify IP group name and IP range and click Save to save the settings, as shown below:

If IP is selected, specify a destination IP address, as shown below:

\\

282

SANGFOR SSL M7.5 User Manual

Configuring Filter Rule

The Sangfor device is integrated with the stateful inspection packet filtering technology, which helps filter data packets in a specified time schedule according to protocol, source IP address and destination IP address.

The filter rules cover the rules applied to access to the local Sangfor device, and rules applied to access among four interfaces (LAN, DMZ, WAN, VPN interfaces), including the following directions: LAN<->DMZ, DMZ<->WAN, WAN<->LAN, LAN<->LAN, DMZ<->DMZ,

VPN<->WAN and VPN<->LAN.

As all the VPN data will be transferred through the VPN interface (for example, the computers connecting to LAN interface and the computers connecting to the peer VPN device communicate with each other through the LAN interface and VPN interface of the local VPN device), the filter rules also applies to the VPN data.

Rules on Access to Local Device

The Rules on Access to Local Device page displays the filter rules applied only to the access to the local Sangfor device.

Navigate to Firewall > Filter Rules > Local Device Access to enter the Rules on Access to Local

Device page, as shown below:

Select Allow or Disallow to allow or disallow users to perform the corresponding operations, and then click Save to save the settings.

Rules on Access among Sangfor Device’s Interfaces

These rules are intended to filter the data transmitted among the four network interfaces of the

Sangfor device, namely, LAN, DMZ, WAN and VPN interfaces.

283

SANGFOR SSL M7.5 User Manual

LAN<->DMZ: Defines the filter rules applied to data access between the LAN interface and

DMZ interface of the Sangfor device.

DMZ<->WAN: Defines the filter rules applied to data access between the DMZ interface and WAN interface of the Sangfor device.

WAN<->LAN: Defines the filter rules applied to data access between the WAN interface and

LAN interface of the Sangfor device.

VPN<->LAN: Defines the filter rules applied to data access between the VPN interface and

LAN interface of the Sangfor device. There are six filter rules built in each Sangfor device, which allow all TCP, UDP and ICMP data from VPN interface to LAN interface and from

LAN interface to VPN interface.

VPN<->WAN: Defines the filter rules applied to data access between the VPN interface and

WAN interface of the Sangfor device. If the peer has configured a tunnel route to access another site and/or access Internet through the local Sangfor device, configure the filter rules in the VPN<->WAN direction on the local Sangfor device to control the Internet access of the peer (for more details about configuring tunnel route, refer to the Scenario 22: Configuring

Tunnel NAT section in Chapter 5).

VPN<->DMZ: Defines the filter rules applied to data access between the VPN interface and

DMZ interface of the Sangfor device.

For control traffic of each certain direction, select action Allow or Deny.

Configuring NAT Rule

The NAT module covers the following configurations: SNAT Rule, DNAT Rule, IP/MAC

Binding, HTTP Port, URL Group, WAN Service and Access Right of Local Users.

Configuring SNAT Rule

The SNAT Rule page, as shown below, enables you to set the Source Network Address

Translation (SNAT) rules, which will convert the source IP addresses of the corresponding packets forwarded by the Sangfor device. The Sangfor device will not only provide the basic NAT function, but control (allow/deny) the data packets requested from LAN users for Internet access, in cooperate with the filter rules.

By default, there is no SNAT rule configured on the Sangfor device. If any SNAT rule is needed, configure the SNAT rule according to the specific case.

Navigate to Firewall > NAT > SNAT Rule to enter the SNAT Rule page, as shown below:

284

SANGFOR SSL M7.5 User Manual

There is no SNAT rule on Sangfor device by default. If you want to configure a SNAT rule, click

Add to enter the Edit SNAT Rule, as shown below:

The following information are included on above page:

Name: Indicates the name for this SNAT rule.

Source Subnet: Specifies source interface, subnet and netmask for original data packet.

Destination: Specifies egress interface, subnet and netmask for original data packet. Egress interface can be LAN, DMZ or VPN. Subnet and netmask are used to determine whether the destination IP address of data packet matches this SNAT rule.

Translated To: Specifies what IP address the source IP address is translated to. If Interface

IP is selected, the source IP of data packet will be translated to the IP address of destination interface. If Specified IP is selected, you need to specify an IP address manually.

Enable rule: Select it to enable this SNAT rule. Firewall will let matching packets pass.

285

SANGFOR SSL M7.5 User Manual

Configuring DNAT Rule

The DNAT Rule page, as shown below, enables you to configure the Destination Network

Address Translation (DNAT) rules required if servers located in LAN provide services to the

Internet.

Navigate to Firewall > NAT > DNAT Rule to enter the DNAT Rule page, as shown below:

Configuring IP/MAC Binding

The Sangfor device provides the IP/MAC binding function, through which you can get the MAC address of a machine in the LAN and bind the MAC address to its IP address.

Therefore, when an unknown internal machine connects to the Sangfor device, it cannot access the

Internet through the Sangfor device if the IP address and MAC addresses are not in the IP/MAC binding list. If the MAC address of a certain IP address is found inconsistent with that in the

IP/MAC binding list, the Sangfor device will also deny its request for Internet access. In this way, the IP/MAC binding function can also prevent IP address of a LAN computer from being altered.

Navigate to Firewall > NAT > IP/MAC Binding to enter the IP/MAC Binding page, as shown below:

To enable the IP/MAC binding function, select the Enable IP/MAC binding option.

With IP/MAC binding enabled, when a user initiates a request for Internet access, the Sangfor device will check whether the IP address is in the IP/MAC binding list. There are two cases:

 For IP address in the list, the Sangfor device will further check whether its MAC address matches that in the list. If yes, the user can successfully access the Internet; otherwise, its request will be denied.

286

SANGFOR SSL M7.5 User Manual

 For IP address not in the list, the Sangfor device will handle its request according to the action specified in Action (for IP not in the list below).

The Action (for IP not in the list below) option specifies the action to be taken for Internet access requests initiated by internal users whose IP/MAC addresses are not in the IP/MAC binding list.

There are two actions:

Deny: Indicates the user is NOT allowed to access the Internet if the IP address is not in the

IP/MAC binding list.

Allow: Indicates the user is allowed to access the Internet if the IP address is not in the

IP/MAC binding list.

For IP address already in the IP/MAC binding list, the Sangfor device will check whether its MAC address matches that in the list (on the condition that the IP/MAC binding function is enabled). If yes, the corresponding user can access the Internet; otherwise, its request for Internet access will be denied.

To add an IP/MAC binding entry, click Add and then enter the IP address and MAC address (or click Get MAC to obtain MAC address automatically), as shown below:

The search for IP/MAC addresses of the internal computers, perform the following steps:

1. Click Search and the following prompt appears.

2. Click OK and the following dialog appears.

287

SANGFOR SSL M7.5 User Manual

3. Enter the IP range and then click Start.

The IP/MAC binding function is unavailable in a layer-3 switched environment.

Configuring HTTP Port

The HTTP Port page enables you to define the HTTP service port. By default, it is port 80. If the

Enable URL access option is selected in Firewall > NAT > Access Right > Access Right of

Local Users, the Sangfor device will record the information of the URL accessed by users through port 80 and filter the URL information sent through port 80. To record and filter the URL access on any other ports, add the ports here.

Navigate to Firewall > NAT > HTTP Port to enter the HTTP Port page, as shown below:

To add an HTTP port, click Add to open the following dialog, and then specify the corresponding information.

288

SANGFOR SSL M7.5 User Manual

Defining URL Group

An enterprise-level stateful firewall is built in the Sangfor device and provides the URL filtering function. This function, coupled with the firewall, helps control LAN users’ access to the Internet.

You need define the URL groups before using the URL filtering function.

Navigate to Firewall > NAT > URL Group to enter the URL Group page, as shown below:

To add a URL group:

1. Click Add to enter the Edit URL Group page, and then enter a name and description for the

URL group, as shown below:

289

SANGFOR SSL M7.5 User Manual

2. Click Add on the Edit URL Group page, enter the URL address (the first field supports the wildcard *) and then click Save to add it to the URL list.

3. Click the Save button on the URL Group page to save the settings.

Defining WAN Service

WAN services are services provided by external networks, which are initially accessible to LAN users if they can connect to the external network. However, access to WAN services can also be restrained by the WAN service entry configured on the Sangfor device.

By default, four types of services are already defined, namely, POP3, SMTP, WEB and DNS. If any other service is needed, define it according to the specific case. For example, to add the FTP service provided by the server (Internet IP address is 202.96.137.75; ports is 20-21), perform the following steps:

1. Navigate to Firewall > NAT > WAN Service to enter the WAN Service page, as shown below:

290

SANGFOR SSL M7.5 User Manual

2. Click Add to enter the Edit WAN Service page, and then enter a name and description for the entry, as shown below:

3. Click Add on the Edit WAN Service page to specify the IP addresses and port of the external

FTP server, as shown below:

291

SANGFOR SSL M7.5 User Manual

4. If service address is domain name, click the Resolve Domain Name button on the Edit

WAN Service page to enter the Resolve Domain Name page, and then enter the domain name and click the Resolve button to resolve the domain name. The corresponding IP address(es) will be listed, as shown below:

5. Click the Save buttons to save the settings.

Configuring Access Right of Local Users

The Access Right of Local Users page helps to conduct control over LAN users’ access to the

292

SANGFOR SSL M7.5 User Manual

Internet. It is one of the most common ways used on firewall device to allow/block LAN users’ access to the services provided over external networks. Although the filter rules of firewall also provide the control function, it controls users’ access based on IP address and port, which attaches the importance to the security of the entire network. For controlling LAN users’ access to the

Internet, Access Right of Local Users is more convenient.

To configure an access right rule:

1. Navigate to Firewall > NAT > Access Right to enter the Access Right of Local Users page, as shown below:

2. Select the Enable URL access option to enable URL filtering function and view URL access logs.

3. Click Add to enter the Edit Internet Access Right page, and then enter a name and description for this rule, as shown below:

4. Click the Add button on the IP Range tab and enter the LAN IP addresses applicable to this rule, as shown below:

293

SANGFOR SSL M7.5 User Manual

5. Click to enter the WAN Service tab and specify the WAN services for the LAN users configured in Step 4. By default, the LAN users can access all the WAN services.

When a LAN user initiates a request for Internet access, the firewall will inspect the data packet based on the selected rules from top to bottom. The Default Action specifies the action that will to be taken if none of selected rules is matched.

6. Click to enter the URL Group tab, and specify the URL groups accessible to the LAN IP addresses configured on the IP Range tab. By default, the LAN users can access all URL addresses. To allow/deny access to a certain URL group, click Right to move it to the right

294

SANGFOR SSL M7.5 User Manual and then select Allow/Deny. In the following example, the applicable LAN users can access any URL address except those included in the URL group News Websites.

7. Click the Save buttons to save the settings.

295

SANGFOR SSL M7.5 User Manual

Real-time Monitoring

Viewing Real-time Traffic

The Traffic page shows the information of inbound and outbound traffic related to LAN users.

Navigate to Firewall > Monitor > Traffic to enter the Traffic page, as shown below:

Viewing URL Access Logs

The URL Access Logs page displays the webpage access records of LAN users, including access time, status, IP address of the LAN user and URL of the visited webpage.

Navigate to Firewall > Monitor > Logs to enter the URL Access Logs page, as shown below:

To update the URL access logs, click the Refresh button.

To have URL access entries displayed here, ensure the Enable URL access option is selected (in

Firewall > NAT > Access Right > Access Right of Local Users).

296

SANGFOR SSL M7.5 User Manual

Configuring Anti-DoS

The firewall shoulders the responsibilities of protecting the local area network (LAN) from being attacked by users over the Internet. However, apart from outside attacks, attacks from inside the

LAN may also threaten the security of the LAN. For example, it often happens that a virus-infected computer sends massive data packets to the gateway, which may result in bandwidth congestion or gateway crash. In this case, deploying a Sangfor device in your network will easily solve the issue. As the Sangfor device, integrated with the anti-DoS function, will monitor the number of data packets sent from a certain IP address to the gateway. When the number reaches the threshold specified, the Sangfor device will regard the requests as a DoS attack and lock the IP address for a certain period to protect itself.

Navigate to Firewall > Anti-DoS to enter the Anti-DoS page, as shown below:

The following are the contents included on the Anti-DoS page:

Enable Anti-DoS: Select this option to enabled anti-DoS function.

Internal Subnets: Indicates the LAN subnets that can access the Internet through the

Sangfor device. When a data packet is sent from a LAN IP address, the Sangfor device will first check whether the source IP address of the packet is in the Internal Subnets list. If not, the Sangfor device will directly drop the packet. If yes, the Sangfor device will further monitor and calculate the number of data packets sent from the IP address. Once the number of data packets reaches the corresponding threshold specified in the defense settings, the device will lock the IP address for a specified period.

297

SANGFOR SSL M7.5 User Manual

Null list indicates all IP addresses are regarded as internal addresses, which means the

Sangfor device will skip checking for source IP address of packet, directly monitor/calculate the number of packets sent and finally determine whether to lock the IP address according to the number calculated and thresholds configured in the defense settings below.

LAN Routers: The function is LAN Routers is similar to that of Internal Subnets.

Trusted IP Addresses: The attacks initiated from the IP addresses listed here will not be defended against. If no entry is added, the attack initiated from any IP address will be defended against.

Defense Options: Configure the defense options. There are three options:

Max TCP connections an IP initiates in a minute: Specifies the maximum of TCP connections that each IP address is allowed to initiate to the same port of an IP address in one minute. If the threshold here is reached, the IP address will be locked for a specified period.

Max SYN packets sent by a host in a minute: Specifies the maximum of SYN packets that each host is allowed to send in one minute. If the threshold here is reached, the

IP/MAC address will be locked for a specified period.

Once attack is detected, lock host for (minute): Specifies the period that the attacking host will be locked after the attack is detected.

298

SANGFOR SSL M7.5 User Manual

Chapter 6 System Maintenance

The Maintenance module covers the following four parts: System Update, Logs,

Backup/Restore, and Restart/Shutdown.

System Update

System Upgrade

System can be updated through Web admin console, as shown below:

Follow the guide to update the system to the latest version. To update the system offline, there is no need to connect this SSL VPN device to the Internet.

Proxy Options

By enabling and configuring proxy server, SSL VPN unit could be connected to the Internet though proxy server. Configure proxy server, as shown below:

299

SANGFOR SSL M7.5 User Manual

Viewing Logs

The Logs page displays running status information and error information of the Sangfor device.

There are two types of logs: system logs and operation logs. The former displays the running information of each module of the current Sangfor device and the latter displays the information on operations performed by administrators.

Navigate to Maintenance > Logs to enter the Logs page, as shown below:

Viewing System Logs

To view the system logs, select System logs and specify a date, and the system logs of the specified date will be displayed, as shown below:

300

SANGFOR SSL M7.5 User Manual

To filter the system logs, click the Filter Options button to enter the following page, and then select the desired options.

Viewing Operating Logs

To view the operation logs, select Operation logs and a date, and the operation logs of the

301

specified date will be displayed, as shown below:

SANGFOR SSL M7.5 User Manual

To filter the operation logs, click the Filter Options button to enter the following page, and then select the desired options.

Backing Up/Restoring Configurations

Navigate to Maintenance > Backup/Restore to backup or restore the system configurations and

SSL VPN configurations on the System Config and SSL VPN Config pages respectively, as shown below:

302

SANGFOR SSL M7.5 User Manual

The following are contents included on the System Config page:

Download Current Config File: To back up the current configurations, click this link to download and save the current configurations to the local computer. The configurations are saved as a .bcf file.

Browse: To restore the configurations previously backed up, click it to select the configuration file from the local computer.

Restore: Click it to restore the configurations from the selected file.

Prompt admin at logon if backup has not been conducted for some time: Select it and specify Duration, so that the system will prompt the administrator to back up the configurations when he logs into the administrator Web console if configurations have not been backed up for such a long time.

To back up and restore SSL VPN configurations, click SSL VPN Config to enter the SSL VPN

Config page, as shown below:

303

SANGFOR SSL M7.5 User Manual

The following are contents included on the SSL VPN Config tab:

Download Current Config File: Click it to save the configurations to the local computer.

Browse: To restore the configurations previously backed up, click it to select the configuration file from the local computer.

Restore: Click it to restore the configurations from the selected file.

Auto Backups: Displays configuration files automatically backed up by the system in the past 7 days. Click Restore to restore any of them.

The configurations here only indicate the configurations of the SSL VPN module.

Restarting/Shutting Down Device or Services

The Restart/Shutdown page allows you to shut down/restart the Sangfor device, restart all the services and stop/start the SSL VPN service.

Navigate to Maintenance > Restart/Shutdown to enter the Restart/Shutdown page, as shown below:

304

SANGFOR SSL M7.5 User Manual

Shut Down Device: To stop all the running services, save current configurations and shut down the Sangfor device.

Restart Device: To shut down and restart the Sangfor device.

Restart Service: To terminate all the sessions, release system resources and restart system services.

Stop SSL VPN Service: To stop the SSL VPN service.

About SSL VPN: To show SSL VPN version information and configure update options.

305

SANGFOR SSL M7.5 User Manual

System Automatic Update

The Update Options page includes automatic update options. If auto-update is enabled, updates will be automatically downloaded and installed.

Navigate to Maintenance > Restart/Shutdown page and click About SSL VPN to enter the

About SSL VPN page and then click on Update Options, the following page appears, as shown below:

306

SANGFOR SSL M7.5 User Manual

Enable auto-update: Select this option to enable automatic update function. The device will check for updates and download them regularly and automatically.

 If Disable auto-update is selected, updates will not be downloaded automatically.

Help to Improve Product: Select the option below it to allow user to send system error report to SANGFOR to help improve the product. It does not contain any personal or organization information.

Save: Click this button to make the settings take effect.

The auto-update is only applicable to service pack (SP) installation, but not applicable to upgrade of released version.

307

SANGFOR SSL M7.5 User Manual

Chapter 7 Scenarios

Device Deployment

Sangfor device can work in two modes, Single-Arm mode and Gateway mode. You can configure device deployment mode under System > Network > Deployment.

Deploying Device in Gateway Mode with Single Line

Background:

 One network segment of a local area network is 192.200.200.0/24

 A Sangfor device is to be deployed in Gateway mode

 External network is an Ethernet network; the IP address assigned by the Internet server operator is 202.96.137.75.

Perform the following steps:

1. Deploy and connect the related devices as shown in the figure below:

2. Log into administrator console and navigate to System > Network > Deployment page, and select Gateway as the deployment mode, configure LAN interface, as shown in the figure below:

308

SANGFOR SSL M7.5 User Manual

3. Configure WAN interface and corresponding line, as shown below:

309

SANGFOR SSL M7.5 User Manual

4. Go to Firewall > NAT > SNAT Rule to enter the SNAT Rule page and click Add to enter

Edit SNAT Rule page, as shown below:

310

SANGFOR SSL M7.5 User Manual

5. Click Save button to save the settings and restart the Sangfor device.

Deploying Device in Gateway Mode with Multiple Lines

Background:

 One network segment of a local area network is 192.200.200.0/24

 A Sangfor device is to be deployed in Gateway mode

 There are two WAN lines: Telecom and Unicom.

Purpose:

User on business can connect to SSL VPN through the one of the two WAN lines, which has better performance.

Perform the following steps:

1. Deploy and connect the related devices as shown in the figure below:

2. Log into administrator console and navigate to System > Network > Deployment page, and select Gateway as the deployment mode, configure LAN interface, as shown in the figure

311

SANGFOR SSL M7.5 User Manual below:

3. Configure WAN interface and corresponding line, as shown below:

312

SANGFOR SSL M7.5 User Manual

4. Go to System > Network > Multiline Options page and select the Allow Sangfor VPN to

Use Multiple Lines option and add two Internet lines: Telecom and Unicom, as shown in the figure below:

313

SANGFOR SSL M7.5 User Manual

Select the Allow SSL VPN to Use Multiple Lines and SSL VPN users connects in

directly Options under Multiline Policy of SSL VPN section, as shown below:

5. Navigate to Firewall > NAT > SNAT Rule and click Add to enter the Edit SNAT Rule page and configure required fields according to your need, as shown below:

314

SANGFOR SSL M7.5 User Manual

6. Click Save to save all the changes and restart Sangfor device.

The option Allow Sangfor VPN to Use Multiple Lines needs to be selected only when Sangfor device is deployed in gateway mode with multiple lines and connected to Internet directly.

Deploying Device in Single-Arm Mode With Single Line

Background:

 One network segment of a local area network is 192.200.200.0/24

315

SANGFOR SSL M7.5 User Manual

 A Sangfor device is to be deployed in the local area network, in Single-arm mode

 The front-end firewall is connected to external network through an Internet line

Purpose:

Users on business can access internal resources through SSL VPN.

Perform the following steps:

1. Deploy and connect the related devices, as shown in the figure below:

2. Go to System > Network > Deployment page and select Single-Arm as deployment mode, and configure the network interfaces of the device as well, as shown below:

316

SANGFOR SSL M7.5 User Manual

3. Click the Save button to save the settings and restart the Sangfor device.

4. Configure the front-end firewall, and make sure that the corresponding ports (443 by default) of the front-end firewall are mapped to those on the Sangfor device.

Port 443 is the listening port of Sangfor device by default. It can be modified. If it is modified, corresponding port of the front-end firewall needs to be mapped to the modified listening port.

LAN interface of Sangfor device in single arm mode should be connected to internal switch.

Deploying Device in Single-Arm Mode With Multiple Lines

Background:

 There are two Internet lines connected to front-end firewall device: Telecom and Unicom

 A Sangfor device is to be deployed in the local area network, in Single-arm mode

Purpose:

User can connect to SSL VPN by typing into 202.96.137.75 or 58.120.10.64 in Address field on

VPN client.

317

SANGFOR SSL M7.5 User Manual

Perform the following steps:

1. Deploy and connect the related devices, as shown in the figure below:

2. Go to System > Network > Deployment page and select Single-Arm as deployment mode, and configure the network interfaces of the device as well, as shown below:

318

SANGFOR SSL M7.5 User Manual

3. Go to System > Network > Multiline Options page to select the Allow SSL VPN to use

Multiple lines option and add two Internet lines for SSL VPN, as shown below:

4. Configure the front-end firewall again, so that the two ports (TCP 80 and 443) of the public

319

SANGFOR SSL M7.5 User Manual network IP addresses (of the two Internet lines) can be mapped to the Sangfor device.

5. Click Save button to save the changes and restart Sangfor device.

When Sangfor device is deployed in single-arm mode, HTTPS port and HTTP port must be mapped to the Sangfor device; otherwise, multiline selection policy will not work.

Configuring System Route

Background:

 Two network segments of a local area network are 192.200.200.X and 192.200.254.X. Users in these two subnet communicate through layer 3 switch

 Sangfor device is to be deployed in the local area network, in gateway mode

Purpose:

Users on the subnet 192.200.254.x can access Internet through Sangfor device

As 192.200.254.X and 192.200.200.254 on which LAN interface of Sangfor device resides are not on the same network segment, a system route is required to be configured on Sangfor device.

Perform the following steps:

1. Deploy and connect the related devices, as shown in the figure below:

320

SANGFOR SSL M7.5 User Manual

2. Configure SNAT rule on Firewall > NAT >SNAT Rule page, as shown below:

3. Go to System > Network > Routes page to add a route directing to 192.200.254.X, as shown below:

321

SANGFOR SSL M7.5 User Manual

Deploying Clustered Sangfor Devices

Deploying Clustered Device in Gateway Mode

Background:

 Sangfor device is deployed in cluster mode, in order to improve internal system stability.

 Sangfor device is deployed in gateway mode and directly connected to Internet line.

 The IP address of the Internet line is 202.96.137.75, netmask is 255.255.255.0.

For clustered nodes deployed in Gateway mode, the configurations of internal and external interfaces are the same as those on an individual Gateway-mode Sangfor device (please refer to the Device Deployment section in this Chapter). One additional configuration is Cluster IP

Address of LAN interface and WAN interface (under System > SSL VPN Options >

Clustering > Cluster Deployment).

Typical network topology of cluster in Gateway mode is as shown in the figure below:

322

SANGFOR SSL M7.5 User Manual

LAN Cluster IP address on every clustered device should be identical; so is the WAN

Cluster IP address.

 WAN interface IP address on every clustered device should be of a same network segment; whereas WAN Cluster IP address and WAN Interface IP address configured on a Sangfor device must NOT be a same network segment.

 Cluster will not work if the Sangfor device works as gateway and dials up to Internet.

Deploying Clustered Device in Single-Arm Mode

For clustered nodes deployed in Single-arm mode, the configurations of internal and external interfaces are the same as those on an individual Single-arm Sangfor device (please refer to the

Device Deployment section in this Chapter). One additional configuration is Cluster IP Address of LAN interface (under System > SSL VPN Options > Clustering > Cluster Deployment).

Typical network topology of cluster in Single-arm mode is as shown in the figure below:

323

SANGFOR SSL M7.5 User Manual

LAN Cluster IP address on every clustered device should be identical.

LAN interface IP address (configured in System > Network > Deployment) and the

LAN Cluster IP (configured in System > SSL VPN Options > Clustering > Cluster

Deployment) must be of a same network segment.

Deploying Clustered Device with Multiple Lines

For clustered nodes deployed with multiple lines, the configurations of internal and external interfaces are the same as those on an individual Sangfor device that has multiple lines (please refer to the Device Deployment section in this Chapter). One additional configuration is Cluster

IP Address of LAN interface and WAN interface (under System > SSL VPN Options >

Clustering > Cluster Deployment).

LAN Cluster IP address on every clustered device should be identical; so is the WAN Cluster IP

address. As a Sangfor device has more than one line, the WAN Cluster IP addresses on every clustered device must be consistent.

324

SANGFOR SSL M7.5 User Manual

Gateway-mode Sangfor Device with Multiple Lines

Typical network topology of cluster of Gateway-mode devices is as shown in the figure below:

Single-Arm Sangfor Device with Multiple Lines

Typical network topology of cluster of Single-arm devices is as shown in the figure below:

325

SANGFOR SSL M7.5 User Manual

The cluster IP addresses configured on each clustered node (Sangfor device) should be consistent.

Adding User

Adding User Logging in with Local Password

1. Navigate to SSL VPN > Users > Local Users sand click Add > User to enter the Add User page.

2. Configure Name and Local Password fields.

3. Configure Authentication Settings. Select Local password, as shown below:

4. Click the Save button and Apply button to save and apply the settings.

Adding User Logging in with Certificate

1. Navigate to SSL VPN > Authentication to download and install the USB key driver and

USB key tool (for importing USB key).

2. Navigate to SSL VPN > Users > Local Users and click Add > User to add a new user, as

326

shown in the figure below:

SANGFOR SSL M7.5 User Manual

3. Configure Name and Local Password fields. Select user type Private user.

4. Configure Authentication Settings. Select primary authentication Certificate/USB key.

5. Click the Generate Certificate button to enter the Generate Certificate page and generate certificate for this user, as shown in the figure below:

6. Configure the required fields and click the Generate button. If certificate is generated successfully, the following prompt dialog will pop up:

327

SANGFOR SSL M7.5 User Manual

7. Click Download to save the certificate file support.p12 to the computer and send it to the end user.

8. End user installs the certificate on his/her computer, visit the login page and select Use

Certificate login method to connect to SSL VPN, as shown in the figure below:

Configuring VPN Resource

Adding Web Application

Background:

One DNS server and four servers deployed in the enterprise network are providing services for employees:

http://oa.123.com: an OA system. Server address is 192.168.1.10. The employees mainly work via this platform.

http://bbs: a website where employees can communicate online. Server address is

192.168.1.11.

http://mail.123.com: a mail system of the company. Server address is 192.168.1.12.

ftp://ftp.123.com: a file sharing system of the company. Server address is 192.168.1.13.

Purpose:

Enable employees to access these resources over SSL VPN, but no add-on needs to be installed.

Analysis and solution:

328

SANGFOR SSL M7.5 User Manual

OA system is a JSP-based system. Interactions among units of an OA system are complicated and many scripts and controls need to be invoked. Because of the complexity, defining OA system as

Web application is not a wise choice, but TCP application and L3VPN are good choices for it. For the other three resources, they can be defined as Web application because they are static.

To achieve the expected purposes:

1. Navigate to SSL VPN > Resources, add a TCP resource named OA System (address is

http://oa.123.com) and associate it with the with the user accounts of the employees (to configure TCP application, please refer to the Adding/Editing TCP Application section in

Chapter 4).

2. Navigate to SSL VPN > Resources, add a Web resource named bbs (address is http://bbs) and associate it with the employees.

a. On the Resources page, click Add > Web app to enter the Edit Web Application page, as shown in the figure below: b. Choose resource type HTTP, and enter the resource address into the Address field.

c. Configure other required fields.

d. Click the Save button to save the settings.

3. Navigate to SSL VPN > Resources, add a Web resource named mail (address is

http://mail.123.com) and associate it with the employees.

a. On the Resources page, click Add > Web app to enter the Edit Web Application page, as shown in the figure below:

329

SANGFOR SSL M7.5 User Manual b. Choose resource type MAIL, and enter the IP address of the SMTP server into the

Address field and the domain name into Domain Name field.

c. Configure other required fields.

d. Click the Save button to save the settings.

4. Add a Web resource ftp (address is ftp://ftp.123.com) and associate it with the employees.

a. On the Resource Management page, click Add > Web app to enter the Edit Web

Application page, as shown in the figure below: e. Choose resource type FTP, and enter the resource address into the Address field and the port into FTP Port field.

b. Configure other required fields.

c. Click the Save button to save the settings.

5. Navigate to SSL VPN > Roles to add a role, assign the role to the employees, and associate it with the resources named bbs, mail and ftp. For detailed procedure of adding or editing a role, please refer to the Roles section in Chapter 4.

6. Click the Apply button (on the yellow bar at the top of the page) to apply the settings.

7. Employees log in to SSL VPN and can visit the resources on the Resource page just by clicking on the corresponding resource link, as shown in the figure below:

330

SANGFOR SSL M7.5 User Manual

Masquerading Resource Address

Purpose:

Conceal the IP address of the server that provides resource to users. Resource address masquerading only applies to HTTP, HTTPS, MAIL and FTP types of Web resources. Real addresses of FileShare type of Web resources are visible to users.

To achieve the expected purposes:

1. Navigate to SSL VPN > Resources and click Add > Web app to enter the Edit Web

Application page.

2. Select resource type HTTP and enter the resource address (e.g., http://200.200.72.60) into

Address field. Select the Enable resource address masquerading option, as shown below:

3. Associate the resource with the user. For detailed guide, refer to the Adding Role section in

331

SANGFOR SSL M7.5 User Manual

Chapter 4.

4. End user logs in to SSL VPN and enters the Resource page. The Resource page is as shown in the figure below:

5. Click the resource link to access the resource Web server. As shown in the figure below, the

URL address of the visited resource is not the real address (200.200.72.60) but a meaningless character string.

Adding FileShare Type of Web Application

Purposes:

 When the employee ssl1 accesses the Web-app-based file sharing server (IP: 200.200.72.169), he or she does not need to install any ActiveX control and can enjoy the speedup of access to the file sharing server.

 Employees can log in to the server automatically, without entering username and password.

To achieve the expected purposes:

1. Navigate to SSL VPN > Users and click Add to create a user account, as shown below:

332

SANGFOR SSL M7.5 User Manual

2. Navigate to SSL VPN > Resources and click Add > Web app to add a resource, as shown below:

3. On the Edit Web Application page, select FileShare type of application and configure the other required fields, as shown below:

4. On the Role Management page, click Add to add a role, as shown below:

333

SANGFOR SSL M7.5 User Manual

5. On the Add Role page, select user ssl1 added in Step 1 and the resource Web file sharing to associate the resource with the user.

6. When the employee uses the user account ssl1 to connect to SSL VPN, he/she will see the

Web file sharing resource link on Resource page, as shown in the figure below:

7. Click on the resource link and the contents on the Web file sharing server and the available contents will be displayed, as shown in the figure below:

334

SANGFOR SSL M7.5 User Manual

Adding Web Application Enabling Site Mapping

Background:

An OA system is JSP-based system and provides service for employees. Interactions among units of an OA system are complicated and many scripts and controls need to be invoked. Sangfor device is deployed in gateway mode. The network topology of custom network is shown in the figure below:

Purpose:

Enable employees to access OA system over SSL VPN easily.

Analysis and solution:

OA system is a JSP-based system. Interactions among units of an OA system are complicated and many scripts and controls need to be invoked. Except defining OA system as Web application, site mapping feature should be enabled for this Web application.

To achieve the expected purposes:

1. Navigate to SSL VPN > Resources, add a Web resource named OA System (address is

192.200.200.20), as shown in the figure below:

335

SANGFOR SSL M7.5 User Manual

2. Click on Site Mapping tab and select Enabled to enable site mapping feature. Select VPN

Port as Mode and enter 8080 in Port field. It is recommended to select the Rewrite webpage

contents option. If it is selected, the webpage containing lots of scripts can be modified and rewrote.

3. Navigate to SSL VPN > Roles to add a role, assign the role to the user Sangfor, and associate it with the resource named OA System. For detailed procedure of adding or editing a role, please refer to the Roles section in Chapter 4.

4. Click the Apply button (on the yellow bar at the top of the page) to apply the settings.

5. User Sangfor logs in to SSL VPN and can visit the resources on the Resource page just by clicking on the corresponding resource link, as shown in the figure below:

336

SANGFOR SSL M7.5 User Manual

6. Click the resource link to access the resource OA System. As shown in the figure below, the

URL address of the visited resource is not the real address.

If there is a domain name, obtained from ISP, directing to the Sangfor device, you can also select

Domain as Mode, and enter the domain name into Domain name field in step 2, as shown below:

Resource address masquerading and site mapping which is also called Easylink cannot be enabled together.

The VPN port mapped to Web application cannot be used by other application.

The domain name mapped to Web application cannot not be used to connect to SSL VPN.

User can connect to SSL VPN by typing the IP address of Sangfor device or other domain name. One domain name can only be mapped to one Web application.

The Easylink resource mapped to VPN port can be accessed by typing corresponding address into the toolbar of IE browser, while the Easylink resource mapped to domain name cannot be accessed through typing domain name into toolbar.

In case that Sangfor device is deployed in single-arm mode and port mapping is enabled,

Web application is mapped to port 8080 of Sangfor device, corresponding port of front-end firewall needs to be mapped to Sangfor device, except mapping port 443, and access through port 8080 needs to be allowed by firewall.

337

SANGFOR SSL M7.5 User Manual

Configuring TCP Application

Adding TCP Application

Background:

One DNS server and two servers are deployed in the enterprise network, providing services for the employees:

http://oa.123.com: an OA system. Server address is 192.168.1.10.

 Accounting system: Server address is 192.168.1.15 and port is 4003, providing services such as pay rolling, payment claiming, etc.

Purposes:

 Enable employees to access OA system directly (i.e., visit OA system through browser).

 Employees can open the accounting system, and connect to the server over SSL VPN.

Analysis and solutions:

Both the OA system and Accounting system can be defined as TCP application. Since OA system is a type of system involving immense interactions and some even need links to a number of servers, we need to use the feature Smart recursion of resource access (for more details, please refer section TCP App Resource Options in Chapter 4).

To achieve the expected purposes:

1. Navigate to SSL VPN > Resources. Click Add > TCP app to enter Edit TCP Application page and add a TCP application (named OA System, with address http://oa.123.com)., as shown below:

2. Click Add > TCP app to enter the Edit TCP Application page and add a TCP application

338

SANGFOR SSL M7.5 User Manual

(named Accounting system, server address: 192.168.1.15 and port is 4003), as shown below:

Choose the application type Other and specify the address and port.

3. Add or edit a role to associate the two resources ( OA System and Accounting system) with it and assign the role to user (for detailed guide, please refer to the Adding Role section in

Chapter 4).

4. After logging in to the SSL VPN with the specified SSL VPN account, the employees will see the resource link, as shown in the figure below:

OA system could be accessed when the employee clicks on the resource link, or visiting the server through browser.

The accounting system could be accessed directly by clicking the link if program path is specified in step 2. If it is not specified, employee needs to launch the program manually after clicking resource link.

339

SANGFOR SSL M7.5 User Manual

Configuring URL Access Control Feature

Background:

A file server (duan.sslt.com) is deployed in the enterprise network, providing services for the employees.

Purposes:

Only allow the members from Finance department to access this file server, and only the directory

duan.sslt.com/frame can be accessed by them, others directory of the file server being inaccessible.

Analysis and solution:

URL access control feature can achieve control over the access to the file server.

To achieve the expected purposes:

1. Navigate to SSL VPN > Resources and add a TCP application (named URL access control,

URL: duan.sslt.com), as shown in the figure below:

2. Click the URL Access Control tab, select the option Only allow access to the URLs below and add a new entry (URL: http://duan.sslt.com/frame) into the list, as shown below:

3. Create or edit a role and associate the resource with the user account of the employee (for detailed guide, please refer to the Adding Role section in Chapter 4).

4. After logging in to the SSL VPN with the specified SSL VPN account, the employees will see the resource link, as shown in the figure below:

340

SANGFOR SSL M7.5 User Manual

5. To access the frame directory, the employees needs only to click the URL access control link. Access to the upper-level directory will be denied.

Adding L3VPN Application

Background:

192.168.1.10-192.168.1.15 is a subnet in the enterprise network.

Purposes:

Enable network administrator to access internal machines on subnet 192.168.1.10-192.168.1.15

over SSL VPN

Analysis and solution:

For network administrator, defining the remote computers as L3VPN resource would allow him/her to access these machines remotely.

To achieve the expected purposes:

1. Navigate to SSL VPN > Resources and click Add > L3VPN to enter Edit L3VPN page, as shown in the figure below:

341

SANGFOR SSL M7.5 User Manual

Enter resource name (for example, ping), configure other required fields and click the Save button to save the settings.

2. Add or edit a role to associate the resources ping with it and assign the role to the network administrator (for detailed guide, refer to the Adding Role section in Chapter 4).

3. Click the Apply button to apply the settings.

4. After network administrator logs in to the SSL VPN, he/she will see associated resources, as shown in the figures below:

Network administrator can launch CMD.exe on local PC to ping the connectivity of the computers residing in the network segment 192.168.1.10-192.168.1.1.

342

SANGFOR SSL M7.5 User Manual

Adding Remote Application

Purposes:

Enable employees to access WordPad on the remote application server (IP: 172.16.253.119, port:

7170) and save modified file to private directory or public directory on remote server.

To achieve the expected purpose:

1. Install Terminal Service and RemoteAppAgent program. To download RemoteAppAgent program, navigate to SSL VPN > Remote Servers to enter the App Server page and click

Download RemoteApp Agent to download the RemoteApp Agent program, as shown below:

2. Double-click the executable file named SFRemoteAppServerInstall.exe and follow the instructions to install the RemoteApp Agent, as show in the figure below:

3. Create private folder and public folder on storage server. The file system format should be

343

SANGFOR SSL M7.5 User Manual

NTFS. Share this private directory and specify user permission for access to this folder.

4. Navigate to SSL VPN > Remote Servers to enter the App Server page and click Add >

Server to add an application server, as shown below:

344

SANGFOR SSL M7.5 User Manual

5. Configure admin account, password, and other required fields and make sure the application server can connect to the Sangfor device. You can click the Test Connectivity button to check whether this remote application server can be connected.

If the following prompt appears, the Sangfor device is then connected to the remote application server successfully.

If the following prompt appears, the SSL VPN cannot connect to remote application server.

In that case, check whether the remote server is configured properly.

6. Under Remote Application Programs, click Select from Sever to select the application program WordPad, as shown in the figure below:

7. The selected programs are seen in the figure below:

345

SANGFOR SSL M7.5 User Manual

8. Click the Save button on the editing app server page to save the settings.

9. Go to SSL VPN > Remote Servers > Storage Server to enter the Storage Server page, click Add to add a storage server and create private directory and public directory for it, as shown below:

10. Navigate to SSL VPN > Policy Sets to enter the Policy Sets page and add a policy set that will associate with the corresponding user (for procedures of configuring policy set, refer to the Adding Policy Set section in Chapter 4). While configuring the Remote Application tab

(as shown in the figure below), ensure the following:

 The user account for logging in to the remote application server is the SSL VPN

account or Windows account created as per the SSL VPN account.

 Directory is specified, so that the data or files in remote application session will be saved in the storage server and available to user for future access. Private directory indicates that a folder will be created in the specified directory automatically when user connects to the remote server, and is solely visible for that user.

346

SANGFOR SSL M7.5 User Manual

11. Associate the policy set with the corresponding user (for detailed guide, refer to the Adding

User section in Chapter 4).

12. Navigate to SSL VPN > Resources to add a remote application resource (for detailed guide, refer to the Adding/Editing Remote Application section in Chapter 4), as shown below:

13. Click the Select button (next to Program field) to select program WordPad, as shown below:

347

SANGFOR SSL M7.5 User Manual

14. Click the OK button to save the settings and the program name is seen in the Program field.

15. In the App Server tab, select an application server to publish WordPad.

16. Navigate to SSL VPN > Roles to associate this remote application resource with the corresponding user (for detailed guide, please refer to the Roles section in chapter 4).

17. After the employee logs in to the SSL VPN, he or she will see the Resource page with the resource link to that remote application.

18. Click on the link to the remote application resource created in Step 12, and a remote application session will be established, as shown in the figure below:

19. To view the connecting process, click the Details button. Progress details will be seen as follows:

348

SANGFOR SSL M7.5 User Manual

Once the session is established successfully, WordPad will be launched. The employee can edit and save the document to the specified directory on the remote storage server. Next time logging in to SSL VPN, he or she can edit this document again in remote application session

.

If the employee wants to save the modified file on client side. There are two methods to achieve that:

Method 1: a. Select Drives option on Remote Application tab when adding/editing policy set, as shown in the figure below: b. Log in to SSL VPN using VPN client. Right-click on VPN client logo and click on System

Settings to enter the System Setting page and click Remote Application tab to enter the following page, as shown below, and select the Local Disk option.

349

SANGFOR SSL M7.5 User Manual

Click Save to save the changes. Then you can save file to the local drives.

Method 2: Download the file by the means of file sharing a. Select Download when selecting private directory or public directory on Cloud Storage tab, as show in the figure below:

350

SANGFOR SSL M7.5 User Manual b. Log in to SSL VPN and right-click on VPN client logo, you will see the following figure: c. Click Private Directory to enter the File Sharing page, as shown in the figure below and you can download desired file here:

351

SANGFOR SSL M7.5 User Manual

Configuring Authentication with External CA

Using External CA Root Certificate to Generate Device

Certificate

Purpose:

Import and use the external CA root certificate to generate certificate for the Sangfor device, so that end users can pass certificate based authentication when logging in to the SSL VPN if they own certificates issued by that external CA.

To achieve the expected purpose:

1. Navigate to System > System > Device Certificate, as shown in the figure below:

2. Click the Create CSR button to generate a certificate signing request (CSR) for the Sangfor device. The Create a CSR for Device page is as shown in the figure below:

352

SANGFOR SSL M7.5 User Manual

3. Configure the required fields. In this scenario, country is CN (China), state is GD

(Guangdong), city is SZ (Shenzhen), company is SANGFOR, department is SUPPORT, email address is [email protected], and the certificate is issued to the login page

(address is 10.111.111.3) to the administrator Web console of Sangfor device.

 Country should be a two-letter abbreviation.

 State name can contain a maximum of 20 characters.

4. Click the OK button to save the settings.

5. Once the CSR is generated, click Download to download the request or copy the above request contents into a text file. The contents in the .csr file are as shown below:

353

SANGFOR SSL M7.5 User Manual

6. Submit the generated CSR to the external CA.

7. Get the Sangfor device certificate from the external CA.

8. Navigate to SSL VPN > Authentication > Certificate/USB Key Based Authentication page, and click Add under External CA section to upload the device certificate you have received from external CA to Sangfor device, as shown below:

9. Click on the External CA in Name column to enter the External CA page and configure CA

Options, as shown in the figure below:

10. Users can log in to SSL VPN with the certificated issued by this external CA.

354

SANGFOR SSL M7.5 User Manual

Mapping User to Local Group Based on External Certificate

Background:

Take Microsoft CA for example. As we know, for user accounts stored on LDAP server, the users under different OUs have varied privileges.

Now, the prerequisite is that each user owns a certificate issued by a third party CA already. We are to have these users (under different OUs) automatically granted with different levels of privilege to access the SSL VPN, hoping that they can pass the certificate based authentication with the certificate issued by the third-party CA when they connect to SSL VPN.

Suppose LDAP user test1 is under ou1, and user test1 is under ou2.

Purposes:

To assign different resources to the two users automatically after they log in to the SSL VPN successfully, but the two users need not be imported into the Sangfor device.

Analysis and solution:

Firstly, we need to configure external CA and use the CA to generate certificate, so that users can use third-party certificate to log into the SSL VPN. Secondly, we need to map the certificate users to the user group on Sangfor device, so that they can be granted with the same privilege as the users under the target group.

To achieve the expected purposes:

1. Configure external CA (for detailed guide, please refer to Configuring External CA in

Chapter 4).

2. Navigate to SSL VPN > Users and create two user groups named ou1 and ou2 (for detailed guide, please refer to the Adding User Group section in Chapter 4). Primary authentication

Certificate/USB key need not be selected for both users ou1 and ou2.

3. Generate certificates for the two users, test1 and test2.

Check the subjects of the two certificates, as shown below.

DN of test1: CN=test1, OU=ou1, DC=zy, DC=sangfor, DC=com

DN of test2: CN=test2, OU=ou2, DC=zy, DC=sangfor, DC=com

4. Configure CA option. Select Trust all the users who own certificate issued by current CA option, as shown in the figure below:

355

SANGFOR SSL M7.5 User Manual

5. Click the link Configure Mapping Rule to configure two mapping rules, one rule mapping

LDAP ou1 to the local group ou1, and the other mapping LDAP ou2 to the local group ou2, as shown in the figures below:

6. Navigate to SSL VPN > Roles, create two roles and associate the local groups ou1 and ou2 with different resources (for detailed guide, please refer to the Adding Role section in

Chapter 4).

7. Save the setting and then click the Apply button when configuration is completed.

After logging in to the SSL VPN, what test1 and test2 will see on the Resource page will be the corresponding associated resource.

356

SANGFOR SSL M7.5 User Manual

Configuring Resource Enabling SSO

Adding TCP Application Enabling SSO

Purpose:

When end users access tech forum of their company, they do not need to enter username and password again, which will be filled in automatically with their SSL VPN accounts.

Analysis and solution:

Firstly, we need to configure the tech forum as a TCP application. Secondly, enable SSO feature for this resource and choose a login method, which can be Auto fill in form or Set auto-access

request. In this scenario, we take the former as example.

To achieve expected purpose:

1. Navigate to SSL VPN > Users > Local Users and click Add > User to add a user( for detailed guide, refer to Adding User in Chapter 4)

2. Go to SSL VPN > Resources page and click Add > TCP app to add a TCP resource, as shown below:

357

SANGFOR SSL M7.5 User Manual

Click on SSO tab and select the Enable SSO to enable SSO feature, and choose auto fill in form as Login Method.

3. Go to System > SSL VPN Options > General > SSO page to download SSO assistant and config file, as shown in the figure below:

4. Install the SSO assistant. After installation completes, a corresponding shortcut will be created for the SSO assistant, as shown below:

358

SANGFOR SSL M7.5 User Manual

5. Double-click on the shortcut to launch SSO assistant, as shown below:

Click Open to import SSO config file downloaded in step 3and record SSO information with SSO Assistant. Click on the Username under the desired resource and right-click it to click Edit, then drag the magnifier on current page to Username textbox on the login page of this tech forum and select Same as VPN Username in Input Value field. Click

Save to save the changes. The method to record password and login button is similar with that of recording username.

359

SANGFOR SSL M7.5 User Manual

6. After recording SSO information completes, upload the SSO config file to Sangfor device.

Go to System > SSL VPN Options > General > SSO page and click Browse under Upload

SSO Config File section to select desired SSO config file, and then click Upload to upload it to the device, as shown below:

7. Navigate to SSL VPN > Roles > Role Management to add a role and associate it with the user created in step1 and the resource created in step2(for detailed guide, refer to Adding

Role in Chapter 4).

8. After user logs in to SSL VPN, he/she can click the resource link to access the tech forum directly without entering username and password.

360

SANGFOR SSL M7.5 User Manual

Adding Remote Application Enabling SSO

Background:

RXT,a instant messaging tool, is published over SSL VPN. Employee’s account for logging in to

RTX is not the same as that for logging in to SSL VPN. The username of RTX account is the abbreviation of employee’s name, and the password is their work number.

Purpose:

Enable employees to access RXT directly without need to provide RTX account after they log into

SSL VPN.

Analysis and Solution:

As employee’s account for logging in to RTX is different from the account for logging in to SSL

VPN, Allow user to modify SSO user account option should be selected when configuring SSO.

To achieve expected purpose:

1. Configure a remote server(for details, refer to Adding Remote Application in this Chapter)

2. Navigate to SSL VPN > Users > Local Users and click Add > User to add a user(named

ssl1, password is 123). For detailed guide, refer to Adding User in Chapter 4.

3. Go to SSL VPN > Resources page and click Add > Remote app to add a remote application named RTX, as shown below:

361

SANGFOR SSL M7.5 User Manual

Click on SSO License tab to select the Enable SSO option.

4. Go to System > SSL VPN Options > General > SSO page, select the Allow user to modify

SSO user account option, and download SSO assistant and config file, as shown in the figure below:

5. Install the SSO assistant. After installation completes, a corresponding shortcut will be created for the SSO assistant, as shown below:

362

SANGFOR SSL M7.5 User Manual

6. Double-click on the shortcut to launch SSO assistant, as shown below:

Click Open to import SSO config file and record SSO information with SSO Assistant.

Click on the Username under the desired resource and right-click it to select Edit, then drag the magnifier on current page to Username textbox on RTX login page and select

Same as VPN Username in Input Value field.

Click Save to save the changes.

7. After recording SSO information completes, upload the SSO config file to Sangfor device.

Go to System > SSL VPN Options > General > SSO page and click Browse under Upload

SSO Config File section to select desired SSO config file, and then click Upload to upload it to the device, as shown below:

363

SANGFOR SSL M7.5 User Manual

8. Navigate to SSL VPN > Roles > Role Management to add a role and associate it with the user ssl1 created in step2 and the resource RXT created in step3(for detailed guide, refer to

Adding Role in Chapter 4).

9. After user ssl1 logs in to SSL VPN, click Settings on the upper right of the page to modify the RTX account(for example, modify username to your real name xxl1, password to your work number).

364

SANGFOR SSL M7.5 User Manual

10. Back to Resource page and click on the resource link, then user can log in RTX automatically.

SSO feature has two login methods: Auto fill in form and Set auto-access request. The SSO feature with Auto fill in form as login method applies to web app, TCP app, all B/S-based and C/S-based L3VPN app, while SSO feature with Set auto-access request as login method supports web app, TCP app, HTTP-based and HTTPS-based L3VPN app.

Remote application only supports the SSO feature with Auto fill in form as login method

Configuration Case of Accessing SSL VPN through PPTP

One customer wants to access internal network through SSL VPN by using browser of their own iPhone, iPad or Android mobile phones, that is, realize mobile office by using mobile phones.

Since internal BBS system of the customer is written by JSP, systems are rather complex, a lot of scripts and controls are used, therefore WEB application is not applicable, L3VPN is a better choice.

365

SANGFOR SSL M7.5 User Manual

Configurations are as follows:

Configurations of SSL

Step 1: Navigate to System > SSL VPN Options > General > Login, select Permit PPTP

incoming connection, as shown below:

Step 2: Navigate to SSL VPN > Policy Sets, click Add to add policy set and to enter the Add

366

SANGFOR SSL M7.5 User Manual

Policy Set page. Select Permit PPTP/L2TP incoming connection, as shown below:

Step 3: Navigate to SSL VPN > Users, Click Add > Group to enter the Add User Group Page.

Associate policy sets in Attribute of use/user group which get connected through PPTP.

367

SANGFOR SSL M7.5 User Manual

Step 4: Navigate to SSL VPN > Resources, click Add > L3VPN to enter the Edit L3VPN page.

Add resources to be accessed by using PPTP.

Step 5: Navigate to SSL VPN > Roles. On the Role Management page, click Add > Role to enter the Add Role page, and associate user/user group and resources.

368

SANGFOR SSL M7.5 User Manual

PPTP Client Access Configuration:

Here is an example of one user who uses iphone to configure PPTP access resources:

Log in to SSL VPN through browser of the iphone, as shown below:

Note: Resources marked with is L3VPN and should be accessed by using PPTP.

1. Click Access SSLVPN Through PPTP. Access tips pop up. Install description file to mobile phone.

369

SANGFOR SSL M7.5 User Manual

2. Set PPTP VPN login. Go back to iphone homepage, and go to Settings as follows:

3. VPN switch turns green after connection. A small icon VPN shows on the upper left. Then you can access internal network applications through browser or application program.

4. When you want to exit PPTP VPN, switch off VPN option. Next time you can directly get connected to PPTP VPN to access resources.

370

SANGFOR SSL M7.5 User Manual

5. Remember PPTP login password. Go to General > Network > VPN and click the blue arrow, as shown below:

Enter password in Password and click Save. You do not have to enter password again for later connections.

PPTP configuration is completed. You can use your mobile phone to access BBS.

371

SANGFOR SSL M7.5 User Manual

When SSL device is deployed in single-arm mode, the following is required: (1) TCP

80 and Port 443 connected by SSL users should be mapped, TCP 1723 port should also be mapped. (2) PPTP data package can penetrate front-end device, and also protocol 47 can penetrate front-end device.

Applications accessed through PPTP should be added as L3VPN resources. If the application can be accessed through WEB, then the application can directly get connected to

SSL VPN without building PPTP connections.

Telecom operators in some districts (For example, Beijing Unicom) will block PPTP of

3G network. If, after deployment, you can get accessed through wifi , but not through 3G, it is probable that operators have blocked.

When PPTP fails to get connected, make sure whether devices from local network to

SSL support PPTP penetration. For example, TP-link supports 32 PPTP penetrations,

D-Link does not support PPTP penetration, and Tenda supports PPTP penetration.

Configuration Case of Accessing SSL VPN through L2TP

Internal network in headquarter has DNS. One customer wants to access SSL through L2TP on mobile endpoints, access internal network with domain account, and realize mobile office on mobile endpoints.

372

SANGFOR SSL M7.5 User Manual

Configurations are as follows:

Configuration of SSL:

Step 1: Navigate to System > SSL VPN Options > General > Login, select Permit L2TP

incoming connection and set L2TP Shared Secret, as shown below:

Step 2: Navigate to SSL VPN > Authentication. Click Settings after LDAP. On LDAP Server

373

page click Add to add LDAP server, as shown below:

SANGFOR SSL M7.5 User Manual

Other Attributes > Group Mapping. Add group mapping as below:

Step 3: Navigate to SSL VPN > Authentication, click Settings after Client-Side Domain SSO, and add SSL device to AD domain. Configuration page is shown as below:

374

SANGFOR SSL M7.5 User Manual

Step 4: Navigate to SSL VPN > Policy Sets. On the Policy Set Management page, click Add >

Policy set to enter the Add Policy Set page, and select Permit PPTP/L2TP incoming

connection, as shown below:

Step 5: Navigate to SSL VPN > Users to enter the Local Users page. Associate policy sets in

Attribute of use/user group which get connected through L2TP.

375

SANGFOR SSL M7.5 User Manual

Step 6: Navigate to SSL VPN > Resources and click Add > L3VPN to add resources accessed by using L2TP.

Step 7: Navigate to SSL VPN > Roles and click Add > Roles to associate user/user group and resources.

L2TP Client Access Configuration

Here is an example of one user who uses iphone to configure L2TP access resources:

Go to Settings > General > VPN, click Add VPN Configuration, as shown below:

376

SANGFOR SSL M7.5 User Manual

Description: Enter name of VPN connection.

Server: Enter public network address of SSL.

Account: Enter username to access SSL. If it is AD domain authentication, then enter domain username.

Password: Enter password to access SSL.

Secret: The same as L2TP shared secret of SSL.

When SSL device is deployed in single-arm mode, the following is required: (1) TCP

80 and Port 443 connected by SSL users should be mapped, UDP 500, UDP 4500 and

UDP1701 should also be mapped. (2) L2TP data package can penetrate front-end device.

Applications accessed through L2TP should be added as L3VPN resources. If the application can be accessed through WEB, then the application can directly get connected to

SSL VPN without building PPTP connection.

377

SANGFOR SSL M7.5 User Manual

Telecom operators in some districts (For example, Beijing Unicom) will block L2TP of

3G network. If, after deployment, you can get accessed through wifi , but not through 3G, it is probable that operators have blocked.

L2TP connection service is enabled, standard IPSec VPN service of SSL can not be used, but SANGFOR VPN still works.

Mobile Users Accessing SSL VPN

Remote desktop and remote application are accessible over SSL VPN on mobile device, such as iPhone, iPad and Android devices. Taking Android mobile device as example, this section introduces how to use EasyConnect to login and access remote resources.

1. Download EasyConnect from Google Store and install it. Launch it, and you will see the figure as shown in Figure 1 .

2. Enter URL to the Sangfor device and click Connect button. Then you need to be authenticated before logging in to VPN, as shown in Figure 2. You can click on Account tab to provide username and password, or click on Certificate tab to use certificate to log in to

SSL VPN.

3. After logging in to SSL VPN, if user is associated with L3VPN resource, a prompt dialog appears, as shown in Figure 3. Check I trust this application option and VPN connection will be established. To view connection status, click the EasyConnet logo shown at system status toolbar, as shown in Figure 4.

378

SANGFOR SSL M7.5 User Manual

Figure1 Figure2

Figure 3 Figure 4

After VPN connection is set up, user can access L3VPN resource using other programs. If he/she does not set up VPN connection, L3VPN resource cannot be accessed, while Web app, TCP pp and remote app are accessible.

379

SANGFOR SSL M7.5 User Manual

Authorized resources will be shown on the right pane of the Resource page. Click on the icon to change the method to display the resources, as shown in Figure 5, Figure6.

Figure 5 Icon Mode Figure 6 List Mode

To add the desired resource into Favorites, click Edit to enter the following page, as shown in

Figure 7. Click on the golden star icon next to that resource and click Finish to exit editing page. Then the corresponding resource will be added into Favorites list, as shown in Figure 8.

380

SANGFOR SSL M7.5 User Manual

Figure 7 Figure 8

To view accessible personal cloud, public cloud and local storage of mobile device, click Files to enter the Files page, as shown in Figure 9.

Figure 9 Figure 10

To operate a desired file, for example, Personal Cloud, click the arrow icon next to that file

381

SANGFOR SSL M7.5 User Manual to enter the Personal Cloud page as shown in Figure 10.

To open the selected file remotely, click Open to open that file using the application program on remote application server.

To download and open a specified file, click Down &Open to download that file onto mobile device and open it with default application program installed on mobile device.

To download the selected file, click Down to download it to mobile device and that file will be saved into local directory. You can also see that file by clicking Local in Figure 9.

To remove a specific file, click Delete.

To operate multiple files simultaneously, click Edit on the upper right. You will see the page, as shown in Figure 12.

Figure 11 Figure 12

Take the remote application office2003_Word_x86 shown in Figure 7 as example. Open it and you will see a floating toolbar. Tool icons are listed on the toolbar, namely, cursor, magnifier, keyboard, navigation, program list, menu and a button to hide toolbar.

Private directory and public directory, as well as local storage are available to this remote application. Camera installed on mobile device can be invoked in this remote application.

The new photos can be uploaded to remote application. You can choose image quality when uploading image, as shown in Figure 13. You can also share it on EasyConnect through the built-in sharing feature of mobile device. After clicking on Share, you need to specify a directory on remote storage server to save the image. Then you can insert that image into the previously-opened Word document.

382

Figure 13

SANGFOR SSL M7.5 User Manual

383

SANGFOR SSL M7.5 User Manual

Application for IOS MDM Certificate

A .pem

file and a .p12 file should be imported. The .p12 certificate can be provided by Sangfor, but the .pem file should be applied for it.

Application for .Pem file:

Step 1: Log in to https://identity.apple.com/pushcert/ with Apple ID, as shown below:

Step 2: To cerate a certificate application, click Create a Certificate, as shown below:

384

SANGFOR SSL M7.5 User Manual

Step 3: Upload your Certificate Signing Request. Upload sangfor_signed_csr file (Contact

Sangfor Customer Service), and click Upload as shown below:

385

SANGFOR SSL M7.5 User Manual

Step 4: MDM push certificate is applied successfully after Certificate Signing Request is uploaded.

Click Download to complete MDM certificate application.

Step 5: Navigate to SSL VPN > EMM > Mobile Devices to enter the Mobile Devices page. Click

Settings > Import MDM Certificate to import MDM certificate, as shown below:

1. MDM certificate remains valid for one year.

2. When MDM certificate expires, it should be renewed. Use Apple ID to log in to https://identity.apple.com/pushcert/ and you can view previously applied certificate. Click

Renew, contact SANGFOR technical support to obtain a new sangfor_signed_csr file, and follow the above steps to apply for a new .pem file.

386

SANGFOR SSL M7.5 User Manual

EMM Configuration Case

EMM of SSL functions to register mobile devices, manage and deliver messages, strengthen password security for mobile devices, notify admin to lock and erase data when mobile devices are lost, and protect resources security.

The configurations are as follows:

Step1: Navigate to System > System > Licensing. Click Modify to enable EMM License, as shown below:

Step 2: Navigate to SSL VPN > EMM > MDM Policy to enter the MDM Policy page. Add

Android or iOS MDM Policy or edit default ones, as shown below:

Step 3: Navigate to SSL VPN > EMM > Mobile Devices to enter the Mobile Devices page. Click

Settings to select Enabled, enter VPN address, and click Import MDM Certificate to import

IOS MDM Certificate, as shown below:

387

SANGFOR SSL M7.5 User Manual

1. If SSL is deployed in internal network, then port 441 should be mapped to SSL on public network devices.

2. IOS MDM certificate must be imported, otherwise IOS device can not be registered successfully.

Step 4: Navigate to SSL VPN > Policy Sets to enter the Policy Set Management page. Click

Add > Policy Set to enter the Add Policy Set page. Click EMM, select Allow mobile device to

register, and select default policy for Android device or for iOS device correspondingly, as shown below.

Step 5: Navigate to SSL VPN > Users to enter the Local Users page. Click Add > Group to enter the Add User Group page. Associate policy sets for user or user group under Policy Set, as

388

SANGFOR SSL M7.5 User Manual shown below:

Step 6: When you use mobile endpoints to log in to SSL through EC, your registration information will be submitted automatically and you will get logged in.

Configuring Firewall Rule

Configuring LAN<->VPN Filter Rules

Background:

 The branch (172.16.1.0/24) has established VPN connection with the Headquarters.

 There is a server (192.168.10.20) located at Headquarters, providing Web service and SQL

SERVER service.

Purpose:

 Only the IP range 172.16.1.100-172.16.1.200 on the LAN subnet of the branch can access the

Web service provided by the server 192.168.10.20.

 IP range 172.16.1.100-172.16.1.200 cannot access the SQL Server service provided by the same server 192.168.10.20.

To achieve the expected purposes:

1. Navigate to Firewall > Services to define the SQL Server service.

389

SANGFOR SSL M7.5 User Manual

2. Navigate to Firewall > IP Group to define two IP groups, as shown below:

390

3. Configure the filter rule for Web service, as shown below:

SANGFOR SSL M7.5 User Manual

4. Configure the filter rule for SQL Server service, as shown below:

391

SANGFOR SSL M7.5 User Manual

To implement control over HQ employees’ access to other services provided by the branch or over branch employees’ Internet access through HQ, configure the corresponding filter rules to filter data sent between two interfaces.

Adding SNAT Rule

Background:

 The Sangfor device located at Headquarters is deployed in Route mode.

 The branch has established VPN connection with the Headquarters.

Purpose:

Configure a SNAT rule on the Sangfor device located at headquarters, so that users from branch

(172.16.10.0/24) can access Internet after connecting to Headquarters through VPN connection.

392

Network Topology:

SANGFOR SSL M7.5 User Manual

To achieve the expected purpose:

1. Navigate to Firewall > NAT > SNAT Rule, and click Add to enter the Edit DNAT Rule page, as shown below:

393

SANGFOR SSL M7.5 User Manual

Adding DNAT Rule

Background:

There is a LAN server (IP address: 192.168.10.20) providing Web service through the port 80.

Purpose:

Configure a DNAT rule to publish the Web service to the Internet on port 80, so that Internet users can access the Web service.

To achieve the expected purpose:

1. Click Add to enter the Edit DNAT Rule page, as shown below:

2. Configure the DNAT rule as shown in the figure above.

3. Click the Save buttons to save the settings.

After the above configurations are saved, Internet users can access the Web service by accessing the WAN interface of the Sangfor device.

394

SANGFOR SSL M7.5 User Manual

To have the LAN server accessed by Internet users through configuring DNAT rules on the

Sangfor device, the Sangfor device must act as gateway of the LAN computers or router to external network; otherwise, the DNAT rule will not work.

395

SANGFOR SSL M7.5 User Manual

Typical Case Study

Required Environment

Background:

Sangfor device is deployed in Gateway mode and connected to Internet directly.

Purpose:

Mobile employees can access internal FTP server over SSL VPN and log in to SSL VPN automatically after their mobile device starts up.

Network Topology:

Configuration steps:

1. Deploy and connect related device as shown in the above network topology.

2. Create SSL VPN user and the resource which will be accessed by mobile users

3. Configure Sangfor device to enable user to log in SSL VPN automatically after mobile device starts up

Configuring Sangfor Device

1. Turn on the PC and Sangfor device. Use Ethernet cable to connect LAN interface (ETH0) of the device to the internal network(LAN). Add an IP address on the PC, an IP address that

396

SANGFOR SSL M7.5 User Manual resides in the network segment 10.254.254.X (for instance, 10.254.254.100) with subnet mask 255.255.255.0, as shown below:

2. Open the IE browser and enter the SSL VPN address and HTTPS port

( https://10.254.254.254:4430 ) into the address bar. Press Enter key to visit the login page to SSL

VPN administrator Web console, as shown below:

3. Navigate to System > Network > Deployment, select Gateway as Deployment Mode and configure LAN interface, as shown below:

397

SANGFOR SSL M7.5 User Manual

Internet line will be displayed under External Interfaces section and click corresponding line to configure it, as shown in the figure below:

4. Add a SNAT rule on the Firewall > NAT > SNAT Rule page, as shown below:

398

SANGFOR SSL M7.5 User Manual

5. Go to System > SSL VPN Options > General > Login page to specify HTTP port and

HTTPS port and configure WebAgent, as shown below:

399

SANGFOR SSL M7.5 User Manual

Port 443 is default HTTPS port. If it is modified, you need to append it following the URL of

Sangfor device when accessing SSL login page. Do not modify it unless necessary.

If Sangfor device has no fixed public IP address, you can use WebAgent to discover IP address.

6. Go to System > SSL VPN Options > General > Client Options page to configure related options for this scenario, as shown in the figure below:

7. Go to SSL VPN > Users > Local Users and click Add > User to add a user named test1, as shown below:

400

SANGFOR SSL M7.5 User Manual

8. Add a TCP app, named FTP, on SSL VPN > Resources page, as shown below:

9. Go to SSL VPN > Roles > Role Management page to create a role and associate it with the user test1 created in step 7 and the TCP resource created in step 8(for detailed guide, refer to

Adding Role in Chapter 4).

10. Click Save to save all the changes and click Apply button to apply the settings.

11. After user test1 logs in to SSL VPN, he/she will see the following resource page:

401

SANGFOR SSL M7.5 User Manual

To access FTP server, click on the FTP link.

12. Right-click on VPN client logo and click System Settings and select related options, as shown below:

13. Click Save to save the changes.

402

SANGFOR SSL M7.5 User Manual

Appendix A: End Users Accessing SSL VPN

This section introduces how end users configure browser and log in to SSL VPN.

Required Environment

 End user’s computer can connect to the Internet.

 No security assistant software is installed on the computer, because this kind of software may influence the use of SSL VPN.

 Any mainstream browser is installed on the computer, such as, Internet Explorer (IE), Opera,

Firefox, Sarafi, Chrome, etc.

Operating systems should be 32bit/64bit Windows XP/2003/Vista/Win7, 32bit Linux Ubuntu

11.04/RedHat 5.2/RedFlag/Fedora 13/SUSE 11.2, or Mac OS X Leopard(10.5) /Snow

Leopard(10.6)/Lion(10.7).

SSL VPN client is available on iPhone and Android mobile phones.

Configuring Browser and Accessing SSL VPN

Configuring Browser

The following configuration takes Windows XP IE browser for example. Screenshots may vary with different operating systems.

1. Launch the IE browser and go to Tools > Internet Options to configure the IE browser, as shown in the figure below:

403

SANGFOR SSL M7.5 User Manual

2. Click Advanced tab. Find the Security item and select the checkboxes next to Use SSL 2.0, and Use TLS 1.0, as shown in the figure below:

3. Enter the SSL VPN address into the address bar of the browser and visit the login page to

SSL VPN.

404

SANGFOR SSL M7.5 User Manual

4. When you visit the login page, a security alert may appear, requiring installation of security certificate, as shown in the figure below:

5. Click the View Certificate button to complete installing the root certificate if this is the first time you log in to SSL VPN administrator Web console. The information of the root certificate is as shown below:

6. Click the Install Certificate button and use the Certificate Import Wizard to import the root certificate, as shown in the figure below:

405

SANGFOR SSL M7.5 User Manual

7. Select a directory to store the certificate and click the Next button. After confirming the settings and clicking the Finish button, another warning pops up asking whether to install the certificate, as shown in the figure below:

8. Click the Yes button to ignore the warning and the root certificate will be installed, as shown in the figure below:

Generally, root certificate is required to be installed when you logs in to the SSL VPN for the first time. Once root certificate is installed, you need only click the Yes button next time when logging in and see the security alert.

406

SANGFOR SSL M7.5 User Manual

Using Account to Log In to SSL VPN

If root certificate has been installed, user can visit the login page to the SSL VPN. The login page is as shown in the figure below:

1. Enter and submit the required credentials through the login page. The following are the contents included on the login page:

Username, Password: Enter the username and password of the SSL VPN account to connecting to the SSL VPN.

Verification: Enter the word on the picture. Word verification feature adds security to

SSL VPN access and could be enabled by administrator manually, or activated automatically when brute-force login attempt is detected.

Use Certificate: A login method that enables user to use certificate to go through the user authentication. The certificate should have been imported to the IE browser manually.

Use USB Key: A login method that enables user to use USB key to go through the user authentication. There are two types of USB keys, one type has driver and the other type is driver free.

User using USB key to get authenticated may need to install the USB key driver. For detailed guide, please refer to the SSL VPN Users section in Chapter 4.

2. Once user passes the required primary and secondary authentications, he/she will enter the

Resource page, as shown in the figure below:

407

SANGFOR SSL M7.5 User Manual

3. All the resources or groups associated with the connecting user will be displayed on the

Resource page. Click on any of the links to access the corresponding resource.

For Web application resources, user can access them simply by clicking on the resource link.

For C/S applications that cannot be accessed through browser, user can start the SSL VPN

Client program (under Start > Programs > SSL VPN Client) and access the application by entering IP address of the server, as if user’s PC resides in the enterprise network.

4. TCP and L3VPN components will be installed automatically when user accesses associated

TCP resource or L3VPN resource.

5. To log out of the SSL VPN, click Log Out at the upper right of the page. Once user logs out, he/she cannot access the internal resources any more.

6. To modify password of the SSL VPN account, click Settings at the upper right of the page to enter the User Account page, as shown in the figure below:

408

SANGFOR SSL M7.5 User Manual

As shown above, the current password is followed by Modify. Click it to enter the Modify

Password page, as shown below:

If user keeps inactive for a long time during SSL VPN access, without performing any operation or accessing any resource, user will be disconnected and log out automatically.

The contents shown in Settings are related with SSL VPN configurations. Those contents will be taken valid.

Using USB Key to Log In to SSL VPN

User login using USB key is a bit different from that using account.

409

SANGFOR SSL M7.5 User Manual

Main differences are the login process and login page. User should perform the following:

1. Launch the browser and visit the login page to the SSL VPN.

2. Insert the USB key into the USB port of the computer.

3. Select other login method Use USB Key to enter the next page that asks for PIN of the USB key.

4. Enter PIN of the USB key and login process completes.

5. To modify PIN of the USB key, click Settings at the upper right of the Resource page to enter User Account page, as shown below:

Click Modify to enter the Edit USB Key PIN page, enter the current PIN and the new PIN and click the Save button, as shown below:

Using VPN Client to Log In SSL VPN

SSL VPN client components will be installed automatically when user logs in SSL VPN through

IE browser. On System > SSL VPN Options > Client Options page, you can enable client software installer to be installed automatically or manually when required. If Manually corresponding to the Install Client Software Installer when required option is selected on the

Sangfor device, the following page will pop up when user logs in VPN, as shown below:

410

SANGFOR SSL M7.5 User Manual

Click Download Add-on, a dialog appears, as shown below:

To install it, click Run. You will see the following installation page.

After software installer is installed, navigate to Start > Programs and you will see the following directory, as shown below:

411

SANGFOR SSL M7.5 User Manual

Please terminate firewall and antivirus software when installing client software installer; otherwise, the client will fail to be installed.

1. Click Start EasyConnect to open the SSL VPN client window, as shown below:

2. Enter the address of SSL VPN and click Connect, the following dialog appears.

For authentication based on username and password, select Account. The Account tab is as

412

shown in the figure below:

SANGFOR SSL M7.5 User Manual

User can select Remember me and Auto login options if required, then he/she does not need to enter these information upon next login. The two options are available only when they are enabled on the device(for details, refer to Client Options in Chapter 3).

For authentication based on certificate, select Certificate. The Certificate tab is as shown in the figure below:

For authentication based on USB key, select USB Key. The USB-KEY tab is as shown below:

413

SANGFOR SSL M7.5 User Manual

To create SSL VPN user, refer to Adding User in Chapter 4.

3. Select an authentication method as per your case. After logging in, a prompt dialog appears, as shown below:

If system tray is enabled when configuring Client Options on Sangfor device, the VPN client logo will be shown on the lower-right corner of the desktop. Put the cursor on it, you can see the connection status and VPN flow speed, as shown below:

To view VPN connection status and configure VPN-related settings , right-click on the System

Tray icon and you will see the following floating window, as shown below

414

415

SANGFOR SSL M7.5 User Manual

SANGFOR SSL M7.5 User Manual

Appendix B: Sangfor Firmware Updater 6.0

Sangfor Firmware Updater 6.0 is intended to update version and restore configurations of any

Sangfor device, IAM, SSL VPN, WANO, AD. Compared to the previous version 5.0, Firmware

Updater v6.0 is improved on the following:

1. Simplified update process

Firmware Updater v6.0 works as an update wizard, support online update feature that helps search for updates and analyze versions of available updates for the connected Sangfor device in the local area network.

Using online update method to update Sangfor device, network administrators need not handle some troubles such as preparing Sangfor device, checking current version of their

Sangfor device, downloading update package, etc., but only choose an available version and click buttons.

In addition to online update, administrators can browse and upload an existing package from the computer to update the Sangfor device manually or restore the configurations if the configuration is backed up previously.

2. The program file that can launch Sangfor Firmware Updater is included in a compressed file and available once the compressed file is decompressed, without being installed on the computer.

Updating Your Sangfor Device

1. Download the SANGFOR-Updater6.0.zip file from the Sangfor official website.

2. Double-click the executive file SANGFOR Firmware Updater.exe, and then specify or search for the Sangfor device that you want to connect to and update, as shown below:

416

SANGFOR SSL M7.5 User Manual

The following are the contents included on the above page:

IP Address: Enter the LAN interface IP address of the Sangfor device that you want to connect to and update. IP:Port format is supported.

Password: Enter the password for connecting to the Sangfor device specified above.

The default password is dlanrecover (case-sensitive), or password of the default administrator account ( Admin or admin) for connecting to the administrator console.

Remember password: Select this option to remember the password so that the password need not be entered once again when you connect to this device via Sangfor

Firmware Updater next time.

Search: Click this button to search for Sangfor devices in the local area network. If any

Sangfor device is found, it will be displayed on Select Device page, as shown below:

417

SANGFOR SSL M7.5 User Manual

3. Click the Options button to configure Package Deletion option and network related settings, as shown below:

The following are the contents included on the Options page:

Preserve downloaded package(s) for future use: Select this option and the previously downloaded packages (in Download folder) will be preserved and can be used for future update or configuration restoring.

To open Download folder and view the downloaded package(s), click the View button.

To delete all the downloaded packages in Download folder, click the Clear button.

Update Server: Select an update server, Shenzhen or Shanghai, which will always be used to get updates, or select Auto-Select to have the system select update server every time. This option only works when update method is online update.

Get updates using the HTTP proxy server below: To specify a HTTP proxy server to get updates for the connected Sangfor device, select this option and enter the IP address and port of the HTTP proxy server in the IP Address and Port fields respectively.

Require authentication: To have the HTTP proxy server require authentication, select this option and enter the username and password into the Username and Password fields respectively.

4. Click the Connect button to connect to the specified Sangfor device and select Online

update method or Load package from Disk, as shown in the figure below:

418

SANGFOR SSL M7.5 User Manual

Under Current Device are the version information (e.g., M5.2 of SSL VPN) and IP address

(e.g., 10.111.111.2) of the currently connected Sangfor device.

Under Update Method are two options, Online update and Load package from Disk. The former is the previously mentioned feature that can automatically get updates for the connected Sangfor device, and the latter enables administrator to choose a package to update the current device or restore the configurations on the current Sangfor device with those contained in the chosen package.

Currently, online update only supports update of version SSL M5.0 and above. For update of lower versions and other series of Sangfor devices, please select the update method Load

package from Disk.

5. Search for newer version and download update package, or load package.

 Select new version and download package. It happens when method is Online update.

a. Click the Select button and the firmware updater will check for updates. After updates checking and analyzing, the available and updatable version(s) are displayed on the Select Version page, as shown in the figure below:

419

SANGFOR SSL M7.5 User Manual b. Select the checkbox next to a version and click the OK button to close this page.

c. Click the Next button to download package of the selected version. The download process is as shown in the figure below:

To stop downloading the package, click the Pause button which will then turn to a

Resume button.

To cancel downloading the package, click the Cancel button.

d. While package download is completed, click the Next button to confirm version information and update the current device, as shown in the figure below:

420

SANGFOR SSL M7.5 User Manual

 Load update package. It happens when update method is Load package from Disk.

Browse a package from local PC, click the Open button and Next button, as shown below:

6. Confirm the update information and click the Update button to update the current Sangfor device, as shown in the figure below:

421

SANGFOR SSL M7.5 User Manual

For online update, it is required that the computer connected to Sangfor device can access

Internet.

Please DO NOT cancel updating during the update process. Otherwise, the current device will meet unexpected error.

Sangfor device can only be updated to a newer version from lower version. Cross-version update is not supported.

Update operation has potential risk for misoperation will damage the device. Do not perform update by yourself. If necessary, contact Custom Service.

422

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents