GlobalProtect Portals Clientless VPN Tab
- NetworkGlobalProtectPortals<portal-config>Clientless VPN
GlobalProtect Portal Clientless Configuration Settings
Select Clientless VPN to specify general information about the Clientless VPN session:
The IP address or FQDN for the GlobalProtect portal that hosts the web applications landing page. The GlobalProtect Clientless VPN rewrites application URLs with this hostname.
If you use Network Address Translation (NAT) to provide access to the GlobalProtect portal, the IP address or FQDN you enter must match (or resolve to) the NAT IP address for the GlobalProtect portal (the public IP address).
The zone for the Clientless VPN configuration. Security rules defined in this zone control which applications users can access.
The DNS server that resolves application names. Select a DNS proxy server or configure a New DNS Proxy (Network > DNS Proxy).
The number of Minutes (range is 60 to 1,440) or Hours (range is 1 to 24; default is 3) that a clientless SSL VPN session is valid. After the specified time, users must re-authenticate and start a new clientless VPN session.
The number of Minutes (range is 5 to 1,440; default is 30) or Hours (range is 1 to 24) that a clientless SSL VPN session can remain idle. If there is no user activity during the specified amount of time, the user must re-authenticate and start a new clientless VPN session.
The maximum numbers of users that can be logged into the portal at the same time (default is 10; range is 1 to no maximum). When the maximum number of users is reached, additional clientless VPN users cannot log in to the portal.
Applications to User Mapping
Add one or more Applications to User Mapping to match users with published applications. This mapping controls which users or user groups can use a clientless VPN to access applications. You must define the applications and application groups before mapping them to users (Network > GlobalProtect > Clientless Apps and Network > GlobalProtect > Clientless App Groups).
You can Add individual users or user groups to which the current application configuration applies. These users have permission to launch the configured applications using a GlobalProtect clientless VPN.
You must configure group mapping (DeviceUser IdentificationGroup Mapping Settings) before you can select the groups.
In addition to users and groups, you can specify when these settings apply to the users or groups:
You can Add individual applications or application groups to the mapping. The Source Users you included in the configuration can use GlobalProtect clientless VPN to launch the applications you add.
|Crypto Settings tab|
Select the required minimum and maximum TLS/SSL versions. The higher the TLS version, the more secure the connection. Choices include SSLv3, TLSv1.0, TLSv1.1, or TLSv1.2.
Key Exchange Algorithms
Select the supported algorithm types for key exchange. Choices include RSA, Diffie-Hellman (DHE), or Elliptic Curve Ephemeral Diffie-Hellman (ECDHE).
Select the supported encryption algorithms. AES128 or higher is recommended.
Select the supported authentication algorithms. Choices are: MD5, SHA1, SHA256, or SHA384. SHA256 or higher is recommended.
Server Certificate Verification
Enable which actions to take for the following issues that can occur when an application presents a server certificate:
A label of up to 31 characters to identify the proxy server that the GlobalProtect portal uses to access published applications. The name is case-sensitive, must be unique, and can contain only letters, numbers, spaces, hyphens, and underscores.
Add the domains served by the proxy server.
Select to allow the GlobalProtect portal to use the proxy server to access the published applications.
Specify the hostname (or IP address) and port number of the proxy server.
Specify the username and password needed to log in to the proxy server. Enter the password again for verification.
|Advanced Settings tab|
Rewrite Exclude Domain List
(Optional) Add domain names, host names, or IP addresses to the Rewrite Exclude Domain List. The clientless VPN acts as a reverse proxy and modifies pages returned by the published applications. When a remote users accesses the URL, the requests go through the GlobalProtect portal. In some cases, the application may have pages that do not need to be accessed through the portal. Specify domains that should be excluded from rewrite rules and cannot be rewritten.
Paths are not supported in host and domain names. The wildcard character (*) for host and domain names can only appear at the beginning of the name (for example, *.etrade.com).
Configure Clientless VPN
Configure Clientless VPN To configure GlobalProtect Clientless VPN : Before you begin: Install a GlobalProtect subscription on the firewall that hosts the Clientless VPN from ...
Clientless VPN Overview
Clientless VPN Overview When you configure GlobalProtect Clientless VPN, remote users can log in to the GlobalProtect portal using a web browser and launch the ...
GlobalProtect Clientless VPN
GlobalProtect Clientless VPN GlobalProtect Clientless VPN provides secure remote access to common enterprise web applications. Users have the advantage of secure access from SSL-enabled web ...
Network > GlobalProtect > Clientless Apps
Network > GlobalProtect > Clientless Apps Select Network GlobalProtect Clientless Apps to add applications that are accessible through the GlobalProtect Clientless VPN. You can add ...
Network > GlobalProtect > Clientless App Groups
Network > GlobalProtect > Clientless App Groups Select Network GlobalProtect Clientless App Groups to group applications that are accessible through the GlobalProtect Clientless VPN. You ...
Troubleshoot Clientless VPN
Troubleshoot Clientless VPN Because this feature involves dynamic re-writing of HTML applications, the HTML content for some applications may not re-write correctly and break the ...
Supported Technologies You can configure the GlobalProtect portal to provide secure remote access to common enterprise web applications. For best results, make sure you throughly test your ...
Configure a Per-App VPN Configuration for iOS Endpoints Using AirWatch
Configure a Per-App VPN Configuration for iOS Endpoints Using AirWatch You can enable access to internal resources from your managed mobile endpoints by configuring GlobalProtect ...
Configure a GlobalProtect Gateway
Configure a GlobalProtect gateway to enforce security policies and provide VPN access for your users. ...