Configuring Secure Access Client To Work With Non-Administrative Users; Connecting From A Public Computer; Connections Using Kiosk Mode - Watchguard SSL 1000 User Manual

Vpn gateway
Hide thumbs Also See for SSL 1000:
Table of Contents

Advertisement

Connecting from a Public Computer

Configuring Secure Access Client to Work with Non-Administrative Users

If a user is not logged on as an administrator on a computer running Windows 2000 Professional, the
Secure Access Client must be installed locally on the client computer and then started using the Web
address of https://FQDN/ WatchGuardsaclient.exe, where FQDN is the address of the Firebox SSL VPN
Gateway. The ActiveX applet does not have the rights to download and install the file. Clients who are
logged on as non-administrators using Windows 2003 Server or Windows XP are able to download and
install the ActiveX applet.
For a user who is not logged on as an administrator and connects using the Secure Access Client, appli-
cations such as Microsoft Outlook might occasionally lose the network connection.
Connecting from a Public Computer

Connections Using Kiosk Mode

The Firebox SSL VPN Gateway provides secure access to a corporate network from a public computer
using kiosk mode. When users select A public computer on the WatchGuard portal page, a Web
browser opens. The user logs on and then can access applications provided in the browser window.
By default, kiosk mode is disabled. When kiosk mode is disabled, users do not see the A public com-
puter option on the portal page and the Firebox SSL VPN Gateway does not provide any kiosk mode
functionality.
For computers running Java virtual machine (JVM 1.5) or higher (such as Macintosh, Windows 95, or
Windows 98 computers), kiosk mode is available through a Java applet. For Macintosh computers to
support kiosk mode, the Safari browser and JRE 1.5 must be installed.
When the user is logged on using kiosk mode, the Firebox SSL VPN Gateway sends images only (no
data) over the connection. As a result, there is no risk of leaving temporary files or cookies on the public
computer. Both temporary files and cookies for the session are maintained on the Firebox SSL VPN Gate-
way.
The browser defaults to a Web address that is configured per group through the Administration Tool.
The Web browser window can also include icons for Remote Desktop, SSH, Telnet 3270 emulator, Gaim
instant messenging, and VNC clients. The icons are displayed in the bottom-left corner of the window.
The applications are specified for each group. For more information about configuring applications for
kiosk mode, see "Creating a Kiosk Mode Resource" on page 127.
The Web browser window also provides access to shared network drives. The Firebox SSL VPN Gateway
administrator configures the permissions granted (read-only or read/write) to each shared network
drive. For more information about configuring network shares, see "Configuring file share resources" on
page 102.
Users can copy files from the network share to their computer simply by dragging the file onto the
KioskFTP icon and selecting the destination in the File Download dialog box.
Important: End point policies are not supported or enforced when users are logged on using kiosk
mode.
Kiosk mode can include the following applications if they are enabled on the User Groups tab in the
Administration Tool:
126
Note
Firebox SSL VPN Gateway

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ssl 500Firebox ssl series

Table of Contents