You must configure traffic policies for both split tunneling and full tunneling in your organization in
order to permit access to specific internal hosts as well as prevent a hacker from controlling the
machine via a connection external to the tunnel. The split tunneling policies must be ordered at the
top of the policy list and the full tunneling policy must be placed as the last policy.
Section 3.4.1, "Creating a Full Tunneling Policy," on page 51
Section 3.4.2, "Modifying Existing Traffic Policies for Full Tunneling," on page 52
3.4.1 Creating a Full Tunneling Policy
1 In the Administration Console, click Devices > SSL VPNs > Edit.
2 Click New to create a new traffic policy.
3 Specify a name for the traffic policy.
4 Select Enable Full Tunneling.
5 Select Encrypt to allow the service in encrypted form or select Deny to deny services
6 Click OK.
7 Select Gateway Configuration from the Basic Gateway Configuration section.
Configuring End-Point Security and Access Policies for SSL VPN
51
Need help?
Do you have a question about the ACCESS MANAGER 3.1 SP2 - SSL VPN SERVER GUIDE 2010 and is the answer not in the manual?