Sophos UTM. Remote Access via SSL. Configuring UTM and Client



Similar documents
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

SSL SSL VPN

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Sophos UTM. Remote Access via IPsec. Configuring UTM and Client

Sophos UTM. Remote Access via SSL Configuring Remote Client

If you have questions or find errors in the guide, please, contact us under the following address:

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Sophos UTM. Remote Access via PPTP Configuring Remote Client

Sophos UTM. Remote Access via IPsec Configuring Remote Client

Astaro User Portal: Getting Software and Certificates Astaro IPsec Client: Configuring the Client...14

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

Configuring GTA Firewalls for Remote Access

7.1. Remote Access Connection

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Configuring Global Protect SSL VPN with a user-defined port

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Clientless SSL VPN Users

Scenario: IPsec Remote-Access VPN Configuration

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. October

F-Secure Messaging Security Gateway. Deployment Guide

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

VPN Quick Configuration Guide. Astaro Security Gateway V8

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Application Note: Onsight Device VPN Configuration V1.1

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

VPN Wizard Default Settings and General Information

Sophos Mobile Control SaaS startup guide. Product version: 6

Chapter 5 Virtual Private Networking Using IPsec

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

DIGIPASS Authentication for Check Point Security Gateways

Pre-lab and In-class Laboratory Exercise 10 (L10)

Global VPN Client Getting Started Guide

How To Configure Apple ipad for Cyberoam L2TP

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

McAfee SMC Installation Guide 5.7. Security Management Center

VPN Configuration Guide WatchGuard Fireware XTM

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Secure IIS Web Server with SSL

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

NAS 323 Using Your NAS as a VPN Server

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Understanding the Cisco VPN Client

This chapter describes how to set up and manage VPN service in Mac OS X Server.

axsguard Gatekeeper IPsec XAUTH How To v1.6

MultiSite Manager. Setup Guide

MultiSite Manager. Setup Guide

How to configure VPN function on TP-LINK Routers

CTERA Agent for Mac OS-X

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Sophos Mobile Control Installation guide. Product version: 3.5

VPN: Using WebVPN SSL Client This document outlines the process for using the WebVPN SSL with Internet Explorer and Firefox

Chapter 6 Basic Virtual Private Networking

University of Central Florida UCF VPN User Guide UCF Service Desk

Setting Up Scan to SMB on TaskALFA series MFP s.

2X Cloud Portal v10.5

Chapter 12 Supporting Network Address Translation (NAT)

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

How To Industrial Networking

WestermoConnect User Guide. VPNeFree Service

Sophos Mobile Control Installation guide

Using a VPN with Niagara Systems. v0.3 6, July 2013

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

SSL VPN Portal Options

Citrix Access on SonicWALL SSL VPN

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

VPN: Using the WebVPN SSL Client

Virtual Data Centre. User Guide

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Setting up a Virtual Private Network (VPN) connection Windows 8

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

How to configure VPN function on TP-LINK Routers

How to configure your Windows PC post migrating to Microsoft Office 365

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Scenario: Remote-Access VPN Configuration

Zeroshell: VPN Host-to-Lan

BRIC VPN Setup Instructions

Djigzo S/MIME setup guide

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

SyncThru TM Web Admin Service Administrator Manual

Configuring SSL VPN on the Cisco ISA500 Security Appliance

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Configuring Security Features of Session Recording

NETASQ MIGRATING FROM V8 TO V9

GTA SSL Client & Browser Configuration

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Technical Brief ActiveSync Configuration for WatchGuard SSL 100

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

While every effort was made to verify the following information, no warranty of accuracy or usability is expressed or implied.

ez Agent Administrator s Guide

Using ipass Secure Anywhere. Secure Remote Access for Hallmark Independent Retailers

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

Administrator's Guide

Installing the Microsoft Network Driver Interface

Cisco QuickVPN Installation Tips for Windows Operating Systems

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE

Transcription:

Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013

The specifications and information in this document are subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. This document may not be copied or distributed by any means, in whole or in part, for any reason, without the express written permission of Astaro GmbH & Co. KG. Translations of this original manual must be marked as follows: "Translation of the original manual". 2000 2013 Astaro GmbH & Co. KG. All rights reserved. Amalienbadstraße 41/Bau 52, 76227 Karlsruhe, Germany http://www.sophos.com Sophos UTM, Sophos UTM Manager, Astaro Command Center, Astaro Gateway Manager, and WebAdmin are trademarks of Astaro GmbH & Co. KG. Cisco is a registered trademark of Cisco Systems Inc. ios is a trademark of Apple Inc. Linux is a trademark of Linus Torvalds. All further trademarks are the property of their respective owners. Limited Warranty No guarantee is given for the correctness of the information contained in this document. Please send any comments or corrections to nsg-docu@sophos.com.

Contents 1 Introduction 4 2 Configuring UTM 6 2.1 Defining a User Account 6 2.2 Configuring SSL Settings 7 2.3 Configuring Advanced SSL Settings 8 2.4 Creating Firewall and Masquerading Rules 10 2.4.1 Defining a Firewall Rule 10 2.4.2 Defining a Masquerading Rule 12 3 Configuring the Remote Client 14 3.1 Getting Software and Certificates 14 3.2 Installing the SSL VPN Client Software 15 3.3 Connecting to the VPN 18

1 Introduction 1 Introduction This guide describes step by step the configuration of a remote access to the UTM by using the Secure Sockets Layer (SSL) protocol. The SSL remote access feature in UTM provides security by a double authentication using X.509 certificates and username/password. Sophos' SSL VPN feature reuses the TCP port 443 to establish an encrypted tunnel to your company, allowing you to access internal resources. Sophos UTM eth0 eth1 https://ip address User Portal Sophos SSL Client Configuration files Keys Encrypted VPN tunnel Internet Road Warrior LAN Administrator Headquarters First, the system administrator configures the Sophos UTM to allow remote access. Additionally he enables the User Portal of the Sophos UTM for the remote access users. The User Portal offers the free Sophos SSL VPN Client software, including the configuration and necessary keys, and this configuration guide. Login data for the User Portal should be provided by the system administrator. The SSL VPN Client works on Microsoft Windows XP, Vista, and 7 operating systems. Additional information This guide contains complementary information on the Administration Guide and the Online Help. If you are not sure whether you have the current version of this guide, you can download it from the following Internet address: http://www.sophos.com/en-us/support/knowledgebase/b/2450/3100/5300.aspx If you have questions or find errors in the guide, please, contact us under the following e- mail address: nsg-docu@sophos.com For further help use our support forum under... http://www.astaro.org... or our knowledgebase under... http://www.sophos.com/en-us/support/knowledgebase/b/2450.aspx UTM 9 Remote Access via SSL 4

1 Introduction... or use the Sophos support offers: http://www.sophos.com/en-us/support/contact-support/utm-support.aspx 5 UTM 9 Remote Access via SSL

2 Configuring UTM 2 Configuring UTM The UTM is configured via the web-based WebAdmin configuration tool from the administration PC. Opening and using this configuration tool is extensively described in the UTM administration guide. 2.1 Defining a User Account First, you need to create a user account which is necessary for accessing the User Portal and for actually using the VPN connection. 1. Open the Definitions & Users > Users & Groups > Users tab. 2. Click the New User button. The Create New User dialog box opens. 3. Make the following settings: Username: Enter a specific username (e.g., gforeman). In doing so remember that the remote user will need this username later to log in to the User Portal. Real name: Enter the full name of the remote user (e.g., George Foreman). Email address: Enter the e-mail address of the user. When you specify an e-mail address, an X.509 certificate for this user will be generated automatically while creating the user account, using the e-mail address as the certificate's VPN ID. The certificate will be displayed on the Remote Access > Certificate Management > Certificates tab. Authentication: With the Local authentication method the following two fields will be displayed for the definition of the password. UTM 9 Remote Access via SSL 6

2 Configuring UTM Password: Enter the password for the user. In doing so remember that the remote user will need this password later to log in to the User Portal. Repeat: Confirm the password. Use static remote access IP: With a remote access via SSL it is not possible to assign a static IP address to the user. Leave this option deactivated if the user uses only the remote access via SSL. Comment (optional): Enter a description or additional information on the user. 4. Click Save. Your settings will be saved. Cross Reference More detailed information on the configuration of a user account and detailed explanations of the individual settings can be found in the UTM administration guide in chapter Definitions & Users. 2.2 Configuring SSL Settings This chapter describes how to enable SSL remote access, configuring basic settings and access control. 1. Open the Remote Access > SSL > Global tab. 2. Enable SSL. Enable SSL remote access by clicking the Enable button. The status icon turns amber and the page becomes editable. 3. Make the following settings: Select authorized users and assign access conditions. Users and groups: Select the users and user groups that should be able to use SSL remote access (in this example: gforeman). 7 UTM 9 Remote Access via SSL

2 Configuring UTM Local networks: Select the local networks that should be reachable to SSL clients (in this example: Internal (Network)). Note If you wish the SSL-connected users to be allowed to access the Internet, you need to select Any in the Local networks dialog box. Additionally, you need to define appropriate Masquerading or NAT rules. Automatic firewall rules: If selected, once the VPN tunnel is successfully established, the firewall rules for the data traffic will automatically be added. After the connection is terminated, the firewall rules are removed. If unselected, you need to define the firewall rules manually (see below). 4. Click Apply to save your settings. The status icon turns green. SSL remote access is active now. Cross Reference More detailed information on the configuration of a remote access and detailed explanations of the individual settings can be found in the UTM administration guide in chapter Remote Access. 2.3 Configuring Advanced SSL Settings 1. Open the Remote Access > SSL > Settings tab. UTM 9 Remote Access via SSL 8

2 Configuring UTM 2. In the Server Settings section, make the following settings: Interface address: Select the interface address that all SSL VPN clients must use. By default, Any is selected. When using the web application firewall you need to give a specific interface address for the service to listen for SSL connections. Protocol: Select the network protocol that all SSL VPN clients must use. By default, this is set to TCP. Port: Select the port that all SSL VPN clients must use. By default, this is set to 443. Override hostname: Leave this field empty if you want the gateway's hostname to be the target hostname for client VPN connections. Only enter another hostname if the gateway's hostname is not reachable via Internet. 3. Click Apply to save your settings. 4. In the Virtual IP Pool section, select a pool network: Pool network: The default settings assign addresses from the private IP space 10.242.2.x/24. This network is called the VPN Pool (SSL). If you wish to use a different network, simply change the definition of the VPN Pool (SSL) on the Definitions & Users > Network Definitions page. 5. Click Apply to save your settings. 6. Open the Remote Access > SSL > Advanced tab. 7. In the Cryptographic Settings section, make the following settings: This section controls the encryption parameters for all SSL VPN remote access clients. Encryption algorithm: Supported algorithms are (all in Cipher Block Chaining (CBC) mode): DES-EDE3 168bit (3DES), AES (Rijndael) 128bit/192bit/256bit, and Blowfish (BF). Authentication algorithm: Supported algorithms are MD5 128bit and SHA1 160bit. Key size: The key size (key length) is the length of the Diffie-Hellman key exchange. The longer this key is, the more secure the symmetric keys are. The length is specified in bits. You can choose between a key size of 1024 or 2048 bits. Server certificate: Select a local SSL certificate to be used by the SSL VPN server to identify itself against the clients (in this example: Local X.509 Cert this certificate is automatically preset). Key lifetime: Enter a time period after which the key will expire. The default is 28,800 seconds. 8. Click Apply to save your settings. 9. Optionally, turn traffic compression on. In the Compression Settings section, make the following settings. 10. Click Apply to save your settings. 11. Optionally, enable debug mode. In the Debug Settings section, if you select Enable debug mode, the PPTP daemon log file contains extended information about PPTP connection negotiation. 9 UTM 9 Remote Access via SSL

2 Configuring UTM 12. Click Apply to save your settings. 13. Open the Remote Access > Advanced page. This page allows you to define name servers (DNS and WINS) and the name service domain, which should be assigned to hosts during the connection establishment. 14. Click Apply to save your settings. 2.4 Creating Firewall and Masquerading Rules 2.4.1 Defining a Firewall Rule You need to define the following firewall rule if you have disabled the Automatic firewall rule function during the configuration of the SSL remote access. 1. Open the Network Protection > Firewall > Rules tab. 2. Click the New Rule button. The dialog box Create New Rule opens. UTM 9 Remote Access via SSL 10

2 Configuring UTM 3. Make the following settings: Sources: Add the remote host or user (in this example: gforeman). Services: Add the allowed services. Destinations: Add the allowed networks (in this example: Internal (Network)). For the remote user to be able to access Internet you should e.g. select the Internet or Any network definition. Action: Select Allow. 4. Click Save. The new firewall rule is added to the list and remains disabled (status icon shows red). 5. Enable the rule by clicking the status icon. The status icon turns green. 11 UTM 9 Remote Access via SSL

2 Configuring UTM Security Note Active rules are processed in the order of the numbers (next to the status icon) until the first matching rule. Then the following rules will be ignored! The sequence of the rules is thus very important. Therefore never place a rule such as Any Any Any Allow at the beginning of the rules since all traffic will be allowed through and the following rules ignored. Cross Reference More detailed information on the definition of Firewall rules and detailed explanations of the individual settings can be found in the UTM administration guide in chapter Network Protection. 2.4.2 Defining a Masquerading Rule Note This is an optional step depending on your environment. Masquerading is used to mask the IP addresses of one network (in this example: gforeman) with the IP address of a second network (e.g. External). Thus remote users who have only private IP addresses can e.g. surf on the Internet with an official IP address. Depending on your system configuration masquerading can also be necessary for other connection types. 1. Open the Network Protection > NAT > Masquerading tab. 2. Click the New Masquerading Rule button. 3. Make the following settings: Network: Select the network of the remote endpoint (in this example: gforeman). Interface: Select the interface that should be used to mask the clients (in this example: External). Use address: If the interface you selected has more than one IP address assigned, you can define here which IP address is to be used for masquerading. 4. Click Save. Your settings will be saved. The new masquerading rule is added at the end of the list and remains disabled (status icon shows red). UTM 9 Remote Access via SSL 12

2 Configuring UTM 5. Enable the rule by clicking the status icon. The status icon turns green. Cross Reference More detailed information on the definition of masquerading rules and detailed explanations of the individual settings can be found in the UTM administration guide in chapter Network Services. 6. Optionally, activate the proxies: If the remote employees should access URL services via the remote access you may configure the required proxies on the UTM this would be the DNS and HTTP proxy for example. Cross Reference More detailed information on the configuration of proxies and detailed explanations of the individual settings can be found in the UTM administration guide. 7. Open the Management > User Portal > Global tab. The User Portal needs to be activated for the remote access user. If the status icon is red, click the Enable button to enable the User Portal. 8. Select the networks that are allowed to access the User Portal. To the Allowed networks box, add the networks that should be allowed to access the User Portal (in this example: Any or the respective VPN Pool, or just gforeman). Cross Reference More detailed information on the configuration of the User Portal and detailed explanations of the individual settings can be found in the UTM administration guide in chapter Management. After configuring the VPN server (headquarter) you need to configure the road warrior. Depending on the security policy of your organization and the requirements of your network, you might have to make additional settings. 13 UTM 9 Remote Access via SSL

3 Configuring the Remote Client 3 Configuring the Remote Client On the remote client you have to download the Sophos SSL VPN Client software including configuration data from the UTM User Portal. Then you install the software package on your computer. 3.1 Getting Software and Certificates The UTM User Portal is available to all remote access users. From this portal, you can download guides and tools for the configuration of your client. You should get the following user credentials for the User Portal from your system administrator: IP address, username, and password. Especially for SSL remote access, the User Portal offers a configuration guide and a customized SSL VPN client software, which already includes software, certificates, and configuration handled by a simple installation procedure. This client supports most business applications such as native Outlook, native Windows file sharing, and many more. 1. Start your browser and open the User Portal. Start your browser and enter the management address of the User Portal as follows: https://ip address (example: https://218.93.117.220). A security note will be displayed. Accept the security note. Depending on the browser, click I Understand the Risks > Add Exception > Confirm Security Exception (Mozilla Firefox), or Proceed Anyway (Google Chrome), or Continue to this website (Microsoft Internet Explorer). 2. Log in to the User Portal. Enter your credentials: Username: Your username, which you received from the administrator. Password: Your password, which you received from the administrator. Please note that passwords are case-sensitive. Click Login. 3. On the Remote Access page, download the tools and/or configuration guide for setting up your remote access connection. This page can contain up to four sections, depending on the remote access connection types (IPsec, SSL, L2TP, PPTP) your administrator enabled for you. At the top of each section you find an Open installation instructions in new window link which opens the respective remote access guide, one of which you are currently reading. UTM 9 Remote Access via SSL 14

3 Configuring the Remote Client In the SSL VPN section, you can download the client software. With the topmost button, you download a complete software package with the pertinent key for a new installation. With the second button, you update an already installed SSL VPN client with new keys. The third button provides all necessary files for the configuration of SSL VPN on Linux, MacOS X, BSD, and Solaris. Cross Reference For the configuration of SSL VPN on Linux, MacOS X, BSD, and Solaris please see installation instructions on http://openvpn.net. Start the download process by clicking Download. 4. Close the User Portal session by clicking Log out. The rest of the configuration takes place on the remote user client. This will require the IP address or hostname of the server, as well as a valid username and password, which should be supplied by the system administrator. 3.2 Installing the SSL VPN Client Software The setup program will check the hardware of the system, and then install the necessary software on your PC. 1. Unpack the installation package. If you have received it as a.zip file, unpack the installation package, for example by using WinZip. 2. Start the installation. 15 UTM 9 Remote Access via SSL

3 Configuring the Remote Client Open a file browser and go to the location of the installation file setup.exe. Launch the file from this directory. The installation wizard should start up now. Click Next to proceed. 3. Accept the software license agreement. If you agree to the terms of the license, click I Agree. 4. Choose the install location. UTM 9 Remote Access via SSL 16

3 Configuring the Remote Client Click Browse, select the appropriate directory, and click OK. 5. Click Install to proceed. The installation process will be started. 6. Confirm the warning message. The installation wizard will copy the necessary files on your system. A virtual network card will be installed during the installation process. Since the relevant driver is not certified by Microsoft, a corresponding caution message will appear during the installation process. You can ignore this message. Click Install. 7. Confirm the completion message. 17 UTM 9 Remote Access via SSL

3 Configuring the Remote Client When the installation process is finished, a completion message is displayed. Click Next to confirm it. 8. Finish the installation by clicking Finish. After the software installation the client is automatically started. Then the SSL VPN icon will be displayed in your task bar. Further information is usually available from the network administrator. 3.3 Connecting to the VPN 1. Open the User Authentication dialog box. Double-click the SSL VPN task bar icon to open the User Authentication dialog box. In case you have more than one connection specified, right-click the icon to open a list of available connections. 2. Log in. Log in with your username and password, which you use also for the User Portal, and then start the connection by clicking OK. UTM 9 Remote Access via SSL 18

3 Configuring the Remote Client The connection status is indicated by the SSL VPN icon: disconnected ( ), connecting ( ), and connected ( ). The Connection dialog box allows you to monitor the set-up of the connection. The SSL VPN remote access can be disconnected by clicking Disconnect in the context menu of the task bar icon. 19 UTM 9 Remote Access via SSL

Glossary A AES Advanced Encryption Standard ASG Astaro Security Gateway Astaro Security Gateway C CA Former Name of Sophos UTM Certificate Authority Certificate Authority Entity or organization that issues digital certificates for use by other parties. CHAP Challenge-Handshake Authentication Protocol CRL D DN Certificate Revocation List Distinguished Name DNS Domain Name Service Domain Name Service Translates the underlying IP addresses of computers connected through the F Internet into more human-friendly names or aliases. FTP H File Transfer Protocol HTTP/S Hypertext Transfer Protocol Secure HTTPS Hypertext Transfer Protocol Secure Hypertext Transfer Protocol Protocol for the transfer of information on the Internet. Hypertext Transfer Protocol over Secure Socket Layer I Protocol to allow more secure HTTP communication. Internet Protocol IP Data-oriented protocol used for communicating data across a packetswitched network. Internet Protocol IP Address Unique number that devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard.

Glossary IPsec L Internet Protocol Security L2TP Layer Two (2) Tunneling Protocol LDAP M Lightweight Directory Access Protocol Masquerading Technology based on NAT that allows an entire LAN to use one public IP address to communicate with the rest of the Internet. MD5 Message-Digest algorithm 5 Message-Digest algorithm 5 Cryptographic hash function with a 128- bit hash value. MSCHAPv2 N Microsoft Challenge Handshake Authentication Protocol Version 2 NAS Network Access Server NAT Network Address Translation Network Address Translation System for reusing IP addresses. P PAP Password Authentication Protocol PKCS Public Key Cryptography Standards Port Virtual data connection that can be used by programs to exchange data directly. More specifically, a port is an additional identifier in the cases of TCP and UDP, a number between 0 and 65535 that allows a computer to distinguish between multiple concurrent connections between the same two computers. PPTP Point to Point Tunneling Protocol Protocol Well-defined and standardized set of rules that controls or enables the connection, communication, and data transfer between two computing endpoints. Proxy Computer that offers a computer network service to allow clients to make indirect network connections to other network services. PSK R Preshared Key RADIUS Remote Authentication Dial In User Service 21 UTM 9 Remote Access via SSL

Glossary RAS S Remote Access Server Secure Sockets Layer Cryptographic protocol that provides secure communications on the Internet, predecessor of the Transport LayerSecurity (TLS). Shared Secret Password or passphrase shared between two entities for secure communication. SSH T Secure Shell TCP Transmission Control Protocol Transmission Control Protocol U Protocol of the Internet protocol suite allowing applications on networked computers to create connections to one another. The protocol guarantees reliable and in-order delivery of data from sender to receiver. URL Uniform Resource Locator UTM Unified Threat Management V Virtual Private Network Private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol such as PPTP or IPsec. VPN W Virtual Private Network WebAdmin Web-based graphical user interface of Sophos products such as UTM and SUM. Windows Internet Naming Service Microsoft's implementation of NetBIOS Name Server (NBNS) on Windows, a name server and service for NetBIOS computer names. WINS X Windows Internet Naming Service X.509 Specification for digital certificates published by the ITU-T (International Telecommunications Union Telecommunication). It specifies information and attributes required for the identification of a person or a computer system. UTM 9 Remote Access via SSL 22