Zyxel SSL 10 User Manual

ZyWALL SSL 10
Integrated SSL-VPN Appliance

User’s Guide

Version 1.00 12/2006 Edition 1
www.zyxel.com
About This User's Guide
Intended Audience
This manual is intended for people who want to log into a network over secure connections through the ZyWALL. You should have at least a basic knowledge of computer usage.
Related Documentation
• Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary
information.
• ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product
certifications.
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
ZyWALL SSL 10 User’s Guide
3

Document Conventions

Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The ZyWALL SSL 10 may be referred to as the “ZyWALL”, the “device”, the “system” or the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key. “Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
ZyWALL SSL 10 User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The ZyWALL icon is not an exact representation of your device.
ZyWALL Computer Notebook computer
Server DSLAM Firewall
Telephone Switch Router
ZyWALL SSL 10 User’s Guide
5
Document Conventions
6
ZyWALL SSL 10 User’s Guide

Table of Contents

Table of Contents
About This User's Guide ..........................................................................................................3
Document Conventions............................................................................................................4
Table of Contents...................................................................................................................... 7
List of Figures ........................................................................................................................... 9
Part I: Remote User Access ...................................................................11
Chapter 1
Introduction .............................................................................................................................13
1.1 Overview .............................................................................................................................. 13
1.1.1 Network Resource Access Methods .......................................................................... 13
1.1.2 System Requirements ................................................................................................ 13
1.1.3 Required Information You Need ................................................................................. 14
1.1.4 Certificate ................................................................................................................... 14
1.2 Remote User Login .............................................................................................................. 14
1.3 Remote User Screen ........................................................................................................... 17
1.4 Bookmark ............................................................................................................................ 18
1.5 Logout .................................................................................................................................. 18
Chapter 2
Application ..............................................................................................................................21
2.1 Overview .............................................................................................................................. 21
2.1.1 The Application Screen .............................................................................................. 21
2.2 Accessing Web-based Application ...................................................................................... 22
2.3 Accessing Non-Web Based Application .............................................................................. 22
Chapter 3
File Sharing .............................................................................................................................25
3.1 Overview .............................................................................................................................. 25
3.2 Main File Sharing Screen .................................................................................................... 25
3.3 Opening a File or Folder ...................................................................................................... 26
3.3.1 Downloading a File ..................................................................................................... 27
3.3.2 Saving a File .............................................................................................................. 27
3.4 Creating a New Folder ......................................................................................................... 28
3.5 Renaming a File or Folder ................................................................................................... 28
ZyWALL SSL 10 User’s Guide
7
Table of Contents
3.6 Deleting a File or Folder ...................................................................................................... 29
3.7 Uploading a File ................................................................................................................... 30
Part II: Troubleshooting, Appendices and Index ................................ 31
Chapter 4
Troubleshooting...................................................................................................................... 33
Appendix A Setting up Your Computer’s IP Address..............................................................37
Appendix B Importing Certificates ..........................................................................................53
Appendix C Legal Information ................................................................................................59
Appendix D Customer Support............................................................................................... 61
8
ZyWALL SSL 10 User’s Guide

List of Figures

List of Figures
Figure 1 Network Example .................................................................................................................... 13
Figure 2 Enter the Address in a Web Browser ..................................................................................... 14
Figure 3 Login Security Screen ........................................................................................................... 15
Figure 4 Login Screen ......................................................................................................................... 15
Figure 5 Software Upgrade Prompt ..................................................................................................... 16
Figure 6 Login Warning Message ....................................................................................................... 16
Figure 7 VPN Connection Network Icon .............................................................................................. 16
Figure 8 Remote User Screen ............................................................................................................ 17
Figure 9 Add Favorite ............................................................................................................................ 18
Figure 10 Logout: Prompt ...................................................................................................................... 18
Figure 11 Logout: Information Window .................................................................................................. 18
Figure 12 Logout: Successful ................................................................................................................ 19
Figure 13 Application ............................................................................................................................. 21
Figure 14 Application: Access Web-based Application ......................................................................... 22
Figure 15 Application: Access Non-Web based Application .................................................................. 23
Figure 16 Application: Telnet Example .................................................................................................. 23
Figure 17 File Sharing ........................................................................................................................... 26
Figure 18 File Sharing: Enter Access User Name and Password ........................................................ 26
Figure 19 File Sharing: Open a Word File ............................................................................................ 27
Figure 20 File Sharing: Save a Word File ............................................................................................. 28
Figure 21 File Sharing: Save a Word File ............................................................................................. 28
Figure 22 File Sharing: Rename ............................................................................................................ 29
Figure 23 File Sharing: Rename ............................................................................................................ 29
Figure 24 File Sharing: Delete Prompt .................................................................................................. 30
Figure 25 File Sharing: File Upload ....................................................................................................... 30
Figure 26 WIndows 95/98/Me: Network: Configuration .......................................................................... 38
Figure 27 Windows 95/98/Me: TCP/IP Properties: IP Address .............................................................. 39
Figure 28 Windows 95/98/Me: TCP/IP Properties: DNS Configuration .................................................. 40
Figure 29 Windows XP: Start Menu ........................................................................................................ 41
Figure 30 Windows XP: Control Panel ................................................................................................... 41
Figure 31 Windows XP: Control Panel: Network Connections: Properties ............................................. 42
Figure 32 Windows XP: Local Area Connection Properties ................................................................... 42
Figure 33 Windows XP: Internet Protocol (TCP/IP) Properties .............................................................. 43
Figure 34 Windows XP: Advanced TCP/IP Properties ........................................................................... 44
Figure 35 Windows XP: Internet Protocol (TCP/IP) Properties .............................................................. 45
Figure 36 Macintosh OS 8/9: Apple Menu .............................................................................................. 46
Figure 37 Macintosh OS 8/9: TCP/IP ..................................................................................................... 46
Figure 38 Macintosh OS X: Apple Menu ................................................................................................ 47
ZyWALL SSL 10 User’s Guide
9
List of Figures
Figure 39 Macintosh OS X: Network ...................................................................................................... 48
Figure 40 Red Hat 9.0: KDE: Network Configuration: Devices ............................................................. 49
Figure 41 Red Hat 9.0: KDE: Ethernet Device: General ...................................................................... 49
Figure 42 Red Hat 9.0: KDE: Network Configuration: DNS ................................................................... 50
Figure 43 Red Hat 9.0: KDE: Network Configuration: Activate ............................................................ 50
Figure 44 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 ................................................... 51
Figure 45 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 ....................................................... 51
Figure 46 Red Hat 9.0: DNS Settings in resolv.conf ............................................................................ 51
Figure 47 Red Hat 9.0: Restart Ethernet Card ..................................................................................... 51
Figure 48 Red Hat 9.0: Checking TCP/IP Properties ........................................................................... 52
Figure 49 Security Certificate ................................................................................................................. 53
Figure 50 Login Screen .......................................................................................................................... 54
Figure 51 Certificate General Information before Import ........................................................................54
Figure 52 Certificate Import Wizard 1 ..................................................................................................... 55
Figure 53 Certificate Import Wizard 2 ..................................................................................................... 55
Figure 54 Certificate Import Wizard 3 ..................................................................................................... 56
Figure 55 Root Certificate Store ............................................................................................................. 56
Figure 56 Certificate General Information after Import ........................................................................... 57
10
ZyWALL SSL 10 User’s Guide
PART I
Remote User
Access
Introduction (13)
Application (21)
File Sharing (25)
11
12
CHAPTER 1

Introduction

This chapter introduces secure network access and gives an overview of the remote user screens on the ZyWALL.

1.1 Overview

The ZyWALL provides secure connection to network resources such as applications, files, intranet sites or e-mails through web-based interface using Microsoft Outlook Web Access (OWA). No additional computer configuration or software installation is required.
The following figure shows a network example where a remote user (A) logs into the ZyWALL (SSL10) from the Internet to access the web server (WWW) on the local network.
Figure 1 Network Example
Internet
Internet
A

1.1.1 Network Resource Access Methods

As a remote user, you can access resources on the local network using one of the following methods.
• Using a standard web browser supported Once you have successfully logged in through the ZyWALL, you can access any intranet
site, web-based applications or web-based e-mails using a standard web browser. You do not have to install or pre-launch any application on your computer.
• Using the Java thin clients The ZyWALL automatically load Java thin client programs to your computer after a
successful login. With the thin clients, you can access servers, remote desktops and manage files as if you were on the local network.

1.1.2 System Requirements

The following lists the browser and computer system requirements for remote user access.
SSL10
WWW
ZyWALL SSL 10 User’s Guide
13
Chapter 1 Introduction
• Internet Explorer 5.5 with Microsoft XML (MSXML) service pack installed or 6.0 and above
• Netscape 7.2 and above
• Firefox 1.0 and above
• Mozilla 1.7.3 and above
• Windows 2000 Professional, Windows XP Home/Professional (with service pack 2 and above) or Linux.
• Sun Java Virtual Machine (JVM) installed with a minimum version of 1.4.2_07 for Netscape/Mozilla/Firefox and 1.4.2_02 for Internet Explorer and Linux computers.
• Java enabled in Internet Explorer on Windows computers.

1.1.3 Required Information You Need

Your network administrator should provide the following information that allows you to log in and access network resource.
• domain name or IP address of the ZyWALL.
• login account user name and password
• specific computer requirements. For example, if you must use Windows XP with service pack 2, etc.
• if also required, the user name and/or password to access the network resource.

1.1.4 Certificate

Your computer establishes an HTTPS connection to the ZyWALL to access the login screen. If instructed by your network administrator, you must install or import a certificate (provided by the ZyWALL or your network administrator).
Refer to Appendix B on page 53 for more information.

1.2 Remote User Login

This section shows you how to access and log into the network through the ZyWALL. Example screens for Internet Explorer are shown.
1 Open a web browser and enter the web site address or IP address of the ZyWALL. For
example, “http://sslvpn.mycompany.com”.
Figure 2 Enter the Address in a Web Browser
2 Click OK or Ye s if a security screen displays.
14
ZyWALL SSL 10 User’s Guide
Chapter 1 Introduction
Figure 3 Login Security Screen
3 A login screen displays. Enter the user name and password of your login account. If a
token password is also required, enter it in the One-Time Password screen. Click Login.
4 Select I am connecting via my own computer if you log in using your personal
computer. If you are using a public computer to log in, select I am connecting via Public
computer. The ZyWALL automatically clears history information from your browser cache after you log out. This prevents anyone from obtaining information that may be stored in the browser cache.
5 Click Login.
Figure 4 Login Screen
6 After the login is successful, your computer starts establishing a secure connection to the
ZyWALL. This may take up to two minutes.
7 Download the installation software if you are prompted to upgrade the JVM. Click the
link to access the Sun Java software web site. It is recommended you select the Offline Installation option.
ZyWALL SSL 10 User’s Guide
15
Chapter 1 Introduction
Figure 5 Software Upgrade Prompt
8 If you access the ZyWALL using an IP address, a warning screen displays, click
Continue.
Figure 6 Login Warning Message
9 A new network icon displays in the system tray. This indicates that a VPN connection
has been established between your computer and the ZyWALL.
Figure 7 VPN Connection Network Icon
16
10 When the list of available resources displays in the Application screen, you have
successfully logged into the network. See Figure 8 on page 17.
ZyWALL SSL 10 User’s Guide
Chapter 1 Introduction
" Available resource links vary depending on the configuration of your network
administrator.

1.3 Remote User Screen

This section describes the main elements in the remote user screens.
Figure 8 Remote User Screen
1
2
5
The following table describes the various parts of a remote user screen.
Table 1 Remote User Screen Overview
#
1 Click on a menu tab to go to the Application or File Sharing screen.
2 Click this icon to display the on-line help window.
3 Click this icon to log out and terminate the secure connection.
4 Click Add to Favorite to create a bookmark for the ZyWALL in your web
5 This part of the screen displays a list of the resources available to you.
browser.
In the Application screen, click on a link to access or display the access method.
In the File Sharing screen, click on a link to open a file or directory.
3
4
ZyWALL SSL 10 User’s Guide
17
Chapter 1 Introduction

1.4 Bookmark

You can create a bookmark of the ZyWALL by clicking Add to Favorite. This allows you can access the ZyWALL using the bookmark without having to enter the address every time.
1 In any remote user screen, click Add to favorite. 2 A descriptive name is entered in the Name field. You can accept the default or enter a
name.
3 Click OK to create a bookmark in your web browser.
Figure 9 Add Favorite

1.5 Logout

To properly terminate a connection, click on the Logout icon in any remote user screen.
If you select I am connecting via Public computer in the login screen, history information in your browser cache is also erased once you log out.
1 Click the Logout icon in any remote user screen. 2 A prompt window displays. Click OK to continue.
Figure 10 Logout: Prompt
3 An information screen displays. This indicates that all connections have been
successfully terminated.
Figure 11 Logout: Information Window
4 The login screen displays with the “Logged out successfully!” message.
18
ZyWALL SSL 10 User’s Guide
Figure 12 Logout: Successful
Chapter 1 Introduction
ZyWALL SSL 10 User’s Guide
19
Chapter 1 Introduction
20
ZyWALL SSL 10 User’s Guide
Loading...
+ 44 hidden pages