Contents

Related Topics

Configure the Access Portal

To configure the Access Portal, you must:

  • Enable the Access Portal
  • Add application groups
  • Add applications
  • Configure the user connection settings
  • Configure the VPN Portal settings — Interface, port, authentication server, portal design customization (optional), and SAML single sign-on (optional)

You can add custom icons for web applications, Remote Desktop Protocol (RDP) hosts, and Secure Shell (SSH) hosts. We recommend that image files for icons have a maximum size of 64 x 64 pixels.

When you activate the Access Portal, the WatchGuard SSLVPN policy is automatically created. This policy specifies the alias WG-VPN-Portal in the From field. By default, the alias WG-VPN-Portal includes only the Any-External interface.

The WatchGuard SSLVPN policy is shared by the Access Portal, BOVPN over TLS, and Mobile VPN with SSL. For more information about this policy, see SSL/TLS Settings Precedence and Inheritance.

Enable the Access Portal

To enable the Access Portal, from Fireware Web UI or Policy Manager:

  1. Select Subscription Services > Access Portal.
  2. Select Enable Access Portal.

Add an Application Group

Add a Web Application

You can add external web applications to the Access Portal. Internal web applications are not supported.

Add an RDP Host

The Access Portal supports the Any, NLA, TLS, and RDP security types for connections to RDP hosts. We recommend the default setting Any which works for most connections. When Any is selected, the Firebox negotiates the security protocol with the remote host.

If you change the security type to a setting other than Any, make sure the RDP host has the same security type configured.

Security Settings for Windows RDP Hosts

The guidelines in this section describe which Access Portal RDP security types are compatible with Remote Desktop and Security Layer settings on the Windows RDP host.

These guidelines assume the Windows operating system on the RDP host uses default Security Layer settings. The default Security Layer settings in Windows vary by operating system, and can only be changed through registry edits in some Windows operating systems. We do not support changes to Windows settings that require registry edits.

For all Windows operating systems:

  • We recommend that you select Trust Certificate in the Access Portal RDP settings.
  • If you do not select Trust Certificate, you must import the CA chain for the RDP host into the Firebox. For general certificate import instructions, see Manage Device Certificates (Web UI) or Manage Device Certificates (WSM). When you import the CA chain, you must select the IPSec, Web Server, other certificate function.
  • If the option Allows connections only from computers running Remote Desktop with Network Level Authentication is selected in the Remote Settings in Windows, that host only allows connections that use NLA. In the Access Portal RDP settings, you must select the NLA security type.

Certificate Requirements for macOS and iOS Devices

To connect to an RDP host from a macOS or iOS device with Safari, you must import a certificate on the macOS or iOS device. For information about certificate requirements and the import process, see Install a Certificate on a macOS or iOS Device for RDP or SSH.

Add an SSH host

To connect to an SSH host from a macOS or iOS device with Safari, you must import a certificate on the macOS or iOS device. For information about certificate requirements and the import process, see Install a Certificate on a macOS or iOS Device for RDP or SSH.

Install a Certificate on a macOS or iOS Device for RDP or SSH

To connect to an RDP or SSH host from a macOS or iOS device with the Safari web browser, you must configure one of these certificates on the Firebox:

  • Trusted third-party web server certificate signed by a trusted CA
  • Custom web server certificate that specifies the domain name or IP address of the Access Portal

If you install a trusted third-party web server certificate on your Firebox, you do not have to install the certificate on your macOS or iOS device.

If you install a custom web server certificate on the Firebox, you must install the certificate on the macOS or iOS device. The RDP or SSH connection does not work if you only accept the certificate in the Safari web browser.

To install the certificate on a macOS device, see Keychain for Mac: Add certificates to a keychain on the Apple website.

Configure the User Connection Settings

You can specify the users and groups that can connect to applications or application groups.

To complete the Access Portal setup, you must specify the interface, port, and authentication servers for user connections to the Access Portal. These settings are in the VPN Portal settings on your Firebox. To configure the VPN Portal settings, see Configure the VPN Portal Settings.

See Also

About the Access Portal

Configure the VPN Portal Settings

Customize the Access Portal Design

Customize Access Portal Page Elements with CSS

Give Us Feedback     Get Support     All Product Documentation     Technical Search