- Table of Contents
-
- 12-Security Command Reference
- 00-Preface
- 01-Security zone commands
- 02-AAA commands
- 03-802.1X commands
- 04-MAC authentication commands
- 05-Portal commands
- 06-Port security commands
- 07-User profile commands
- 08-Password control commands
- 09-Keychain commands
- 10-Public key management commands
- 11-PKI commands
- 12-IPsec commands
- 13-Group domain VPN commands
- 14-SSH commands
- 15-SSL commands
- 16-SSL VPN commands
- 17-ASPF commands
- 18-APR commands
- 19-Session management commands
- 20-Connection limit commands
- 21-Object group commands
- 22-Object policy commands
- 23-Attack detection and prevention commands
- 24-IP source guard commands
- 25-ARP attack protection commands
- 26-ND attack defense commands
- 27-uRPF commands
- 28-Crypto engine commands
- 29-FIPS commands
- 30-mGRE commands
- Related Documents
-
Title | Size | Download |
---|---|---|
16-SSL VPN commands | 309.80 KB |
certificate-authentication enable
description (SSL VPN AC interface view)
display sslvpn ip-tunnel statistics
display sslvpn port-forward connection
force-logout max-onlines enable
ip-tunnel address-pool (SSL VPN context view)
ip-tunnel address-pool (SSL VPN policy group view)
ip-tunnel log connection-close
ip-tunnel web-resource auto-push
password-authentication enable
reset counters interface sslvpn-ac
reset sslvpn ip-tunnel statistics
service enable (SSL VPN context view)
service enable (SSL VPN gateway view)
vpn-instance (SSL VPN context view)
SSL VPN commands
The following compatibility matrix shows the support of hardware platforms for SSL VPN:
Hardware |
SSL VPN compatibility |
MSR810, MSR810-W, MSR810-W-DB, MSR810-LM, MSR810-W-LM, MSR810-10-PoE, MSR810-LM-HK, MSR810-W-LM-HK, MSR810-LMS-EA |
Yes |
MSR810-LMS, MSR810-LUS |
No |
MSR2600-6-X1 |
Yes |
MSR2600-10-X1 |
No |
MSR 2630 |
Yes |
MSR3600-28, MSR3600-51 |
Yes |
MSR3600-28-SI, MSR3600-51-SI |
No |
MSR3600-28-X1, MSR3600-28-X1-DP, MSR3600-51-X1, MSR3600-51-X1-DP |
Yes |
MSR3610-I-DP, MSR3610-IE-DP |
Yes |
MSR3610-X1, MSR3610-X1-DP, MSR3610-X1-DC, MSR3610-X1-DP-DC |
Yes |
MSR 3610, MSR 3620, MSR 3620-DP, MSR 3640, MSR 3660 |
Yes |
MSR3610-G, MSR3620-G |
Yes |
IPv6-related parameters are not supported on MSR routers.
aaa domain
Use aaa domain to specify an ISP domain for authentication, authorization, and accounting of SSL VPN users in an SSL VPN context.
Use undo aaa domain to restore the default.
Syntax
aaa domain domain-name
undo aaa domain
Default
The default ISP domain is used for authentication, authorization, and accounting of SSL VPN users in an SSL VPN context.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
domain-name: Specifies the ISP domain name, a case-insensitive string of 1 to 255 characters. The name must meet the following requirements:
· The name cannot contain a forward slash (/), backslash (\), vertical bar (|), quotation marks ("), colon (:), asterisk (*), question mark (?), left angle bracket (<), right angle bracket (>), or at sign (@).
· The name cannot be d, de, def, defa, defau, defaul, default, i, if, if-, if-u, if-un, if-unk, if-unkn, if-unkno, if-unknow, or if-unknown.
Usage guidelines
An SSL VPN username cannot carry ISP domain information. After this command is executed, an SSL VPN gateway uses the specified ISP domain for authentication, authorization, and accounting of SSL VPN users in the context.
Examples
# Specify ISP domain myserver for authentication, authorization, and accounting of SSL VPN users in SSL VPN context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] aaa domain myserver
authentication use
Use authentication use to specify the authentication methods required for user login.
Use undo authentication use to restore the default.
Syntax
authentication use { all | any-one }
undo authentication use
Default
To log in to an SSL VPN context, a user must pass all the authentication methods enabled for the context.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
all: Uses all enabled authentication methods.
any-one: Uses any enabled authentication method.
Usage guidelines
You can enable username/password authentication, certificate authentication, or both for an SSL VPN context. The authentication methods required for logging in to the SSL VPN context depend on the configuration of this command:
· If the authentication use all command is configured, a user must pass all the enabled authentication methods for login.
· If the authentication use any-one command is configured, a user can log in after passing any enabled authentication method.
Examples
# Configure SSL VPN context ctx to allow users to log in after passing any enabled authentication method.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] authentication use any-one
Related commands
certificate-authentication enable
display sslvpn context
password-authentication enable
bandwidth
Use bandwidth to set the expected bandwidth for an interface.
Use undo bandwidth to restore the default.
Syntax
bandwidth bandwidth-value
undo bandwidth
Default
The expected bandwidth is 64 kbps for an interface.
Views
SSL VPN AC interface view
Predefined user roles
network-admin
Parameters
bandwidth-value: Specifies the expected bandwidth in the range of 1 to 400000000 kbps.
Usage guidelines
The expected bandwidth for an interface affects CBQ bandwidth and link costs in OSPF, OSPFv3, and IS-IS. For more information about CBQ bandwidth, see QoS configuration in ACL and QoS Configuration Guide. For more information about link costs, see Layer 3—IP Routing Configuration Guide.
Examples
# Set the expected bandwidth to 10000 kbps for SSL VPN AC 1000.
<Sysname> system-view
[Sysname] interface sslvpn-ac 1000
[Sysname-SSLVPN-AC1000] bandwidth 10000
certificate-authentication enable
Use certificate-authentication enable to enable certificate authentication.
Use undo certificate-authentication enable to disable certificate authentication.
Syntax
certificate-authentication enable
undo certificate-authentication enable
Default
Certificate authentication is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Usage guidelines
After you enable certificate authentication, you must also execute the client-verify command in SSL server policy view. The SSL VPN gateway uses the digital certificate sent by an SSL VPN client to authenticate the client's identity. If the client's username and the username in the digital certificate are not the same, the client cannot log in to the SSL VPN gateway.
Examples
# Enable certificate authentication.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] certificate-authentication enable
Related commands
client-verify enable
client-verify optional
content-type
Use content-type to configure a file policy to rewrite a file in an HTTP response to a specific type of file.
Use undo content-type to restore the default.
Syntax
content-type { css | html | javascript | other }
undo content-type
Default
A file policy rewrites a file carried in an HTTP response to a file of the type indicated by the content-type field in the HTTP response.
Views
File policy view
Predefined user roles
network-admin
Parameters
css: Changes the file type to CSS.
html: Changes the file type to HTML.
javascript: Changes the file type to JavaScript.
other: Does not change the file type.
Usage guidelines
A file policy rewrites a file carried in an HTTP response to a file of the type specified by this command. If the specified file type is different from that indicated by the content-type field in the HTTP response, users might not be able to read the file correctly.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Configure file policy fp to rewrite files to HTML files.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] file-policy fp
[Sysname-sslvpn-context-ctx-file-policy-fp] content-type html
default
Use default to restore the default settings for an SSL VPN AC interface.
Syntax
default
Views
SSL VPN AC interface view
Predefined user roles
network-admin
Usage guidelines
|
CAUTION: The default command might interrupt ongoing network services. Make sure you are fully aware of the impact of this command when you use it on a live network. |
This command might fail to restore the default settings for some commands for reasons such as command dependencies or system restrictions. Use the display this command in interface view to identify these commands. Use their undo forms or follow the command reference to restore their default settings. If your restoration attempt still fails, follow the error message instructions to resolve the problem.
Examples
# Restore the default settings of sslvpn-ac 1000.
<Sysname> system-view
[Sysname] interface sslvpn-ac 1000
[Sysname-SSLVPN-AC1000] default
This command will restore the default settings. Continue? [Y/N]:y
default-policy-group
Use default-policy-group to specify a policy group as the default policy group.
Use undo default-policy-group to restore the default.
Syntax
default-policy-group group-name
undo default-policy-group
Default
No policy group is specified as the default policy group.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
group-name: Specifies a policy group by its name, a case-insensitive string of 1 to 31 characters. The specified policy group must have been created.
Usage guidelines
You can configure multiple policy groups for an SSL VPN context. When a remote user accesses the SSL VPN context, the AAA server issues the authorized policy group to the associated SSL VPN gateway. The user can access only the resources allowed by the authorized policy group. If the AAA server does not issue an authorized policy group to the user, the user can access only the resources allowed by the default policy group.
Examples
# Specify policy group pg1 as the default policy group.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] policy-group pg1
[Sysname-sslvpn-context-ctx1-policy-group-pg1] quit
[Sysname-sslvpn-context-ctx1] default-policy-group pg1
Related commands
display sslvpn context
policy-group
description (SSL VPN AC interface view)
Use description to configure the description of an interface.
Use undo description to restore the default.
Syntax
description text
undo description
Default
The description of an interface is interface name Interface, for example, SSLVPN-AC1000 Interface.
Views
SSL VPN AC interface view
Predefined user roles
network-admin
Parameters
text: Specifies a description, a case-sensitive string of 1 to 255 characters.
Usage guidelines
Configure descriptions for interfaces for identification and management purposes.
You can use the display interface command to display the configured interface descriptions.
Examples
# Configure a description of SSL VPN A for SSL VPN AC 1000.
<Sysname> system-view
[Sysname] interface sslvpn-ac 1000
[Sysname-SSLVPN-AC1000] description SSL VPN A
display interface sslvpn-ac
Use display interface sslvpn-ac to display SSL VPN AC interface information.
Syntax
display interface [ sslvpn-ac [ interface-number ] ] [ brief [ description | down ] ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
sslvpn-ac [ interface-number ]: Specifies an SSL VPN AC interface by its number in the range of 0 to 4095. If you do not specify the sslvpn-ac keyword, this command displays information about all interfaces except virtual access (VA) interfaces. If you specify the sslvpn-ac keyword without the interface-number argument, this command displays information about all SSL VPN AC interfaces. For more information about VA interfaces, see PPPoE configuration in Layer 2—WAN Access Configuration Guide.
brief: Displays brief interface information. If you do not specify this keyword, the command displays detailed interface information.
description: Displays complete interface descriptions. If you do not specify this keyword, the command displays only the first 27 characters of interface descriptions.
down: Displays information about interfaces in the physical state of DOWN and the causes. If you do not specify this keyword, the command displays information about interfaces in all states.
Examples
# Display detailed information about SSL VPN AC 1000.
<Sysname> display interface sslvpn-ac 1000
SSLVPN-AC1000
Current state: UP
Line protocol state: DOWN
Description: SSLVPN-AC1000 Interface
Bandwidth: 64kbps
Maximum transmission unit: 1500
Internet protocol processing: Disabled
Link layer protocol is SSLVPN
Last clearing of counters: Never
Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec
Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec
Input: 0 packets, 0 bytes, 0 drops
Output: 0 packets, 0 bytes, 0 drops
Table 1 Command output
Field |
Description |
SSLVPN-AC1000 |
Information about interface SSL VPN AC 1000. |
Current state |
Physical link state of the interface: · Administratively DOWN—The interface has been shut down by using the shutdown command. · DOWN—The interface is administratively up, but its physical state is down (possibly because no physical link exists or the link has failed). · UP—The interface is both administratively and physically up. |
Line protocol state |
Data link layer state of the interface. The state is determined through automatic parameter negotiation at the data link layer. · UP—The data link layer protocol is up. · UP (spoofing)—The data link layer protocol is up, but the link is an on-demand link or does not exist. This attribute is typical of null interfaces and loopback interfaces. · DOWN—The data link layer protocol is down. |
Description |
Description of the interface. |
Bandwidth |
Expected bandwidth of the interface. |
Maximum transmission unit |
MTU of the interface. |
Internet protocol processing: Disabled |
The interface is not assigned an IP address and cannot process IP packets. |
Internet address: ip-address/mask-length (Type) |
IP address of the interface and type of the address in parentheses. Possible IP address types include: Primary—Manually configured primary IP address. |
Last clearing of counters |
Most recent time the counters were cleared by using the reset counters interface command. If the reset counters interface command has never been executed since the device starts up, this field displays Never. |
Last 300 seconds input rate |
Average input rate in the last 300 seconds. |
Last 300 seconds output rate |
Average output rate in the last 300 seconds. |
# Display brief information about all SSL VPN AC interfaces.
<Sysname> display interface sslvpn-ac brief
Brief information of interfaces in route mode:
Link: ADM - administratively down; Stby - standby
Protocol: (s) - spoofing
Interface Link Protocol Primary IP Description
SSLVPN-AC1000 UP DOWN --
# Display brief information about SSL VPN AC 1000, including the complete interface description.
<Sysname> display interface sslvpn-ac 1000 brief description
Brief information of interfaces in route mode:
Link: ADM - administratively down; Stby - standby
Protocol: (s) - spoofing
Interface Link Protocol Primary IP Description
SSLVPN-AC1000 UP UP 1.1.1.1 SSLVPN-AC1000 Interface
# Display information about interfaces in DOWN state and the causes.
<Sysname> display interface sslvpn-ac brief down
Brief information of interfaces in route mode:
Link: ADM - administratively down
Interface Link Cause
SSLVPN-AC1000 ADM
SSLVPN-AC1001 ADM
Table 2 Command output
Field |
Description |
Brief information of interfaces in route mode: |
Brief information about Layer 3 interfaces. |
Interface |
Abbreviated interface name. |
Link |
Physical link state of the interface: · UP—The interface is physically up. · DOWN—The interface is physically down. · ADM—The interface has been shut down by using the shutdown command. To restore the physical state of the interface, use the undo shutdown command. · Stby—The interface is a backup interface in standby state. |
Protocol |
Data link layer protocol state of the interface: · UP—The data link layer protocol of the interface is up. · UP(s)—The data link layer protocol of the interface is up, but the link is an on-demand link or does not exist. The (s) attribute represents the spoofing flag. This value is typical of null interfaces and loopback interfaces. · DOWN—The data link layer protocol of the interface is down. |
Primary IP |
Primary IP address of the interface. |
Description |
Description of the interface. |
Cause |
Cause for the physical link state of an interface to be DOWN: · Administratively—The interface has been manually shut down by using the shutdown command. To restore the physical state of the interface, use the undo shutdown command. · Not connected—No physical connection exists (possibly because the network cable is disconnected or faulty). |
Related commands
reset counters interface
display sslvpn context
Use display sslvpn context to display SSL VPN context information.
Syntax
display sslvpn context [ brief | name context-name ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
brief: Displays brief SSL VPN context information. If you do not specify this keyword, the command displays detailed SSL VPN context information.
name context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays information about all SSL VPN contexts.
Examples
# Display detailed information about all SSL VPN contexts.
<Sysname> display sslvpn context
Context name: ctx1
Operation state: Up
AAA domain: domain1
Certificate authentication: Enabled
Password authentication: Enabled
Authentication use: All
Dynamic password: Enabled
Code verification: Disabled
Default policy group: Not configured
Associated SSL VPN gateway: gw1
Domain name: 1
Associated SSL VPN gateway: gw2
Virtual host: abc.com
Associated SSL VPN gateway: gw3
SSL client policy configured: ssl1
SSL client policy in use: ssl
Maximum users allowed: 200
VPN instance:vpn1
Idle timeout: 30 min
Idle-cut traffic threshold: 100 Kilobytes
Context name: ctx2
Operation state: Down
Down reason: Administratively down
AAA domain not specified
Certificate authentication: Enabled
Password authentication: Disabled
Authentication use: Any-one
Dynamic password: Disabled
Code verification: Disabled
Default group policy: gp
Associated SSL VPN gateway: -
SSL client policy configured: ssl1
SSL client policy in use: ssl
Maximum users allowed: 200
VPN instance not configured
Idle timeout: 50 min
Idle-cut traffic threshold: 100 Kilobytes
Address pool: Conflicted with an IP address on the device
Table 3 Command output
Field |
Description |
Context name |
Name of the SSL VPN context. |
Operation state |
Operation state of the SSL VPN context: · Up—The context is running. · Down—The context is not running. |
Down reason |
Causes for the Down operations status: · Administratively down—The context is disabled. To enable the context, use the service enable command. · No gateway associated—The context is not associated with an SSL VPN gateway. |
AAA domain |
ISP domain for the SSL VPN context. |
Certificate authentication |
Whether certificate authentication is enabled for the SSL VPN context. |
Password authentication |
Whether username/password authentication is enabled for the SSL VPN context. |
Authentication use |
Authentication methods required for user login: · All—A user must pass all the enabled authentication methods to log in to the SSL VPN context. · Any-one—A user can log in to the SSL VPN context after passing any enabled authentication method. |
Code verification |
Whether code verification is enabled for the SSL VPN context. |
Default policy group |
Default policy group used by the SSL VPN context. |
Associated SSL VPN gateway |
SSL VPN gateway associated with the SSL VPN context. |
Domain name |
Domain name specified for the SSL VPN context. |
Virtual host |
Virtual host name specified for the SSL VPN context. |
SSL client policy configured |
SSL client policy configured for the SSL VPN context. A newly configured SSL client policy takes effect only after the SSL VPN context is restarted. |
SSL client policy in use |
SSL client policy being used by the SSL VPN context. |
Maximum users allowed |
Maximum number of sessions allowed in the SSL VPN context. |
VPN instance |
VPN instance associated with the SSL VPN context. |
Idle timeout |
Maximum idle time of an SSL VPN session, in minutes. |
Idle-cut traffic threshold |
SSL VPN idle session disconnection traffic threshold. |
Address pool: Conflicted with an IP address on the device |
An IP address conflict was detected in the SSL VPN context. |
# Display brief information about all SSL VPN contexts.
<Sysname> display sslvpn context brief
Context name Admin Operation VPN instance Gateway Domain/VHost
ctx1 Up Up - gw1 -/1
gw2 abc.com/-
gw3 -/-
ctx2 Down Down - - -/-
Table 4 Command output
Field |
Description |
Context name |
Name of the SSL VPN context. |
Admin |
Administrative status of the SSL VPN context: · Up—The context has been enabled by using the service enable command. · Down—The context is disabled. |
Operation |
Operation state of the SSL VPN context: · Up—The context is running. · Down—The context is not running. |
VPN instance |
VPN instance associated with the SSL VPN context. |
Gateway |
SSL VPN gateway associated with the SSL VPN context. |
Domain/VHost |
Domain name or virtual host name specified for the SSL VPN context. |
display sslvpn gateway
Use display sslvpn gateway to display SSL VPN gateway information.
Syntax
display sslvpn gateway [ brief | name gateway-name ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
brief: Displays brief SSL VPN gateway information. If you do not specify this keyword, the command displays detailed SSL VPN gateway information.
name gateway-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays information about all SSL VPN gateways.
Examples
# Display detailed information about all SSL VPN gateways.
<Sysname> display sslvpn gateway
Gateway name: gw1
Operation state: Up
IP: 192.168.10.75 Port: 443
HTTP redirect port: 80
SSL server policy configured: ssl1
SSL server policy in use: ssl
Front VPN instance: vpn1
Gateway name: gw2
Operation state: Down
Down reason: Administratively down
IP: 0.0.0.0 Port: 443
SSL server policy configured: ssl1
SSL server policy in use: ssl
Front VPN instance: Not configured
Gateway name: gw3
Operation state: Up
IPv6: 3000::2 Port: 443
SSL server policy configured: ssl1
SSL server policy in use: ssl
Front VPN instance: Not configured
Table 5 Command output
Field |
Description |
|
|
Gateway name |
Name of the SSL VPN gateway. |
|
|
Operation state |
Operation state of the SSL VPN gateway: · Up—The gateway is running. · Down—The gateway is not running. |
|
|
Down reason |
Causes for the Down operation status: · Administratively down—The SSL VPN gateway is disabled. To enable the gateway, use the service enable command. · VPN instance not exist—The VPN instance to which the SSL VPN gateway belongs does not exist. · Applying SSL server-policy failed—Failed to apply the SSL server policy to the SSL VPN gateway. |
|
|
IP |
IPv4 address of the SSL VPN gateway. |
|
|
IPv6 |
IPv6 address of the SSL VPN gateway. |
||
Port |
Port number of the SSL VPN gateway. |
|
|
HTTP redirect port |
HTTP redirection port number of the SSL VPN gateway. |
|
|
SSL server policy configured |
SSL server policy configured for the SSL VPN gateway. A newly configured SSL server policy takes effect only after the SSL VPN gateway is restarted. |
|
|
SSL server policy in use |
SSL server policy being used by the SSL VPN gateway. |
|
|
Front VPN instance |
Front VPN instance to which the SSL VPN gateway belongs. |
|
|
# Display brief information about all SSL VPN gateways.
<Sysname> display sslvpn gateway brief
Gateway name Admin Operation
gw1 Up Up
gw2 Down Down (Administratively down)
gw3 Up Up
Table 6 Command output
Field |
Description |
Gateway name |
Name of the SSL VPN gateway. |
Admin |
Administrative status of the SSL VPN gateway: · Up—The gateway has been enabled by using the service enable command. · Down—The gateway is disabled. |
Operation |
Operation state of the SSL VPN gateway: · Up—The gateway is running. · Down (Administratively down)—The gateway is disabled. To enable the gateway, use the service enable command. · Down (VPN instance not exist)—The gateway is down because the VPN instance to which the gateway belongs does not exist. · Down (Applying SSL server-policy failed)—The gateway is down because the SSL server policy failed to be applied to the gateway. |
display sslvpn ip-tunnel statistics
Use display sslvpn ip-tunnel statistics to display packet statistics for IP access users.
Syntax
display sslvpn ip-tunnel statistics [ context context-name ] [ user user-name ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_).
user user-name: Specifies an IP access user by username, a case-insensitive string of 1 to 63 characters.
Usage guidelines
If you do not specify any parameters, this command displays IP access packets statistics for all SSL VPN contexts.
If you only specify an SSL VPN context, this command displays IP access packet statistics for the specified context and for each SSL VPN user in the context.
If you only specify an SSL VPN user, this command displays IP access packet statistics for the specified user in all SSL VPN contexts.
If you specify both an SSL VPN context and user, this command displays IP access packet statistics for the specified user in the specified context.
Examples
# Display IP access packet statistics for all SSL VPN contexts.
<Sysname> display sslvpn ip-tunnel statistics
IP-tunnel statistics in SSL VPN context ctx1:
Client:
In bytes : 125574 Out bytes : 1717349
Server:
In bytes : 1717349 Out bytes : 116186
IP-tunnel statistics in SSL VPN context ctx2:
Client:
In bytes : 521 Out bytes : 1011
Server:
In bytes : 1011 Out bytes : 498
# Display IP access packet statistics for SSL VPN context ctx1 and for each user in the context.
<Sysname> display sslvpn ip-tunnel statistics context ctx1
IP-tunnel statistics in SSL VPN context ctx1:
Client:
In bytes : 125574 Out bytes : 1717349
Server:
In bytes : 1717349 Out bytes : 116186
SSL VPN session IP-tunnel statistics:
Context : ctx1
User : user1
Session ID : 1
User IPv4 address : 192.168.56.1
Received requests : 81
Sent requests : 0
Dropped requests : 81
Received replies : 0
Sent replies : 0
Dropped replies : 0
Received keepalives : 1
Sent keepalive replies : 1
Received configuration updates: 0
Sent configuration updates : 0
Context : ctx1
User : user2
Session ID : 2
User IPv6 address : 1234::5001
Received requests : 81
Sent requests : 0
Dropped requests : 81
Received replies : 0
Sent replies : 0
Dropped replies : 0
Received keepalives : 1
Sent keepalive replies : 1
Received configuration updates: 0
Sent configuration updates : 0
# Display IP access packet statistics for user user1 in all SSL VPN contexts.
<Sysname> display sslvpn ip-tunnel statistics user user1
SSL VPN session IP-tunnel statistics:
Context : ctx1
User : user1
Session ID : 1
User IPv4 address : 192.168.56.1
Received requests : 81
Sent requests : 0
Dropped requests : 81
Received replies : 0
Sent replies : 0
Dropped replies : 0
Received keepalives : 1
Sent keepalive replies : 1
Received configuration updates: 0
Sent configuration updates : 0
Context : ctx2
User : user1
Session ID : 2
User IPv6 address : 1234::5001
Received requests : 81
Sent requests : 0
Dropped requests : 81
Received replies : 0
Sent replies : 0
Dropped replies : 0
Received keepalives : 1
Sent keepalives replies : 1
Received configuration updates: 0
Sent configuration updates : 0
# Display IP access packet statistics for user user1 in SSL VPN context ctx1.
<Sysname> display sslvpn ip-tunnel statistics context ctx1 user user1
SSL VPN session IP-tunnel statistics:
Context : ctx1
User : user1
Session ID : 1
User IPv4 address : 192.168.56.1
Received requests : 81
Sent requests : 0
Dropped requests : 81
Received replies : 0
Sent replies : 0
Dropped replies : 0
Received keepalives : 1
Sent keepalive replies : 1
Received configuration updates: 0
Sent configuration updates : 0
Context : ctx1
User : user1
Session ID : 2
User IPv6 address : 1234::5001
Received requests : 81
Sent requests : 0
Dropped requests : 81
Received replies : 0
Sent replies : 0
Dropped replies : 0
Received keepalives : 1
Sent keepalives replies : 1
Received configuration updates: 0
Sent configuration updates : 0
Table 7 Command output
Field |
Description |
Context |
SSL VPN context to which the SSL VPN user belongs. |
User |
Login username used by the SSL VPN user. |
User IPv4 address |
IPv4 address of the SSL VPN user. |
User IPv6 address |
IPv6 address of the SSL VPN user. |
Received requests |
Number of IP access requests received by the SSL VPN gateway from the user. |
Sent requests |
Number of IP access requests forwarded by the SSL VPN gateway to internal servers. |
Dropped requests |
Number of IP access requests dropped by the SSL VPN gateway. |
Received replies |
Number of IP access replies received by the SSL VPN gateway from internal servers. |
Sent replies |
Number of IP access replies forwarded by the SSL VPN gateway to the user. |
Dropped replies |
Number of IP access replies dropped by the SSL VPN gateway. |
Received keepalives |
Number of keepalive messages received by the SSL VPN gateway from the user. |
Sent keepalives replies |
Number of keepalive replies sent by the SSL VPN gateway to the user. |
Received configuration updates |
Number of configuration update messages received by the SSL VPN gateway from the user. |
Sent configuration updates |
Number of configuration update messages sent by the SSL VPN gateway to the user. |
Client |
Statistics of the traffic transmitted between the SSL VPN gateway and the IP access client: · In bytes—Number of bytes received by the SSL VPN gateway from the client. · Out bytes—Number of bytes sent by the SSL VPN gateway to the client. |
Server |
Statistics of the traffic transmitted between the SSL VPN gateway and the server: · In bytes—Number of bytes received by the SSL VPN gateway from the server. · Out bytes—Number of bytes sent by the SSL VPN gateway to the client. |
display sslvpn policy-group
Use display sslvpn policy-group to display SSL VPN policy group information.
Syntax
display sslvpn policy-group group-name [ context context-name ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
group-name: Specifies a policy group by its name, a case-insensitive string of 1 to 31 characters.
context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays information about policy groups with the specified group name in all SSL VPN contexts.
Examples
# Display information about policy groups named pg1 in all SSL VPN contexts.
<Sysname> display sslvpn policy-group pg1
Group policy: pg1
Context: context1
Idle timeout: 35 min
Context: context2
Idle timeout: 40 min
Table 8 Command output
Field |
Description |
Idle timeout |
Maximum idle time of an SSL VPN session, in minutes. |
display sslvpn port-forward connection
Use display sslvpn port-forward connection to display TCP port forwarding connection information.
Syntax
In standalone mode:
display sslvpn port-forward connection [ context context-name ]
In IRF mode:
display sslvpn port-forward connection [ context context-name ] [ slot slot-number ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays TCP port forwarding connection information for all SSL VPN contexts.
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays TCP port forwarding connection information for all member devices. (In IRF mode.)
Examples
# (In standalone mode.) Display TCP port forwarding connection information for all SSL VPN contexts.
<Sysname> display sslvpn port-forward connection
SSL VPN context : ctx1
Client address : 192.0.2.1
Client port : 1025
Server address : 192.168.0.39
Server port : 80
Status : Connected
SSL VPN context : ctx2
Client address : 3000::983F:7A36:BD06:342D
Client port : 56190
Server address : 300::1
Server port : 23
Status : Connecting
# (In IRF mode.) Display TCP port forwarding connection information for all SSL VPN contexts.
<Sysname> display sslvpn port-forward connection
SSL VPN context : ctx1
Client address : 192.0.2.1
Client port : 1025
Server address : 192.168.0.39
Server port : 80
Slot : 1
Status : Connected
SSL VPN context : ctx2
Client address : 3000::983F:7A36:BD06:342D
Client port : 56190
Server address : 300::1
Server port : 23
Slot : 1
Status : Connecting
Table 9 Command output
Field |
Description |
Client address |
IP address of the SSL VPN client. |
Client port |
Port number of the SSL VPN client. |
Server address |
IP address of the internal server. |
Server port |
Port number of the internal server. |
Slot |
(In IRF mode.) IRF member ID of the device. |
Status |
Connection status, Connected or Connecting. |
display sslvpn session
Use display sslvpn session to display SSL VPN session information.
Syntax
display sslvpn session [ context context-name ] [ user user-name | verbose ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays SSL VPN session information for all SSL VPN contexts.
user user-name: Specifies an SSL VPN user by the username, a case-insensitive string of 1 to 63 characters. If you specify a user, this command displays detailed SSL VPN session information for the user. If you do not specify a user, this command displays brief SSL VPN session information for all users.
verbose: Displays detailed SSL VPN session information for all SSL VPN users. If you do not specify this keyword, the command displays brief SSL VPN session information for the specified or all SSL users.
Examples
# Display brief SSL VPN session information for all users in all SSL VPN contexts.
<Sysname> display sslvpn session
Total users: 4
SSL VPN context: ctx1
Users: 2
Username Connections Idle time Created User IP
user1 5 0/00:00:23 0/04:47:16 192.0.2.1
user2 5 0/00:00:46 0/04:48:36 192.0.2.2
SSL VPN context: ctx2
Users: 2
Username Connections Idle time Created User IP
user3 5 0/00:00:30 0/04:50:06 192.168.2.1
user4 5 0/00:00:50 0/04:51:16 192.168.2.2
Table 10 Command output
Field |
Description |
Total users |
Total number of users in all SSL VPN contexts. |
SSL VPN context |
Name of the SSL VPN context. |
Users |
Number of users in the SSL VPN context. |
Username |
Login name for the SSL VPN session. |
Connections |
Number of connections in the SSL VPN session. |
Idle time |
Duration that the SSL VPN session has been idle, in the format of days/hh:mm:ss. |
Created |
Time elapsed since the SSL VPN session was created, in the format of days/hh:mm:ss. |
User IP |
IP address used by the SSL VPN session. |
# Display SSL VPN session information for SSL VPN user user1.
<Sysname> display sslvpn session user user1
User : user1
Context : context1
Policy group : pgroup
Idle timeout : 30 min
Created at : 13:49:27 UTC Wed 05/14/2014
Lastest : 17:50:58 UTC Wed 05/14/2014
User IPv4 address : 192.0.2.1
Session ID : 1
Web browser/OS : Internet Explorer
User : user1
Context : context2
Policy group : Default
Idle timeout : 2100 sec
Created at : 14:15:12 UTC Wed 05/14/2014
Lastest : 18:56:58 UTC Wed 05/14/2014
User IPv6 address : 0:30::983F:7A36:BD06:342D
Session ID : 5
Web browser/OS : Internet Explorer
# Display detailed SSL VPN session information for all users in all SSL VPN contexts.
<Sysname> display sslvpn session verbose
User : user1
Context : context1
Policy group : pgroup
Idle timeout : 30 min
Created at : 13:49:27 UTC Wed 05/14/2014
Lastest : 17:50:58 UTC Wed 05/14/2014
User IPv4 address : 192.0.2.1
Session ID : 1
Web browser/OS : Internet Explorer
User : user1
Context : context2
Policy group : Default
Idle timeout : 2100 sec
Created at : 14:15:12 UTC Wed 05/14/2014
Lastest : 18:56:58 UTC Wed 05/14/2014
User IPv6 address : 0:30::983F:7A36:BD06:342D
Session ID : 5
Web browser/OS : Internet Explorer
Table 11 Command output
Field |
Description |
User |
SSL VPN username. |
Context |
Context to which the user belongs. |
Policy group |
Policy group used by the user. |
Idle timeout |
Idle timeout time of the SSL VPN session, in seconds. |
Created at |
Time at which the SSL VPN session was created. |
Lastest |
Most recent time when the SSL VPN user accessed resources through the SSL VPN session. |
Allocated IP |
IP address allocated to the iNode client of the SSL VPN user. This field is displayed only for iNode users. |
User IPv4 address |
IPv4 address used by the SSL VPN session. |
User IPv6 address |
IPv6 address used by the SSL VPN session. |
Web browser/OS |
Web browser or operating system used by the SSL VPN user. |
dynamic-password enable
Use dynamic-password enable to enable dynamic password verification.
Use undo dynamic-password enable to disable dynamic password verification.
Syntax
dynamic-password enable
undo dynamic-password enable
Default
Dynamic password verification is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Usage guidelines
After dynamic password verification is enabled, a user must enter a correct dynamic password to log in to the SSL VPN webpage.
Examples
# Enable dynamic password verification.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] dynamic-password enable
emo-server
Use emo-server to specify an Endpoint Mobile Office (EMO) server for mobile clients.
Use undo emo-server to restore the default.
Syntax
emo-server address { host-name | ipv4-address } port port-number
undo emo-server
Default
No EMO server is specified for mobile clients.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
address: Specifies the host name or IPv4 address of the EMO server.
host-name: Specifies the host name of the EMO server, a case-insensitive string of 1 to 127 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.).
ipv4-address: Specifies the IPv4 address of the EMO server, in dotted decimal notation. The IP address cannot be a multicast, broadcast, or loopback address.
port port-number: Specifies the port number of the EMO server, in the range of 1025 to 65535.
Usage guidelines
An EMO server provides services for mobile clients. The SSL VPN gateway issues the EMO server information to the clients, and the clients can access available service resources through the EMO server.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Specify the IP address of the EMO server as 10.10.1.1 and the port number as 9058 for context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] emo-server address 10.10.1.1 port 9058
file-policy
Use file-policy to create a file policy and enter its view, or enter the view of an existing file policy.
Use undo file-policy to delete a file policy.
Syntax
file-policy policy-name
undo file-policy policy-name
Default
No file policies exist.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
policy-name: Specifies a file policy name, a case-insensitive string of 1 to 31 characters.
Usage guidelines
The SSL VPN gateway uses a file policy to rewrite the content of Web page files before forwarding them to requesting Web access users.
You can configure multiple file policies in an SSL VPN context.
Examples
# Create a file policy named fp and enter its view.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] file-policy fp
[Sysname-sslvpn-context-ctx-file-policy-fp]
Related commands
sslvpn context
filter ip-tunnel acl
Use filter ip-tunnel acl to specify an advanced ACL for IP access filtering.
Use undo filter ip-tunnel acl to remove the advanced ACL configuration for IP access filtering.
Syntax
filter ip-tunnel [ ipv6 ] acl advanced-acl-number
undo filter ip-tunnel [ ipv6 ] acl
Default
All IP accesses are denied.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
ipv6: Specifies an IPv6 ACL. Do not configure this keyword if you want to specify an IPv4 ACL.
acl advanced-acl-number: Specifies an advanced ACL by its number in the range of 3000 to 3999. If a rule in the specified ACL contains VPN settings, the rule does not take effect.
Usage guidelines
You can specify both an advanced ACL and a URI ACL for IP access filtering.
The SSL VPN gateway uses the following procedure to determine whether to forward an IP access request:
1. Matches the request against rules in the URI ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 2.
2. Matches the request against rules in the advanced ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.
You can specify an IPv4 ACL, IPv6 ACL, or both by using this command, but you cannot specify multiple IPv4 ACLs or IPv6 ACLs. If you specify IPv4 or IPv6 ACLs multiple times, the most recent IPv4 or IPv6 ACL configuration takes effect.
Examples
# Configure policy group pg1 to use IPv4 ACL 3000 and IPv6 ACL 3500 for IP access filtering.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] policy-group pg1
[Sysname-sslvpn-context-ctx1-policy-group-pg1] filter ip-tunnel acl 3000
[Sysname-sslvpn-context-ctx1-policy-group-pg1] filter ip-tunnel ipv6 acl 3500
Related commands
filter ip-tunnel uri-acl
filter ip-tunnel uri-acl
Use filter ip-tunnel uri-acl to specify a URI ACL for IP access filtering.
Use undo filter ip-tunnel uri-acl to remove the URI ACL configuration for IP access filtering.
Syntax
filter ip-tunnel uri-acl uri-acl-name
undo filter ip-tunnel uri-acl
Default
All IP accesses are denied.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist.
Usage guidelines
You can specify both an advanced ACL and a URI ACL for IP access filtering.
The SSL VPN gateway uses the following procedure to determine whether to forward an IP access request:
1. Matches the request against rules in the URI ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 2.
2. Matches the request against rules in the advanced ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.
If a rule in the URI ACL specified for IP access filtering contains HTTP or HTTPS settings, the rule does not take effect.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Configure policy group abcpg to use URI ACL abcuriacl for IP access filtering.
<Sysname> system-view
[Sysname] sslvpn context abc
[Sysname-sslvpn-context-abc] policy-group abcpg
[Sysname-sslvpn-context-abc-policy-group-abcpg] filter ip-tunnel uri-acl abcuriacl
filter tcp-access acl
Use filter tcp-access acl to specify an advanced ACL for TCP access filtering.
Use undo filter tcp-access acl to remove the advanced ACL configuration for TCP access filtering.
Syntax
filter tcp-access [ ipv6 ] acl advanced-acl-number
undo filter tcp-access [ ipv6 ] acl
Default
A user can access only the TCP resources in the TCP port forwarding list authorized to the user.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
ipv6: Specifies an IPv6 ACL. Do not configure this keyword if you want to specify an IPv4 ACL.
acl advanced-acl-number: Specifies an advanced ACL by its number in the range of 3000 to 3999. If a rule in the specified ACL contains VPN settings, the rule does not take effect.
Usage guidelines
You can specify both an advanced ACL and a URI ACL for TCP access filtering.
For mobile client users, the SSL VPN gateway uses the following procedure to determine whether to forward a TCP access request:
1. Matches the request against the authorized port forwarding list.
¡ If the request matches a port forwarding item in the list, the gateway forwards the request.
¡ If the request does not match any port forwarding items in the list, the gateway proceeds to step 2.
2. Matches the request against the rules in the URI ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 3.
3. Matches the request against the rules in the advanced ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.
For PC users, the ACLs configured for TCP access filtering do not take effect. They can access only the TCP resources authorized to them through the TCP port forwarding list.
You can specify an IPv4 ACL, IPv6 ACL, or both by using this command, but you cannot specify multiple IPv4 ACLs or IPv6 ACLs. If you specify IPv4 or IPv6 ACLs multiple times, the most recent IPv4 or IPv6 ACL configuration takes effect.
Examples
# Configure policy group pg1 to use IPv4 ACL 3000 and IPv6 ACL 3500 for TCP access filtering.
<Sysname> system-view
[Sysname]sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] policy-group pg1
[Sysname-sslvpn-context-ctx1-policy-group pg1] filter tcp-access acl 3000
[Sysname-sslvpn-context-ctx1-policy-group pg1] filter tcp-access ipv6 acl 3500
Related commands
filter tcp-access uri-acl
filter tcp-access uri-acl
Use filter tcp-access uri-acl to specify a URI ACL for TCP access filtering.
Use undo filter tcp-access uri-acl to remove the URI ACL configuration for TCP access filtering.
Syntax
filter tcp-access uri-acl uri-acl-name
undo filter tcp-access uri-acl
Default
A user can access only the TCP resources in the TCP port forwarding list authorized to the user.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist.
Usage guidelines
You can specify both an advanced ACL and a URI ACL for TCP access filtering.
For mobile client users, the SSL VPN gateway uses the following procedure to determine whether to forward a TCP access request:
1. Matches the request against the authorized port forwarding list.
¡ If the request matches a port forwarding items in the list, the gateway forwards the request.
¡ If the request does not match any port forwarding items in the list, the gateway proceeds to step 2.
2. Matches the request against the rules in the URI ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 3.
3. Matches the request against the rules in the advanced ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.
For PC users, the ACLs configured for TCP access filtering do not take effect. They can access only the TCP resources authorized to them through the TCP port forwarding list.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Configure policy group abcpg to use URI ACL abcuriacl2 for TCP access filtering.
<Sysname> system-view
[Sysname] sslvpn context abc
[Sysname-sslvpn-context-abc] policy-group abcpg
[Sysname-sslvpn-context-abc-policy-group-abcpg] filter tcp-access uri-acl abcuriacl2
Related commands
filter tcp-access acl
filter web-access acl
Use filter web-access acl to specify an advanced ACL for Web access filtering.
Use undo filter web-access acl to remove the advanced ACL configuration for Web access filtering.
Syntax
filter web-access [ ipv6 ] acl advanced-acl-number
undo filter web-access [ ipv6 ] acl
Default
A user can access only the Web resources in the URL list authorized to the user.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
ipv6: Specifies an IPv6 ACL. Do not configure this keyword if you want to specify an IPv4 ACL.
acl advanced-acl-number: Specifies an advanced ACL by its number in the range of 3000 to 3999. If a rule in the specified ACL contains VPN settings, the rule does not take effect.
Usage guidelines
You can specify both an advanced ACL and a URI ACL for Web access filtering.
The SSL VPN gateway uses the following procedure to determine whether to forward a Web access request:
1. Matches the request against the authorized URL list.
¡ If the request matches a URL item in the list, the gateway forwards the request.
¡ If the request does not match any URL entries in the list, the gateway proceeds to step 2.
2. Matches the request against rules in the URI ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 3.
3. Matches the request against rules in the advanced ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.
You can specify an IPv4 ACL, IPv6 ACL, or both by using this command, but you cannot specify multiple IPv4 ACLs or IPv6 ACLs. If you specify IPv4 or IPv6 ACLs multiple times, the most recent IPv4 or IPv6 ACL configuration takes effect.
Examples
# Configure policy group pg1 to use IPv4 ACL 3000 and IPv6 ACL 3500 for Web access filtering.
<Sysname> system-view
[Sysname]sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] policy-group pg1
[Sysname-sslvpn-context-ctx1-policy-group pg1] filter web-access acl 3000
[Sysname-sslvpn-context-ctx1-policy-group pg1] filter web-access ipv6 acl 3500
Related commands
filter web-access uri-acl
filter web-access uri-acl
Use filter web-access uri-acl to specify a URI ACL for Web access filtering.
Use undo filter web-access uri-acl to remove the URI ACL configuration for Web access filtering.
Syntax
filter web-access uri-acl uri-acl-name
undo filter web-access uri-acl
Default
Users can access only the Web resources authorized to them through the URL list.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist.
Usage guidelines
The SSL VPN gateway uses the following procedure to determine whether to forward a Web access request:
1. Matches the request against the authorized URL list.
¡ If the request matches a URL item in the list, the gateway forwards the request.
¡ If the request does not match any URL entries in the list, the gateway proceeds to step 2.
2. Matches the request against rules in the URI ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 3.
3. Matches the request against rules in the advanced ACL:
¡ If the request matches a permit rule, the gateway forwards the request.
¡ If the request matches a deny rule, the gateway drops the request.
¡ If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Configure policy group abcpg to use URI ACL abcuriacl1 for Web access filtering.
<Sysname> system-view
[Sysname] sslvpn context abc
[Sysname-sslvpn-context-abc] policy-group abcpg
[Sysname-sslvpn-context-abc-policy-group-abcpg] filter web-access uri-acl abcuriacl1
Related commands
filter web-access acl
force-logout
Use force-logout to force online users to log out.
Syntax
force-logout [ all | session session-id | user user-name ]
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
all: Logs out all users.
session session-id: Logs out all users in a session. The session-id argument specifies the session ID in the range of 1 to 4294967295.
user user-name: Logs out a user. The user-name argument specifies the username, a case-sensitive string of 1 to 63 characters.
Examples
# Log out all users in session 1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] force-logout session 1
force-logout max-onlines enable
force-logout max-onlines enable to enable the force logout feature.
undo force-logout max-onlines enable to disable the force logout feature.
Syntax
force-logout max-onlines enable
undo force-logout max-onlines enable
Default
The force logout feature is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Usage guidelines
By default, a user cannot log in if the number of logins using the account reaches the limit.
When a login is attempted but logins using the account reach the maximum, this feature logs out the user with the longest idle time to allow the new login.
Examples
# Enable the force logout feature.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] force-logout max-onlines enable
gateway
Use gateway to associate an SSL VPN context with an SSL VPN gateway.
Use undo gateway to remove associated SSL VPN gateways.
Syntax
gateway gateway-name [ domain domain-name | virtual-host virtual-host-name ]
undo gateway [ gateway-name ]
Default
An SSL VPN context is not associated with an SSL VPN gateway.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
gateway-name: Specifies an SSL VPN gateway by its name, a case-insensitive string of 1 to 31 characters. Valid characters are letters, digits, and underscores (_).
domain domain-name: Specifies a domain name for the SSL VPN context, a case-insensitive string of 1 to 127 characters.
virtual-host virtual-host-name: Specifies a virtual host name for the SSL VPN context, a case-insensitive string of 1 to 127 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.).
Usage guidelines
When you associate an SSL VPN context with an SSL VPN gateway, follow these guidelines:
· Make sure the context has a domain name or virtual host name different than any existing contexts associated with the SSL VPN gateway.
The SSL VPN gateway uses the domain name or virtual host name that a remote user entered to determine the SSL VPN context to which the user belongs.
· If you do not specify a domain name or virtual host name for the context, you cannot associate other SSL VPN contexts with the SSL VPN gateway.
You can associate an SSL VPN context with a maximum of 10 SSL VPN gateways.
Examples
# Associate SSL VPN context ctx1 with SSL VPN gateway gw1, and specify the domain name as domain1 for the context.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] gateway gw1 domain domain1
Related commands
display sslvpn context
heading
Use heading to configure a heading for a URL list.
Use undo heading to restore the default.
Syntax
heading string
undo heading
Default
The heading of a URL list is Web.
Views
URL list view
Predefined user roles
network-admin
Parameters
string: Specifies a URL list heading, a case-sensitive string of 1 to 31 characters.
Examples
# Specify urlhead as the heading of URL list url.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] url-list url
[Sysname-sslvpn-context-ctx1-url-list-url] heading urlhead
Related commands
sslvpn context
url-list
http-redirect
Use http-redirect to enable HTTP redirection.
Use undo http-redirect to disable HTTP redirection.
Syntax
http-redirect [ port port-number ]
undo http-redirect
Default
HTTP redirection is disabled. An SSL VPN gateway does not process HTTP traffic.
Views
SSL VPN gateway view
Predefined user roles
network-admin
Parameters
port-number: Specifies the HTTP port number to listen to, a value of 80 (the default) or in the range of 1025 to 65535.
Usage guidelines
This command enables an SSL VPN gateway to perform the following operations:
1. Listen to an HTTP port.
2. Redirect HTTP requests with the port number to the port used by HTTPS.
3. Send redirection packets to clients.
Examples
# Enable HTTP redirection for HTTP port 1025.
<Sysname> system-view
[Sysname] sslvpn gateway gateway1
[Sysname-sslvpn-gateway-gateway1] http-redirect port 1025
idle-cut traffic-threshold
Use idle-cut traffic-threshold to set the SSL VPN session idle-cut traffic threshold.
Use undo idle-cut traffic-threshold to restore the default.
Syntax
idle-cut traffic-threshold kilobytes
undo idle-cut traffic-threshold
Default
The SSL VPN session idle-cut traffic threshold is 0 Kilobytes. An SSL VPN session will be disconnected if no traffic is transmitted within the session idle timeout.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
kilobytes: Specifies the session idle-cut traffic threshold in Kilobytes. The value range is 1 to 4294967295.
Usage guidelines
The SSL VPN session idle-cut traffic threshold refers to the minimum traffic required in the session idle timeout interval for a session not to be disconnected as an idle session.
After the idle-cut traffic threshold is set, the system counts the traffic transmitted in each SSL VPN session at intervals specified by the timeout idle command. If the traffic is less than the idle-cut traffic threshold, the system determines the session to be idle and disconnects the session.
If you change the setting of the idle-cut traffic-threshold or timeout idle command in an SSL VPN context, all session idle-cut traffic counters in the SSL VPN context will be cleared.
Examples
# Set the SSL VPN session idle-cut traffic threshold to 1000 Kilobytes in SSL VPN context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] idle-cut traffic-threshold 1000
Related commands
timeout idle
include
Use include to add an included route to a route list.
Use undo include to delete an included route from a route list.
Syntax
include ip-address { mask | mask-length }
undo include ip-address { mask | mask-length }
Default
No included routes exist.
Views
Route list view
Predefined user roles
network-admin
Parameters
ip-address: Specifies the destination IP address of the route. It cannot be a multicast, broadcast, or loopback address. The specified IP address must be the address of the network segment where the internal servers reside.
mask: Specifies the subnet mask.
mask-length: Specifies the mask length of the route, an integer in the range of 0 to 32.
Usage guidelines
To permit user access to specific network nodes or segments behind an SSL VPN gateway, configure included routes for those nodes or segments.
When a client accesses an SSL VPN gateway in IP access mode, the SSL VPN gateway issues the included routes to the client. The client adds the included routes to the local routing table, using the VNIC as the output interface. Traffic that matches the included routes are sent to the SSL VPN gateway through the VNIC.
You can add multiple included routes to a route list.
If you execute the include and exclude commands to add the same route to a route list, the most recent configuration takes effect.
Examples
# Add included route 10.0.0.0/8 to route list rtlist.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] ip-route-list rtlist
[Sysname-sslvpn-context-ctx1-route-list-rtlist] include 10.0.0.0 8
Related commands
exclude
interface sslvpn-ac
Use interface sslvpn-ac to create an SSL VPN AC interface and enter its view, or enter the view of an existing SSL VPN AC interface.
Use undo interface sslvpn-ac to delete an SSL VPN AC interface.
Syntax
interface sslvpn-ac interface-number
undo interface sslvpn-ac interface-number
Default
No SSL VPN AC interfaces exist.
Views
System view
Predefined user roles
network-admin
Parameters
interface-number: Specifies an SSL VPN AC interface number in the range of 0 to 4095.
Examples
# Create SSL VPN AC 1000 and enter its view.
<Sysname>system-view
[Sysname]interface SSLVPN-AC 1000
[Sysname-SSLVPN-AC1000]
ip address
Use ip address to configure an IPv4 address and a port number for an SSL VPN gateway.
Use undo ip address to restore the default.
Syntax
ip address ip-address [ port port-number ]
undo ip address
Default
An SSL VPN gateway uses IPv4 address 0.0.0.0 and port number 443.
Views
SSL VPN gateway view
Predefined user roles
network-admin
Parameters
ip-address: Specifies an IP address for the SSL VPN gateway, in dotted decimal notation.
port port-number: Specifies a port number for the SSL VPN gateway. The port number is 443 (the default value) or in the range of 1025 to 65535.
Usage guidelines
A remote user uses the IPv4 address and port number configured by this command to access an SSL VPN gateway.
The specified IPv4 address must be the IP address of an interface on the gateway device and is reachable from clients and internal servers.
If the gateway uses the default address (0.0.0.0), make sure its port number is different from the port number of the HTTPS server on the device.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Configure the IPv4 address of SSL VPN gateway gw1 as 10.10.1.1 and the port number as 8000.
<Sysname> system-view
[Sysname] sslvpn gateway gw1
[Sysname-sslvpn-gateway-gw1] ip address 10.10.1.1 port 8000
Related commands
display sslvpn gateway
ip-route-list
Use ip-route-list to create a route list for an SSL VPN context and enter its view, or enter the view of an existing route list.
Use undo ip-route-list to delete a route list.
Syntax
ip-route-list list-name
undo ip-route-list list-name
Default
No route lists exist.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
list-name: Specifies a name for the route list, a case-insensitive string of 1 to 31 characters.
Usage guidelines
You can add routes to a route list. The routes can be issued to IP access clients for them to access internal servers behind the SSL VPN gateway.
You cannot delete a route list that is used by a policy group. To delete the route list, execute the undo ip-tunnel access-route command to remove the configuration and then execute the undo ip-route-list command.
Examples
# In SSL VPN context ctx1, create a route list named rtlist and enter its view.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] ip-route-list rtlist
[Sysname-sslvpn-context-ctx1-route-list-rtlist]
Related commands
ip-tunnel access-route
ip-tunnel access-route
Use ip-tunnel access-route to specify the routes to be issued to clients.
Use undo ip-tunnel access-route to restore the default.
Syntax
ip-tunnel access-route { ip-address { mask-length | mask } | force-all | ip-route-list list-name }
undo ip-tunnel access-route
Default
No routes to be issued to clients are specified.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
ip-address { mask-length | mask }: Configures a route to be issued to a client. The ip-address argument specifies the destination address of the route. It cannot be a multicast, broadcast, or loopback address. The mask-length argument specifies the mask length of the route, in the range of 0 to 32.
force-all: Forces all traffic to be sent to the SSL VPN gateway.
ip-route-list list-name: Issues routes in the specified route list to clients. The list-name argument specifies the route list name, a case-insensitive string of 1 to 31 characters. The specified route list must have been created by using the ip-route-list command.
Usage guidelines
When a client accesses an SSL VPN gateway in IP access mode, the SSL VPN gateway issues the configured route or the specified routes to the client. The client adds the routes, using the VNIC as the output interface. Packets from the client to the internal servers match the routes, and therefore are sent to the SSL VPN gateway through the VNIC.
To issue multiple routes to a client, execute the ip-tunnel access-route ip-route-list list-name command. To issue a route to a client, execute the ip-tunnel access-route ip-address { mask-length | mask } command.
After you execute the ip-tunnel access-route force-all command, the SSL VPN gateway issues a default route to the SSL VPN client. The default route uses the VNIC as the output interface and has the highest priority among all default routes on the client. Packets for destinations not in the routing table are sent to the SSL VPN gateway through the VNIC. The SSL VPN gateway monitors the SSL VPN client in real time. It does not allow the client to delete the default route or add a default route with a higher priority.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# In the view of policy group pg1, configure the SSL VPN gateway to issue routes in route list rtlist to a client.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] ip-route-list rtlist
[Sysname-sslvpn-context-ctx1-route-list-rtlist] include 10.0.0.0 8
[Sysname-sslvpn-context-ctx1-route-list-rtlist] include 20.0.0.0 8
[Sysname-sslvpn-context-ctx1-route-list-rtlist] quit
[Sysname-sslvpn-context-ctx1] policy-group pg1
[Sysname-sslvpn-context-ctx1-policy-group-pg1] ip-tunnel access-route ip-route-list rtlist
Related commands
ip-route-list
ip-tunnel address-pool (SSL VPN context view)
Use ip-tunnel address-pool to specify an address pool for IP access in an SSL VPN context.
Use undo ip-tunnel address-pool to restore the default.
Syntax
ip-tunnel address-pool pool-name mask { mask-length | mask }
undo ip-tunnel address-pool
Default
No address pool is specified for IP access in an SSL VPN context.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
pool-name: Specifies an address pool by its name, a case-insensitive string of 1 to 31 characters.
mask { mask-length | mask }: Specifies the mask length or mask of the address pool. The value range for the mask length is 1 to 30.
Usage guidelines
When a client accesses an SSL VPN gateway in IP access mode, the SSL VPN gateway allocates an IP address to the client from either of the following address pools:
· Address pool specified for the policy group authorized to the client.
· Address pool specified for the SSL VPN context. This address pool is used only if no address pool is specified for the policy group authorized to the client.
If no free address is available in the address pool or the address pool does not exist, address allocation to the client will fail and the client's IP access request will be rejected.
If you specify a nonexistent address pool, the pool is effective for address allocation after it is created.
You can specify only one address pool for an SSL VPN context. If you execute this command multiple times, the most recent configuration takes effect.
For IP access users to access the SSL VPN gateway correctly, make sure the IP addresses in the address pool do not conflict with the IP addresses used on the device.
Examples
# Specify address pool pool1 for IP access.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] ip-tunnel address-pool pool1 mask 24
Related commands
sslvpn ip address-pool
ip-tunnel address-pool (SSL VPN policy group view)
Use ip-tunnel address-pool to specify an address pool for IP access in an SSL VPN policy group.
Use undo ip-tunnel address-pool to restore the default.
Syntax
ip-tunnel address-pool pool-name mask { mask-length | mask }
undo ip-tunnel address-pool
Default
No address pool is specified for IP access in an SSL VPN policy group.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
pool-name: Specifies an address pool by its name, a case-insensitive string of 1 to 31 characters.
mask { mask-length | mask }: Specifies the mask length or mask of the address pool. The value range for the mask length is 1 to 30.
Usage guidelines
When a client accesses an SSL VPN gateway in IP access mode, the SSL VPN gateway allocates an IP address to the client from either of the following address pools:
· Address pool specified for the policy group authorized to the client.
· Address pool specified for the SSL VPN context. This address pool is used only if no address pool is specified for the policy group authorized to the client.
If no free address is available in the address pool or the address pool does not exist, address allocation to the client will fail and the client's IP access request will be rejected.
If you specify a nonexistent address pool, the pool is effective for address allocation after it is created.
You can specify only one address pool for an SSL VPN policy group. If you execute this command for an SSL VPN policy group multiple times, the most recent configuration takes effect.
For IP access users to access the SSL VPN gateway correctly, make sure the IP addresses in the address pool do not conflict with the IP addresses used on the device.
Examples
# Specify address pool pool1 for IP access in SSL VPN policy group pg1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] policy-group pg1
[Sysname-sslvpn-context-ctx1-policy-group-pg1] ip-tunnel address-pool pool1 mask 24
Related commands
sslvpn ip address-pool
ip-tunnel dns-server
Use ip-tunnel dns-server to specify a DNS server for IP access.
Use undo ip-tunnel dns-server to restore the default.
Syntax
ip-tunnel dns-server { primary | secondary } ip-address
undo ip-tunnel dns-server { primary | secondary }
Default
No DNS servers are specified for IP access.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
primary: Specifies the primary DNS server.
secondary: Specifies the secondary DNS server.
ip-address: Specifies the IP address of the DNS server. It cannot be a multicast, broadcast, or loopback address.
Examples
# Specify the primary DNS server 1.1.1.1 for IP access.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] ip-tunnel dns-server primary 1.1.1.1
ip-tunnel interface
Use ip-tunnel interface to specify an SSL VPN AC interface for IP access in an SSL VPN context.
Use undo ip-tunnel interface to restore the default.
Syntax
ip-tunnel interface sslvpn-ac interface-number
undo ip-tunnel interface
Default
No SSL VPN AC interface is specified for IP access in an SSL VPN context.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
sslvpn-ac interface-number: Specifies the number of an SSL VPN AC interface. The interface must have been created.
Usage guidelines
The SSL VPN gateway uses the specified SSL VPN AC interface to communicate with SSL VPN users in IP access mode. It uses the SSL VPN AC interface to forward packets sent by the user to remote servers and to forward the servers' replies back to the user.
Examples
# Specify SSL VPN AC 100 for IP access.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] ip-tunnel interface sslvpn-ac 100
Related commands
interface sslvpn-ac
ip-tunnel keepalive
Use ip-tunnel keepalive to set the keepalive interval for IP access.
Use undo ip-tunnel keepalive to restore the default.
Syntax
ip-tunnel keepalive seconds
undo ip-tunnel keepalive
Default
The keepalive interval is 30 seconds for IP access.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
seconds: Specifies the keepalive interval in the range of 0 to 600 seconds. If the interval is set to 0 seconds, a client does not send keepalive messages to the SSL VPN gateway.
Usage guidelines
A client sends keepalive messages to the SSL VPN gateway to maintain sessions between them.
If an SSL VPN gateway does not receive any data or keepalive messages from a client during the session idle timeout time, it terminates the session with the client.
Set the keepalive interval to be shorter than the session idle timeout timer configured by the timeout idle command.
Examples
# Set the keepalive interval to 50 seconds for SSL VPN context ctx.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] ip-tunnel keepalive 50
ip-tunnel log connection-close
Use ip-tunnel log connection-close to enable logging for IP connection close events.
Use undo ip-tunnel log connection-close to disable logging for IP connection close events.
Syntax
ip-tunnel log connection-close
undo ip-tunnel log connection-close
Default
Logging for IP connection close events is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Usage guidelines
This feature logs connection close events for IP access users. The logs are sent to the information center of the device. For the logs to be output correctly, you must also configure the information center on the device. For more information about the information center, see Network Management and Monitoring Configuration Guide.
Examples
# Enable logging for IP connection close events.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] ip-tunnel log connection-close
Related commands
sslvpn context
ip-tunnel web-resource auto-push
Use ip-tunnel web-resource auto-push to enable automatic pushing of accessible resources to IP access users through the Web page.
Use undo ip-tunnel web-resource auto-push to disable automatic pushing of accessible resources to IP access users through the Web page.
Syntax
ip-tunnel web-resource auto-push
undo ip-tunnel web-resource auto-push
Default
Automatic pushing of accessible resources to IP access users through the Web page is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Usage guidelines
This feature enables automatic pushing of accessible resources to a user through the Web page after the user logs in to the SSL VPN gateway through the IP access client.
Examples
# Enable automatic pushing of accessible resources to IP access users through the Web page in SSL VPN context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] ip-tunnel web-resource auto-push
ip-tunnel wins-server
Use ip-tunnel wins-server to specify a WINS server for IP access.
Use undo ip-tunnel wins-server to restore the default.
Syntax
ip-tunnel wins-server { primary | secondary } ip-address
undo ip-tunnel wins-server { primary | secondary }
Default
No WINS servers are specified for IP access.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
primary: Specifies the primary WINS server.
secondary: Specifies the secondary WINS server.
ip-address: Specifies the IPv4 address of the WINS server. It cannot be a multicast, broadcast, or loopback address.
Examples
# Specify the primary WINS server 1.1.1.1 for IP access.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] ip-tunnel wins-server primary 1.1.1.1
local-port
Use local-port to configure a port forwarding instance for a port forwarding item.
Use undo local-port to remove the configuration.
Syntax
local-port local-port-number local-name local-name remote-server remote-server remote-port remote-port-number [ description text ]
undo local-port
Default
A port forwarding item does not contain a port forwarding instance.
Views
Port forwarding item view
Predefined user roles
network-admin
Parameters
local-port-number: Specifies a local port number in the range of 1 to 65535. The specified port number must be different from the port numbers of any existing services on the SSL VPN client.
local-name local-name: Specifies a local address or a local host name, a case-insensitive string of 1 to 253 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.). To specify an IPv4 address, use an address in the network segment 127.0.0.0/8. To specify an IPv6 address, enclose the IPv6 address in brackets. For example, local-name [1234::5678].
remote-server remote-server: Specifies the IP address or domain name of a TCP service on an internal server. The remote-server argument is a case-insensitive string of 1 to 253 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.). To specify an IPv6 address, enclose the IPv6 address in brackets. For example, remote-server [1234::5678].
remote-port remote-port-number: Specifies the port number of the TCP service on the internal server, in the range of 1 to 65535.
description text: Specifies a description, a case-sensitive string of 1 to 63 characters.
Usage guidelines
A port forwarding instance maps a TCP service on an internal server to a local address and port number on an SSL VPN client.
For example, for an SSL VPN client to use local address 127.0.0.1 and port 80 to access the internal HTTP server 192.168.0.213, perform the following tasks:
1. Create a port forwarding item (tcp1 in this example).
2. Configure a port forwarding instance for the port forwarding item.
local-port 80 local-name 127.0.0.1 remote-server 192.168.0.213 remote-port 80
The port forwarding instance will be displayed together with the port forwarding item name on the SSL VPN Web page. In this example, tcp1 (127.0.0.1:80 -> 192.168.0.213) will be displayed.
If you map a TCP service to a local host name, the TCP access client software will add the IP address corresponding to the host name to the host file hosts. When the client logs out, the software restores the original host file. The host file hosts is in the directory C:\Windows\System32\drivers\etc of the client host.
You can configure only one port forwarding instance for a port forwarding item. If you execute this command for a port forwarding item multiple times, the most recent configuration takes effect.
Examples
# Configure a port forwarding instance for port forwarding item pfitem1. The port forwarding instance maps IP address 192.168.0.213 and port 80 of the internal HTTP server to local address 127.0.0.1 and port 80.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] port-forward-item pfitem1
[Sysname-sslvpn-context-ctx1-port-forward-item-pfitem1] local-port 80 local-name 127.0.0.1 remote-server 192.168.0.213 remote-port 80 description http
Related commands
port-forward-item
log resource-access enable
Use log resource-access enable to enable resource access logging.
Use undo log resource-access enable to disable resource access logging.
Syntax
log resource-access enable [ brief | filtering ] *
undo log resource-access enable
Default
Resource access logging is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
brief: Records brief resource access information. If you specify this keyword, only the address and port number of the accessed resource will be recorded. If you do not specify this keyword, a large amount of information including webpage formatting information will be recorded.
filtering: Enables resource access log filtering. With this keyword specified, the device generates only one log for accesses of the same user to the same resource in a minute. If this keyword is not specified, the device generates a log for each resource access.
Usage guidelines
This feature logs resource accesses of SSL VPN users. The logs are sent to the information center of the device. For the logs to be output correctly, you must also configure the information center on the device. For more information about the information center, see Network Management and Monitoring Configuration Guide.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Enable resource access logging.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] log resource-access enable
log user-login enable
Use log user-login enable to enable logging for user login and logoff events.
Use undo log user-login enable to disable logging for user login and logoff events.
Syntax
log user-login enable
undo log user-login enable
Default
Logging for user login and logoff events is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Usage guidelines
This feature logs user login and logoff events. The logs are sent to the information center of the device. For the logs to be output correctly, you must also configure the information center on the device. For more information about the information center, see Network Management and Monitoring Configuration Guide.
Examples
# Enable logging for user logins and logouts.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] log user-login enable
login-message
Use login-message to configure the welcome message to be displayed on the SSL VPN login page.
Use undo log login-message to restore the default.
Syntax
login-message { chinese chinese-message | english english-message }
undo login-message { chinese | english }
Default
The login welcome message is Welcome to SSL VPN.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
chinese chinese-message: Configures a login welcome message in Chinese, a case-sensitive string of 1 to 255 characters.
english english-message: Configures a login welcome message in English, a case-sensitive string of 1 to 255 characters.
Examples
# Configure the login welcome message as hello.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] login-message english hello
logo
Use logo to specify a logo to be displayed on SSL VPN webpages.
Use undo logo to restore the default.
Syntax
logo { file file-name | none }
undo logo
Default
The logo displayed on SSL VPN webpages is H3C.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
file file-name: Specifies a logo file by its name, a case-insensitive string of 1 to 255 characters. The file must be a .gif, .jpg, or .png file, and its size cannot exceed 100 KB. As a best practice, use a file whose image resolution is 110*30 pixels.
none: Specifies that no logo is displayed.
Usage guidelines
The specified logo file must exist on the local device.
After you specify a logo file, the logo is displayed on SSL VPN webpages even if the file is deleted.
Examples
# Specify the logo in file flash:/mylogo.gif as the logo displayed on SSL VPN webpages.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] logo file flash:/mylogo.gif
max-onlines
Use max-onlines to set the maximum number of concurrent logins for each account.
Use undo max-onlines to restore the default.
Syntax
max-onlines number
undo max-onlines
Default
The maximum number of concurrent logins for each account is 32.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
number: Specifies the maximum number, in the range of 0 to 1048575. Value 0 indicates that the number of concurrent logins for each account is not limited.
Usage guidelines
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Set the maximum number of concurrent logins for each account to 50.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] max-onlines 50
max-users
Use max-users to set the maximum number of sessions for an SSL VPN context.
Use undo max-users to restore the default.
Syntax
max-users max-number
undo max-users
Default
An SSL VPN context supports a maximum of 1048575 sessions.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
max-number: Specifies the maximum number of sessions, in the range of 1 to 1048575
Usage guidelines
If the limit is reached, new users cannot access the SSL VPN gateway.
Examples
# Set the maximum number of sessions to 500 for SSL VPN context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] max-users 500
Related commands
display sslvpn context
message-server
Use message-server to specify a message server for mobile clients.
Use undo message-server to restore the default.
Syntax
message-server address { host-name | ipv4-address } port port-number
undo message-server
Default
No message server is specified for mobile clients.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
address: Specifies the host name or IPv4 address of the message server.
host-name: Specifies the host name of the message server, a case-insensitive string of 1 to 127 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.).
ipv4-address: Specifies the IPv4 address of the message server, in dotted decimal notation. The IP address cannot be a multicast, broadcast, or loopback address.
port port-number: Specifies the port number of the message server, in the range of 1025 to 65535.
Usage guidelines
A message server provides services for mobile clients. The SSL VPN gateway issues the message server information to the clients, and the clients can access the message server.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Specify the IP address of the message server as 10.10.1.1 and the port number as 8000 for context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] message-server address 10.10.1.1 port 8000
Related commands
sslvpn context
mtu
Use mtu to set the MTU of an SSL VPN AC interface.
Use undo mtu to restore the default.
Syntax
mtu size
undo mtu
Default
The default MTU is 1500 bytes.
Views
SSL VPN AC interface view
Predefined user roles
network-admin
Parameters
size: Specifies an MTU value in the range of 100 to 64000 bytes.
Examples
# Set the MTU of interface SSL VPN AC 1000 to 1430 bytes.
<Sysname> system-view
[Sysname] interface sslvpn-ac 1000
[Sysname-SSLVPN-AC1000] mtu 1430
new-content
Use new-content to specify the new content used to replace the old content.
Use undo new-content to restore the default.
Syntax
new-content string
undo new-content
Default
The new content used to replace the old content is not specified.
Views
Rewrite rule view
Predefined user roles
network-admin
Parameters
string: Specifies the new content, a case-sensitive string of 1 to 256 characters.
Usage guidelines
During file content rewriting, the new content will replace the old content specified by using the old-content command.
If the new content contains spaces, enclose the content in double quotation marks.
Examples
# Specify the new content in rewrite rule rule1 of file policy fp.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] file-policy fp
[Sysname-sslvpn-context-ctx-file-policy-fp] rewrite-rule rule1
[Sysname-sslvpn-context-ctx-file-policy-fp-rewrite-rule-rule1] new-content sslvpn_rewrite_htmlcode(d)
Related commands
old-content
old-content
Use old-content to specify the old file content to be rewritten.
Use undo old-content to restore the default.
Syntax
old-content string
undo old-content
Default
The old file content to be rewritten is not specified.
Views
Rewrite rule view
Predefined user roles
network-admin
Parameters
string: Specifies the old content, a case-sensitive string of 1 to 256 characters.
Usage guidelines
During file content rewriting, the old file content will be replaced by the new content specified by using the new-content command.
If the old content contains spaces, enclose the content in double quotation marks.
In the same file policy, the old content specified in different rewrite rules must be unique.
Examples
# Specify the content to be rewritten in rewrite rule rule1 of file policy fp.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] file-policy fp
[Sysname-sslvpn-context-ctx-file-policy-fp] rewrite rule rule1
[Sysname-sslvpn-context-ctx-file-policy-fp-rewrite-rule-rule1] old-content "a.b.c.innerHTML = d;"
Related commands
new-content
password-authentication enable
Use password-authentication enable to enable username/password authentication.
Use undo password-authentication enable to disable username/password authentication.
Syntax
password-authentication enable
undo password-authentication enable
Default
Username/password authentication is enabled for an SSL VPN context.
Views
SSL VPN context
Predefined user roles
network-admin
Examples
# Disable username/password authentication for SSL VPN context ctx.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] undo password-authentication enable
Related commands
certificate-authentication enable
display sslvpn context
policy-group
Use policy-group to create an SSL VPN policy group and enter its view, or enter the view of an existing SSL VPN policy group.
Use undo policy-group to delete a policy group.
Syntax
policy-group group-name
undo policy-group group-name
Default
No SSL VPN policy groups exist.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
group-name: Specifies a name for the policy group, a case-insensitive string of 1 to 31 characters.
Usage guidelines
An SSL VPN policy group contains a set of rules for resource access authorization.
You can configure multiple SSL VPN policy groups for an SSL VPN context. When a remote user accesses the SSL VPN context, the AAA server issues the authorized policy group to the associated SSL VPN gateway. The user can access only the resources allowed by the authorized policy group. If the AAA server does not authorize the user to use a policy group, the user can access only the resources allowed by the default policy group.
Examples
# Create a policy group named pg1 and enter its view.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] policy-group pg1
[Sysname-sslvpn-context-ctx1-policy-group-pg1]
Related commands
default-policy-group
port-forward
Use port-forward to create a port forwarding list for an SSL VPN context and enter its view, or enter the view of an existing port forwarding list.
Use undo port-forward to delete a port forwarding list.
Syntax
port-forward port-forward-name
undo port-forward port-forward-name
Default
No port forwarding lists exist.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
port-forward-name: Specifies a name for the port forwarding list, a case-insensitive string of 1 to 31 characters.
Usage guidelines
Port forwarding lists provide TCP access services for SSL VPN users.
In port forwarding list view, you can use the port-forward-item command to create port forwarding items. Each port forwarding item defines an accessible TCP service provided on an internal server.
You can assign a port forwarding list to a policy group by using the resources port-forward command. After the AAA server authorizes a user to use a policy group, the SSL VPN Web page provides the user the port forwarding list assigned to the group. The user can access the TCP services provided by the port forwarding list.
Examples
# Create port forwarding list pflist1 and enter its view.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] port-forward pflist1
[Sysname-sslvpn-context-ctx1-port-forward-pflist1]
Related commands
local-port
resources port-forward
port-forward-item
Use port-forward-item to create a port forwarding item and enter its view, or enter the view of an existing port forwarding item.
Use undo port-forward-item to delete a port forwarding item.
Syntax
port-forward-item item-name
undo port-forward-item item-name
Default
No port forwarding items exist.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
item-name: Specifies a name for the port forwarding item, a case-insensitive string of 1 to 31 characters.
Usage guidelines
A port forwarding item provides an accessible TCP service by using a port forwarding instance. A port forwarding instance is configured by using the local-port command. It makes an internal TCP service accessible through a local address and port number on the SSL VPN client.
After you create a port forwarding item, you can assign it to a port forwarding list by using the resources port-forward-item command.
Examples
# Create a port forwarding item named pfitem1 and enter its view.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] port-forward-item pfitem1
[Sysname-sslvpn-context-ctx1-port-forward-item-pfitem1]
Related commands
local-port
resources port-forward-item
reset counters interface sslvpn-ac
Use reset counters interface sslvpn-ac to clear SSL VPN AC interface statistics.
Syntax
reset counters interface [ sslvpn-ac [ interface-number ] ]
Views
User view
Predefined user roles
network-admin
Parameters
sslvpn-ac [ interface-number ]: Specifies an SSL VPN AC interface by its number in the range of 0 to 4095. If you do not specify this option, the command clears statistics for all interfaces. If you specify the sslvpn-ac keyword without the interface-number argument, this command clears statistics for all existing SSL VPN AC interfaces.
Usage guidelines
Use this command to clear old statistics so you can observe new traffic statistics on an SSL VPN AC interface.
Examples
# Clear statistics for SSL VPN AC 1000.
<Sysname> reset counters interface sslvpn-ac 1000
Related commands
display interface sslvpn-ac
reset sslvpn ip-tunnel statistics
Use reset sslvpn ip-tunnel statistics to clear packet statistics for IP access users.
Syntax
reset sslvpn ip-tunnel statistics [ context context-name [ session session-id ] ]
Views
User view
Predefined user roles
network-admin
Parameters
context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command clear packet statistics for IP access users in all SSL VPN contexts.
session session-id: Specifies a session by its ID in the range of 1 to 4294967295. If you do not specify a session, this command clears packet statistics for all IP access users in the specified SSL VPN context.
Usage guidelines
To view the SSL VPN sessions in different SSL VPN contexts, execute the display sslvpn session command.
If you do not specify any parameters, this command clear packets statistics for all IP access users in all SSL VPN contexts.
Examples
# Clear the IP access packet statistics in all SSL VPN contexts.
<Sysname> reset sslvpn ip-tunnel statistics
# Clear the IP access packet statistics in SSL VPN context ctx1.
<Sysname> reset sslvpn ip-tunnel statistics context ctx1
# Clear the IP access packet statistics of session 1 in SSL VPN context ctx.
<Sysname> reset sslvpn ip-tunnel statistics context ctx1 session 1
Related commands
display sslvpn ip-tunnel statistics
display sslvpn session
resources port-forward
Use resources port-forward to assign a port forwarding list to an SSL VPN policy group.
Use undo resources port-forward to remove the configuration.
Syntax
resources port-forward port-forward-name
undo resources port-forward
Default
An SSL VPN policy group does not contain a port forwarding list.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
port-forward-name: Specifies the name of an existing port forwarding list. A port forwarding list name is a case-insensitive string of 1 to 31 characters.
Usage guidelines
After the AAA server authorizes a user to use a policy group, the SSL VPN Web page provides the user the port forwarding list assigned to the group. The user can access the TCP services provided by the port forwarding list.
Examples
# Assign port forwarding list pflist1 to SSL VPN policy group pg1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] policy-group pg1
[Sysname-sslvpn-context-ctx1-policy-group-pg1] resources port-forward pflist1
Related commands
local-port
port-forward
resources port-forward-item
Use resources port-forward-item to assign a port forwarding item to a port forwarding list.
Use undo resources port-forward-item to remove a port forwarding item from a port forwarding list.
Syntax
resources port-forward-item item-name
undo resources port-forward-item item-name
Default
A port forwarding list does not contain any port forwarding items.
Views
Port forwarding list view
Predefined user roles
network-admin
Parameters
item-name: Specifies a port forwarding item by its name, a case-insensitive string of 1 to 31 characters.
Usage guidelines
Before you assign a port forwarding item to a port forwarding list, make sure the port forwarding item has been created by using the port-forward-item command.
You can assign multiple port forwarding items to a port forwarding list.
Examples
# Create a port forwarding item named pfitem1, and then assign it to port forwarding list pflist1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] port-forward-item pfitem1
[Sysname-sslvpn-context-ctx1-port-forward-pflist1-port-forward-item-pfitem1] quit
[Sysname-sslvpn-context-ctx1] port-forward pflist1
[Sysname-sslvpn-context-ctx1-port-forward-pflist1] resources port-forward-item pfitem1
Related commands
port-forward-item
resources uri-acl
Use resources uri-acl to specify a URI ACL for URL resource filtering in a URL item.
Use undo resources uri-acl to remove the URI ACL configuration from a URL item.
Syntax
resources uri-acl uri-acl-name
undo resources uri-acl
Default
No URI ACL is specified for URL resource filtering in a URL item.
Views
URL item view
Predefined user roles
network-admin
Parameters
uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist.
Usage guidelines
The specified URI ACL will be used to filter the accessible resources under the URL specified in the URL item.
Examples
# Specify URI ACL abc in URL item serverA.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] url-item serverA
[Sysname-sslvpn-context-ctx1-url-item-serverA] resources uri-acl abc
Related commands
uri-acl
resources url-item
Use resources url-item to assign a URL item to a URL list.
Use undo resources url-item to remove a URL item from a URL list.
Syntax
resources url-item url-item-name
undo resources url-item url-item-name
Default
A URL list does not contain any URL items.
Views
URL list view
Predefined user roles
network-admin
Parameters
url-item-name: Specifies a URL item by its name, a case-insensitive string of 1 to 31 characters. The specified URL item must already exist.
Usage guidelines
You can assign multiple URL items to a URL list.
Examples
# Assign URL item serverA to URL list list1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] url-list list1
[Sysname-sslvpn-context-ctx1-url-list-list1] resources url-item serverA
Related commands
resources url-list
Use resources url-list to assign a URL list to an SSL VPN policy group.
Use undo resources url-list to remove the configuration.
Syntax
resources url-list url-list-name
undo resources url-list url-list-name
Default
An SSL VPN policy group does not contain a URL list.
Views
SSL VPN policy group view
Predefined user roles
network-admin
Parameters
url-list-name: Specifies an existing URL list by its name, a case-insensitive string of 1 to 31 characters.
Usage guidelines
In Web access mode, a remote user can use a Web browser to access URL resources in the URL list assigned to the authorized SSL VPN policy group.
Examples
# Assign URL list url1 to SSL VPN policy group pg1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] policy-group pg1
[Sysname-sslvpn-context-ctx1-policy-group-pg1] resources url-list url1
Related commands
policy-group
sslvpn context
url-list
rewrite-rule
Use rewrite-rule to create a rewrite rule and enter its view, or enter the view of an existing rewrite rule.
Use undo rewrite-rule to delete a rewrite rule.
Syntax
rewrite-rule rule-name
undo rewrite-rule rule-name
Default
No rewrite rules exist.
Views
File policy view
Predefined user roles
network-admin
Parameters
rule-name: Specifies a rule name, a case-insensitive string of 1 to 31 characters.
Usage guidelines
You can configure multiple rewrite rules in a file policy.
Examples
# Create a rewrite rule named rule1 and enter its view.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] file-policy fp
[Sysname-sslvpn-context-ctx-file-policy-fp] rewrite-rule rule1
[Sysname-sslvpn-context-ctx-file-policy-fp-rewrite-rule-rule1]
rule
Use rule to create a rule for a URI ACL.
Use undo rule to remove a rule from a URI ACL.
Syntax
rule [ rule-id ] { deny | permit } uri uri-pattern-string
undo rule rule-id
Default
No URL ACL rules exist in a URI ACL
Views
URI ACL view
Predefined user roles
network-admin
Parameters
deny: Denies matching packets to pass.
permit: Allows matching packets to pass.
rule-id: Specifies a rule ID in the range of 0 to 65534. If you do not specify a rule ID when creating an ACL rule, the system automatically assigns it a rule ID. The numbering step is 5 for automatic numbering of rule IDs. An automatically assigned rule ID takes the nearest multiple of 5 higher than the current highest rule ID. For example, if the current highest rule ID is 28, the rule is numbered 30.
uri uri-pattern-string: Specifies a URI pattern. The URI pattern can contain a maximum of 256 characters in the format of protocol://host:port/path, where protocol and host are required. See Table 12 for descriptions of the fields in a URI pattern.
Table 12 URI field descriptions
Field |
Description |
protocol |
Protocol name. Options are: · http. · https. · tcp. · udp. · icmp. · ip. |
host |
Domain name or address of a host. · Valid host address formats: ¡ IPv4 or IPv6 address. For example, 192.168.1.1. ¡ IPv4 or IPv6 address range in the format of start address-end address. For example, 3.3.3.1-3.3.3.200. ¡ IPv4 address with a mask length or IPv6 address with a prefix length. For example 2.2.2.2/24. ¡ A combination of the preceding host address formats separated by comma (,). For example, 192.168.1.1,3.3.3.1-3.3.3.200,2.2.2.2/24. · Valid domain name formats: ¡ Fully qualified domain name. For example, www.domain.com ¡ Domain name with the following wildcard characters: |
port |
Port number. If no port number is specified, the default port number of the protocol is used. Valid formats for this field: · Single port number. For example, 1002. · Port number range in the format of start port-end port. For example, 8080-8088. · A combination of the preceding formats separate by comma (,). For example, 1002,90,8080-8088. |
path |
String that identifies a directory or file on the host. The path is a sequence of fields separated by forward or backward slashes. The following wildcard characters are supported: · Asterisk (*)—Matches zero or more characters. For example, /path1/*. · Question mark (?)—Matches one character. For example, /path?/. · Percent sign (%)—Matches one or more characters in a field of the path. For example, /path1/%/. |
Usage guidelines
You can add multiple rules to a URI ACL. The device matches a packet against the rules in ascending order of rule ID. The match process stops once a matching rule is found.
Examples
# Add a rule to URI ACL uriacla.
<Sysname> system-view
[Sysname] sslvpn context abc
[Sysname-sslvpn-context-abc] uri-acl uriacla
[Sysname-sslvpn-context-abc-uri-acl-uriacla] rule 1 permit uri
service enable (SSL VPN context view)
Use service enable to enable an SSL VPN context.
Use undo service enable to disable an SSL VPN context.
Syntax
service enable
undo service enable
Default
An SSL VPN context is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Examples
# Enable SSL VPN context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] service enable
Related commands
display sslvpn context
service enable (SSL VPN gateway view)
Use service enable to enable an SSL VPN gateway.
Use undo service enable to disable an SSL VPN gateway.
Syntax
service enable
undo service enable
Default
An SSL VPN gateway is disabled.
Views
SSL VPN gateway view
Predefined user roles
network-admin
Examples
# Enable SSL VPN gateway gw1.
<Sysname> system-view
[Sysname] sslvpn gateway gw1
[Sysname-sslvpn-gateway-gw1] service enable
Related commands
display sslvpn gateway
session-connections
Use session-connections to set the maximum number of connections allowed per session.
Use undo session-connections to restore the default.
Syntax
session-connections number
undo session-connections
Default
A maximum of 64 connections are allowed per session.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
number: Set the maximum number of connections allowed per session. The value can be 0 or in the range of 10 to 1000. Value 0 indicates that the number of connections per session is not limited.
Usage guidelines
If the number of connections in a session has reached the maximum, new connection requests for the session will be rejected with a 503 Service Unavailable message.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Set the maximum number of connections allowed per session to 10.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] session-connections 10
shutdown
Use shutdown to shut down an SSL VPN AC interface.
Use undo shutdown to bring up an SSL VPN AC interface.
Syntax
shutdown
undo shutdown
Default
An SSL VPN AC interface is up.
Views
SSL VPN AC interface view
Predefined user roles
network-admin
Examples
# Shut down SSL VPN AC 1000.
<Sysname> system-view
[Sysname] interface sslvpn-ac 1000
[Sysname-SSLVPN-AC1000] shutdown
sms-imc address
Use sms-imc address to specify an IMC server for SMS message verification.
Use undo sms-imc address to restore the default.
Syntax
sms-imc address ip-address port port-number [ vpn-instance vpn-instance-name ]
undo sms-imc address
Default
No IMC server is specified for SMS message verification.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
ip-address: Specifies the IP address of the IMC server, in dotted decimal notation.
port port-number: Specifies the port number of the IMC server, in the range of 1 to 65535.
vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the IMC server belongs. The vpn-instance-name argument represents the VPN instance name, a case-sensitive string of 1 to 31 characters. Do not specify this option if the IMC server is on the public network.
Usage guidelines
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Specify an IMC server (with IP address 192.168.10.1 and port 2000) in VPN instance vpn1 for SMS message verification of users in SSL VPN context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] sms-imc address 192.168.10.1 port 2000 vpn-instance vpn1
Related commands
sms-imc enable
sms-imc enable
Use sms-imc enable to enable IMC SMS message verification.
Use undo sms-imc enable to disable IMC SMS message verification.
Syntax
sms-imc enable
undo sms-imc enable
Default
IMC SMS message verification is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Usage guidelines
Before you execute this command, make sure SMS message verification has been configured on the IMC server.
In Web or IP access mode, the authentication process for an SSL VPN user is as follows:
1. The SSL VPN gateway obtains the verification code request from the user's login request and sends the verification code request to the IMC server.
2. The IMC server sends a verification code to the user through an SMS message.
3. The user enters the username, password, and the received verification code on the login page to pass authentication through the IMC server.
Examples
# Enable IMC SMS message verification.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] sms-imc enable
Related commands
sms-imc address
ssl client-policy
Use ssl client-policy to apply an SSL client policy to an SSL VPN context.
Use undo ssl client-policy to restore the default.
Syntax
ssl client-policy policy-name
undo ssl client-policy
Default
In non-FIPS mode:
The default SSL client policy for SSL VPN is used. This policy supports the dhe_rsa_aes_128_cbc_sha, dhe_rsa_aes_256_cbc_sha, rsa_3des_ede_cbc_sha, rsa_aes_128_cbc_sha, and rsa_aes_256_cbc_sha cipher suites.
In non-FIPS mode:
The default SSL client policy for SSL VPN is used. This policy supports the rsa_aes_128_cbc_sha and rsa_aes_256_cbc_sha cipher suites.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
policy-name: Specifies an SSL client policy by its name, a case-insensitive string of 1 to 31 characters.
Usage guidelines
You can apply only one SSL client policy to an SSL VPN context. For the applied SSL client policy to take effect, you must enable the SSL VPN context by using the service enable command. The SSL VPN gateway will use the parameters defined by the policy to establish SSL connections to HTTPS servers.
If you execute this command multiple times, the new configuration overwrites the previous configuration, but does not take effect. For the new configuration to take effect, disable the SSL VPN context and then re-enable it.
For information about configuring SSL client policies, see Security Configuration Guide.
Examples
# Apply SSL client policy abc to SSL VPN context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] ssl client-policy abc
ssl server-policy
Use ssl server-policy to apply an SSL server policy to an SSL VPN gateway.
Use undo ssl server-policy to remove the application.
Syntax
ssl server-policy policy-name
undo ssl server-policy
Default
An SSL VPN gateway uses the SSL server policy of its self-signed certificate.
Views
SSL VPN gateway view
Predefined user roles
network-admin
Parameters
policy-name: Specifies the name of an SSL server policy, a case-insensitive string of 1 to 31 characters.
Usage guidelines
You can apply only one SSL server policy to an SSL VPN gateway. For the applied SSL server policy to take effect, you must enable the SSL VPN gateway by using the service enable command. The SSL VPN gateway will use the parameters defined by the policy to establish SSL connections to remote users.
If you execute this command multiple times, the new configuration overwrites the previous configuration but does not take effect. For the new configuration to take effect, disable the SSL VPN gateway and then enable the SSL VPN gateway. To disable and enable an SSL VPN gateway, use the undo service enable and service enable commands.
After you modify the content of the SSL server policy applied to an SSL VPN gateway, you must disable and then re-enable the gateway to validate the policy. To disable and enable an SSL VPN gateway, use the undo service enable and service enable commands.
Examples
# Apply SSL server policy CA_CERT to SSL VPN gateway gw1.
<Sysname> system-view
[Sysname] sslvpn gateway gw1
[Sysname-sslvpn-gateway-gw1] ssl server-policy CA_CERT
Related commands
display sslvpn gateway
sslvpn context
Use sslvpn context to create an SSL VPN context and enter its view, or enter the view of an existing SSL VPN context.
Use undo sslvpn context to delete an SSL VPN context.
Syntax
sslvpn context context-name
undo sslvpn context context-name
Default
No SSL VPN contexts exist.
Views
System view
Predefined user roles
network-admin
Parameters
context-name: Specifies an SSL VPN context name, a case-insensitive string of 1 to 31 characters. Valid characters are letters, digits, and underscores (_).
Usage guidelines
SSL VPN contexts contain different user sessions, accessible resources, and user authentication methods.
An SSL VPN gateway can be associated with multiple SSL VPN contexts. After a remote user logs in to an SSL VPN gateway, the user can access only the resources in the SSL VPN context to which the user belongs.
Examples
# Create an SSL VPN context named ctx1 and enter its view.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1]
Related commands
display sslvpn context
sslvpn gateway
Use sslvpn gateway to create an SSL VPN gateway and enter its view, or enter the view of an existing SSL VPN gateway.
Use undo sslvpn gateway to delete an SSL VPN gateway.
Syntax
sslvpn gateway gateway-name
undo sslvpn gateway gateway-name
Default
No SSL VPN gateways exist.
Views
System view
Predefined user roles
network-admin
Parameters
gateway-name: Specifies an SSL VPN gateway name, a case-insensitive string of 1 to 31 characters. Valid characters are letters, digits, and underscores (_).
Usage guidelines
An SSL VPN gateway resides between remote users and the enterprise network to ensure secure access of remote users to the enterprise internal network. The SSL VPN gateway establishes an SSL connection to a remote user, and then authenticates the user before allowing the user to access an internal server.
You must perform the following tasks in the view of an SSL VPN gateway:
· Execute the ip address command to configure an IP address and a port number for the SSL VPN gateway.
· Execute the ssl server-policy command to apply an SSL server policy to the SSL VPN gateway.
· Execute the service enable command to enable the SSL VPN gateway.
You cannot delete an SSL VPN gateway that has been associated with an SSL VPN context. To delete the SSL VPN gateway, execute the undo gateway command to remove the association and then execute the undo sslvpn gateway command.
Examples
# Create an SSL VPN context named gw1 and enter its view.
<Sysname> system-view
[Sysname] sslvpn gateway gw1
[Sysname-sslvpn-gateway-gw1]
Related commands
display sslvpn gateway
sslvpn ip address-pool
Use sslvpn ip address-pool to create an address pool.
Use undo sslvpn ip address-pool to delete an address pool.
Syntax
sslvpn ip address-pool pool-name start-ip-address end-ip-address
undo sslvpn ip address-pool pool-name
Default
No address pools exist.
Views
System view
Predefined user roles
network-admin
Parameters
pool-name: Specifies a name for the address pool, a case-insensitive string of 1 to 31 characters.
start-ip-address end-ip-address: Specifies the start IP address and end IP address for the pool. The end IP address must be greater than the start IP address. The start IP address and end IP address cannot be a multicast, broadcast, or loopback address.
Usage guidelines
An SSL VPN gateway uses address pools to assign IP addresses to IP access clients.
You can specify an SSL VPN address pool for an SSL VPN context or an SSL VPN policy group.
Examples
# Create an address pool named pool1 and specify the address range as 10.1.1.1 to 10.1.1.254.
<Sysname> system-view
[Sysname] sslvpn ip address-pool pool1 10.1.1.1 10.1.1.254
Related commands
ip-tunnel address-pool (SSL VPN context view)
ip-tunnel address-pool (SSL VPN policy group view)
sslvpn log enable
Use sslvpn log enable to enable the SSL VPN global logging feature.
Use undo sslvpn log enable to disable the SSL VPN global logging feature.
Syntax
sslvpn log enable
undo sslvpn log enable
Default
The SSL VPN global logging feature is disabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
This feature logs the following global events:
· SSL VPN access failures because of not associating SSL VPN contexts with gateways.
· SSL VPN access failures because of not enabling SSL VPN contexts.
The logs are sent to the information center of the device. For the logs to be output correctly, you must also configure the information center on the device. For more information about the information center, see Network Management and Monitoring Configuration Guide.
Examples
# Enable the SSL VPN global logging feature.
<Sysname> system-view
[Sysname] sslvpn log enable
timeout idle
Use timeout idle to set the idle timeout timer for SSL VPN sessions.
Use undo timeout idle to restore the default.
Syntax
timeout idle minutes
undo timeout idle
Default
The idle timeout timer is 30 minutes for SSL VPN sessions.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
seconds: Specifies the idle timeout timer in the range of 1 to 1440 minutes.
Usage guidelines
If the idle time of an SSL VPN session exceeds the specified idle timeout time, the session is terminated.
Examples
# Set the idle timeout timer to 50 minutes for SSL VPN sessions.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] timeout idle 50
Related commands
display sslvpn policy-group
title
Use title to configure a title to be displayed on SSL VPN webpages.
Use undo title to restore the default.
Syntax
title { chinese chinese-title | english english-title }
undo title { chinese | english }
Default
The title is SSL VPN.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
chinese chinese-title: Configures a title in Chinese, a case-sensitive string of 1 to 255 characters.
english english-title: Configures a title in English, a case-sensitive string of 1 to 255 characters.
Examples
# Configure the title as SSL VPN service for company A.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] title english SSL VPN service for company A
uri-acl
Use uri-acl to create a URI ACL and enter its view, or enter the view of an existing URI ACL.
Use undo uri-acl to delete a URI ACL.
Syntax
uri-acl uri-acl-name
undo uri-acl uri-acl-name
Default
No URI ACLs exist.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
uri-acl-name: Specifies a name for the URI ACL, a case-insensitive string of 1 to 31 characters.
Usage guidelines
A URI ACL is a set of rules that permit or deny access to resources. You can use URI ACLs for IP, TCP, and Web access filtering of SSL VPN users.
You can create multiple URI ACLs in an SSL VPN context.
Examples
# Create a URI ACL named uriacla and enter its view.
<Sysname> system-view
[Sysname] sslvpn context abc
[Sysname-sslvpn-context-abc] uri-acl uriacla
[Sysname-sslvpn-context-abc-uri-acl-uriacla]
url (file policy view)
Use url to specify the URL of the Web page file to be rewritten in a file policy.
Use undo url to restore the default.
Syntax
url url
undo url
Default
No file URL is specified in a file policy.
Views
File policy view
Predefined user roles
network-admin
Parameters
url: Specifies the complete file path, a case-insensitive string of 1 to 256 characters.
Usage guidelines
A file policy can be used to modify only the Web page file whose URL is the same as the URL configured in the policy.
A file URL is in the format of scheme://user:password@host:port/path. Table 13 describes the fields in the file URL.
Table 13 URL field descriptions
Field |
Description |
scheme |
Protocol type. Options include http and https. |
user:password |
Username and password used to access the file. |
host |
Host name or IP address of the server where the file resides. To specify an IPv6 address, enclose the IPv6 address in brackets. For example, http://[1234::5678]:8080/a.html. |
port |
Port number on which the server listens for resource access requests. If you do not specify a port number, the default port number of the protocol is used, which is 80 for HTTP and 443 for HTTPS. |
path |
Local path of the file on the server. |
You can specify only one file URL in a file policy. In the same SSL VPN context, the URL specified for each file policy must be unique.
Examples
# Specify a file URL for file policy fp.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] file-policy fp
[Sysname-sslvpn-context-ctx-file-policy-fp] url http://192.168.1.1:8080/js/test.js
url (URL item view)
Use url to specify a URL in a URL item.
Use undo url to remove the URL from a URL item.
Syntax
url url
undo url
Default
No URL is specified in a URL item.
Views
URL item view
Predefined user roles
network-admin
Parameters
url: Specifies a URL, a case-insensitive string of 1 to 253 characters in the format of protocol://host:port/path.
Usage guidelines
Table 14 describes the fields in a URL.
Table 14 URL field descriptions
Field |
Description |
protocol |
Protocol name. Options are: · http. · https. If you do not specify a protocol name, the default protocol (HTTP) is used. |
host |
Domain name or IP address of a host. To specify an IPv6 address, enclose the IPv6 address in brackets. For example. http://[1234::5678]:8080. |
port |
Port number. If you do not specify a port number, the default port number of the protocol is used, which is 80 for HTTP and 443 for HTTPS. |
path |
Path to the resource on the host. |
You can specify only one URL in a URL item. If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Specify www.abc.com as the URL in URL item serverA.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] url-item serverA
[Sysname-sslvpn-context-ctx1-url-item-serverA] url www.abc.com
url-item
Use url-item to create a URL item and enter its view, or enter the view of an existing URL item.
Use undo url-item to delete a URL item.
Syntax
url-item url-item-name
undo url-item url-item-name
Default
No URL items exist in an SSL VPN context.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
url-item-name: Specifies a name for the URL item, a case-insensitive string of 1 to 31 characters.
Usage guidelines
You can create multiple URL items in an SSL VPN context. Each URL item contains an accessible resource URL and can be assigned to a URL list in the SSL VPN context.
A URL item that has been assigned to a URL list cannot be deleted.
Examples
# Create a URL item named serverA and enter URL item view.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] url-item serverA
[Sysname-sslvpn-context-ctx1-url-item-serverA]
url-list
Use url-list to create a URL list and enter its view, or enter the view of an existing URL list.
Use undo url-list to delete a URL list.
Syntax
url-list name
undo url-list name
Default
No URL lists exist.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
name: Specifies a name for the URL list, a case-insensitive string of 1 to 31 characters.
Examples
# Create a URL list named url1 and enter URL list view.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] url-list url1
[Sysname-sslvpn-context-ctx1-url-list-url1]
Related commands
sslvpn context
url-mapping
Use url-mapping to configure URL mapping in a URL item.
Use undo url-mapping to restore the default.
Syntax
url-mapping { domain-mapping domain-name | port-mapping gateway gateway-name [ virtual-host virtual-host-name ] } [ rewrite-enable ]
undo url-mapping
Default
The normal mapping method is used.
Views
URL item view
Predefined user roles
network-admin
Parameters
domain-mapping domain-name: Specifies the domain name mapping method. This method maps the URL to a domain name, a case-insensitive string of 1 to 127 characters which can contain letters, digits, underscores (_), hyphens (-), and dots (.). The specified domain cannot be the same as the domain name of the SSL VPN gateway.
port-mapping gateway gateway-name: Specifies the port mapping method. This method maps the URL to a gateway name and an optional virtual host name. The gateway-name argument specifies the gateway name, a case-insensitive string of 1 to 31 characters which can contain letters, digits, and underscores (_). The specified SSL VPN gateway name must be the name of an existing SSL VPN gateway.
virtual-host virtual-host-name: Specifies the virtual host name, a case-insensitive string of 1 to 127 characters which can contain letters, digits, underscores (_), hyphens (-), and dots (.). Do not specify a virtual host name if you want to use the SSL VPN gateway exclusively for the URL item.
rewrite-enable: Enables the SSL VPN gateway to rewrite all the accessible URLs in the resource access response according to their respective URL mapping configuration. By default, the SSL VPN gateway does not rewrite other URLs in the response packet of the currently requested URL. Enable this rewriting feature as a best practice.
Usage guidelines
The SSL VPN gateway rewrites the resource URLs in resource access responses that contain HTML, CSS, or JS files before sending the URLs to the requesting users. By default, the normal mapping method is used for the URL rewriting. You can also configure the SSL VPN gateway to use the domain mapping or port mapping method.
Normal mapping might cause problems such as missed URL rewriting and rewriting errors, resulting in SSL VPN clients not being able to access the internal resources. Use domain mapping or port mapping as a best practice. For more information about these mapping methods, see SSL VPN configuration in Security Configuration Guide.
When configuring the domain mapping method, make sure the SSL VPN client can resolve the mapped domain name (through DNS or the Hosts file) into the IP address of the SSL VPN gateway.
When configuring the port mapping method, you can specify an SSL VPN gateway exclusively for a URL item by specifying the gateway name without a virtual host name. To share an SSL VPN gateway with other URL items or SSL VPN contexts, specify the SSL VPN gateway name together with a virtual host name.
If you execute this command for a URL item multiple times, the most recent configuration takes effect.
Examples
# Create URL item serverA and specify http://www.server.com/ as the resource URL. Map the resource URL to domain name http://www.domain.com/ and enable URL rewriting.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] url-item serverA
[Sysname-sslvpn-context-ctx1-url-item-serverA] url www.server.com
[Sysname-sslvpn-context-ctx1-url-item-serverA] url-mapping domain-mapping http://www.domain.com/ rewrite-enable
# Create URL item serverB and specify http://www.server.com/ as the resource URL. Map the resource URL to gateway gw1 with virtual host name host1 and enable URL rewriting.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] url-item serverB
[Sysname-sslvpn-context-ctx1-url-item-serverB] url www.server.com
[Sysname-sslvpn-context-ctx1-url-item-serverB] url-mapping port-mapping gateway gw1 virtual-host host1 rewrite-enable
Related commands
url-item
verify-code
Use verify-code enable to enable code verification.
Use undo verify-code enable to disable code verification.
Syntax
verify-code enable
undo verify-code enable
Default
Code verification is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Usage guidelines
After code verification is enabled, a user must enter a correct verification code to log in to the SSL VPN webpage.
Examples
# Enable code verification.
<Sysname> system-view
[Sysname] sslvpn context ctx
[Sysname-sslvpn-context-ctx] verify-code enable
vpn-instance (SSL VPN context view)
Use vpn-instance to associate an SSL VPN context with a VPN instance.
Use undo vpn-instance to restore the default.
Syntax
vpn-instance vpn-instance-name
undo vpn-instance
Default
An SSL VPN context is associated with the public network.
Views
SSL VPN context view
Predefined user roles
network-admin
Parameters
vpn-instance-name: Specifies the name of a VPN instance, a case-sensitive string of 1 to 31 characters.
Usage guidelines
After you associate an SSL VPN context with a VPN instance, the resources managed by the context belong to the VPN instance.
An SSL VPN context can be associated with only one VPN instance.
You can associate an SSL VPN context with a nonexistent VPN instance. The context does not take effect until the associated VPN instance is created.
If you change the VPN instance associated with an SSL VPN context, all user-to-IP address bindings configured for SSL VPN users in the SSL VPN context will be removed.
Examples
# Associate SSL VPN context context1 with VPN instance vpn1.
<Sysname> System-view
[Sysname] sslvpn context context1
[Sysname-sslvpn-context-context1] vpn-instance vpn1
vpn-instance (SSL VPN gateway view)
Use vpn-instance to specify a VPN instance for an SSL VPN gateway.
Use undo vpn-instance to restore the default.
Syntax
vpn-instance vpn-instance-name
undo vpn-instance
Default
An SSL VPN gateway belongs to the public network.
Views
SSL VPN gateway view
Predefined user roles
network-admin
Parameters
vpn-instance-name: Specifies the name of a VPN instance, a case-sensitive string of 1 to 31 characters.
Usage guidelines
The VPN instance specified for an SSL VPN gateway is called a front VPN instance.
You can specify only one VPN instance for an SSL VPN gateway.
You can specify a nonexistent VPN instance for an SSL VPN gateway. The SSL VPN gateway does not take effect until the VPN instance is created.
Examples
# Specify VPN instance vpn1 for SSL VPN gateway gateway1.
<Sysname> system-view
[Sysname] sslvpn gateway gateway1
[Sysname-sslvpn-gateway-gateway1] vpn-instance vpn1
web-access ip-client auto-activate
Use web-access ip-client auto-activate to enable automatic startup of the IP access client after Web login.
Use undo web-access ip-client auto-activate to disable automatic startup of the IP access client after Web login.
Syntax
web-access ip-client auto-activate
undo web-access ip-client auto-activate
Default
Automatic startup of the IP access client after Web login is disabled.
Views
SSL VPN context view
Predefined user roles
network-admin
Usage guidelines
With this feature enabled, after a user logs in to the SSL VPN gateway through a Web browser, the IP access client on the user host will automatically connect to the gateway. If the IP access client software is not installed, the user will be prompted to install the software first.
For the IP access client to connect to the SSL VPN gateway correctly, make sure the IP access service and resources are configured on the SSL VPN gateway.
If an SSL VPN user has already logged in through an IP access client when this feature is enabled, the user cannot access the SSL VPN gateway directly through the Web browser. To access the SSL VPN gateway through the Web browser, the user must click Open Resource List in the IP access client.
Examples
# Enable automatic startup of the IP access client after Web login in SSL VPN context ctx1.
<Sysname> system-view
[Sysname] sslvpn context ctx1
[Sysname-sslvpn-context-ctx1] web-access ip-client auto-activate