06-VPN Command Reference

HomeSupportReference GuidesCommand ReferencesH3C SecPath Firewall Series Command Reference(V7)-6W60106-VPN Command Reference
01-SSL VPN commands
Title Size Download
01-SSL VPN commands 669.93 KB

Contents

SSL VPN commands· 1

aaa domain· 1

authentication server-type· 1

authentication use· 2

bandwidth· 3

certificate username-attribute· 4

certificate-authentication enable· 5

content-type· 6

country code· 6

custom-authentication request-header-field· 7

custom-authentication request-method· 8

custom-authentication request-template· 9

custom-authentication response-custom-template· 10

custom-authentication response-field· 11

custom-authentication response-format 13

custom-authentication response-success-value· 14

custom-authentication timeout 14

custom-authentication url 15

default 16

default-policy-group· 17

description (shortcut view) 18

description (SSL VPN AC interface view) 18

display interface sslvpn-ac· 19

display sslvpn context 22

display sslvpn gateway· 25

display sslvpn ip-tunnel statistics· 27

display sslvpn policy-group· 31

display sslvpn port-forward connection· 32

display sslvpn prevent-cracking frozen-ip· 33

display sslvpn session· 34

display sslvpn webpage-customize template· 38

emo-server 39

exclude· 40

execution (port forwarding item view) 41

execution (shortcut view) 41

file-policy· 42

filter ip-tunnel acl 43

filter ip-tunnel uri-acl 44

filter tcp-access acl 45

filter tcp-access uri-acl 47

filter web-access acl 48

filter web-access uri-acl 49

force-logout 50

force-logout max-onlines enable· 50

gateway (SMS gateway authentication view) 51

gateway (SSL VPN context view) 52

heading· 53

http-redirect 53

idle-cut traffic-threshold· 54

include· 55

interface sslvpn-ac· 56

ip address· 56

ip-route-list 57

ip-tunnel access-route· 58

ip-tunnel address-pool (SSL VPN context view) 59

ip-tunnel address-pool (SSL VPN policy group view) 60

ip-tunnel bind address· 61

ip-tunnel dns-server 62

ip-tunnel interface· 63

ip-tunnel keepalive· 64

ip-tunnel log· 64

ip-tunnel rate-limit 65

ip-tunnel web-resource auto-push· 66

ip-tunnel wins-server 67

ipv6 address· 68

local-port 69

log resource-access enable· 70

log user-login enable· 71

login-message· 71

logo· 72

max-onlines· 73

max-users· 73

message-server 74

mobile-num·· 75

mobile-num-binding enable· 76

mtu· 76

new-content 77

notify-message· 78

old-content 78

password-authentication enable· 79

password-box hide· 80

password-changing enable (SSL VPN context view) 80

password-changing enable (SSL VPN user view) 81

password-complexity-message· 82

policy-group· 83

port-forward· 84

port-forward-item·· 84

prevent-cracking freeze-ip· 85

prevent-cracking freeze-ip enable· 86

pevent-cracking unfreeze-ip· 87

pevent-cracking verify-code· 88

pevent-cracking verify-code enable· 88

rate-limit 89

redirect-resource· 90

reset counters interface sslvpn-ac· 91

reset sslvpn ip-tunnel statistics· 91

resources port-forward· 92

resources port-forward-item·· 93

resources shortcut 94

resources shortcut-list 94

resources uri-acl 95

resources url-item·· 96

resources url-list 96

resources-file· 97

rewrite server-response-message· 98

rewrite-rule· 99

rule· 99

self-service imc address· 101

server-address· 102

service enable (SSL VPN context view) 103

service enable (SSL VPN gateway view) 103

session-connections· 104

shortcut 104

shortcut-list 105

shutdown· 106

sms-auth· 106

sms-auth type· 107

sms-content 108

ssl client-policy· 109

ssl server-policy· 109

sslvpn context 110

sslvpn gateway· 111

sslvpn ip address-pool 112

sslvpn log enable· 113

sslvpn webpage-customize· 113

sso auto-build code· 114

sso auto-build custom-login-parameter 115

sso auto-build encrypt-file· 116

sso auto-build login-parameter 117

sso auto-build request-method· 119

sso basic custom-username-password enable· 120

sso method· 120

timeout idle· 121

title· 122

uri-acl 123

url (file policy view) 123

url (URL item view) 124

url-item·· 125

url-list 126

url-mapping· 127

url-masking enable· 128

user 129

verification-code send-interval 130

verification-code validity· 130

verify-code· 131

vpn-instance (SSL VPN context view) 131

vpn-instance (SSL VPN gateway view) 132

web-access ip-client auto-activate· 133

webpage-customize· 134

wechat-work-authentication app-secret 134

wechat-work-authentication authorize-field· 135

wechat-work-authentication corp-id· 136

wechat-work-authentication enable· 137

wechat-work-authentication open-platform-url 138

wechat-work-authentication timeout 139

wechat-work-authentication url 139

wechat-work-authentication userid-field· 140


SSL VPN commands

aaa domain

Use aaa domain to specify an ISP domain for authentication, authorization, and accounting of SSL VPN users in an SSL VPN context.

Use undo aaa domain to restore the default.

Syntax

aaa domain domain-name

undo aaa domain

Default

The default ISP domain is used for authentication, authorization, and accounting of SSL VPN users in an SSL VPN context.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

domain-name: Specifies the ISP domain name, a case-insensitive string of 1 to 255 characters. The name must meet the following requirements:

·     The name cannot contain a forward slash (/), backslash (\), vertical bar (|), quotation marks ("), colon (:), asterisk (*), question mark (?), left angle bracket (<), right angle bracket (>), or at sign (@).

·     The name cannot be d, de, def, defa, defau, defaul, default, i, if, if-, if-u, if-un, if-unk, if-unkn, if-unkno, if-unknow, or if-unknown.

Usage guidelines

An SSL VPN username cannot carry ISP domain information. After this command is executed, an SSL VPN gateway uses the specified ISP domain for authentication, authorization, and accounting of SSL VPN users in the context.

Examples

# Specify ISP domain myserver for authentication, authorization, and accounting of SSL VPN users in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] aaa domain myserver

authentication server-type

Use authentication server-type to specify the authentication server type.

Use undo authentication server-type to restore the default.

Syntax

authentication server-type { aaa | custom }

undo authentication server-type

Default

The SSL VPN authentication server is an AAA authentication server.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

aaa: Specifies the AAA authentication server.

custom: Specifies the custom authentication server.

Usage guidelines

If you use a custom authentication server, you must also configure custom authentication settings, such as the URL of the custom authentication server and custom authentication HTTP request and response settings.

If you use an AAA authentication server, you must configure the AAA server. For more information about AAA server configuration, see Security Configuration Guide.

Examples

# Specify the authentication server type as custom authentication server in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] authentication server-type custom

Related commands

custom-authentication request-header-field

custom-authentication request-method

custom-authentication request-template

custom-authentication response-custom-template

custom-authentication response-field

custom-authentication response-format

custom-authentication response-success-value

custom-authentication timeout

custom-authentication url

authentication use

Use authentication use to specify the authentication methods required for user login.

Use undo authentication use to restore the default.

Syntax

authentication use { all | any-one }

undo authentication use

Default

To log in to an SSL VPN context, a user must pass all the authentication methods enabled for the context.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

all: Uses all enabled authentication methods.

any-one: Uses any enabled authentication method.

Usage guidelines

You can enable username/password authentication, certificate authentication, or both for an SSL VPN context. The authentication methods required for logging in to the SSL VPN context depend on the configuration of this command:

·     If the authentication use all command is configured, a user must pass all the enabled authentication methods for login.

·     If the authentication use any-one command is configured, a user can log in after passing any enabled authentication method.

Examples

# Configure SSL VPN context ctx to allow users to log in after passing any enabled authentication method.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] authentication use any-one

Related commands

certificate-authentication enable

display sslvpn context

password-authentication enable

bandwidth

Use bandwidth to set the expected bandwidth for an interface.

Use undo bandwidth to restore the default.

Syntax

bandwidth bandwidth-value

undo bandwidth

Default

The expected bandwidth is 64 kbps for an interface.

Views

SSL VPN AC interface view

Predefined user roles

network-admin

context-admin

Parameters

bandwidth-value: Specifies the expected bandwidth in the range of 1 to 400000000 kbps.

Usage guidelines

The expected bandwidth for an interface affects CBQ bandwidth and link costs in OSPF, OSPFv3, and IS-IS. For more information about CBQ bandwidth, see QoS configuration in ACL and QoS Configuration Guide. For more information about link costs, see Layer 3—IP Routing Configuration Guide.

Examples

# Set the expected bandwidth to 10000 kbps for SSL VPN AC 1000.

<Sysname> system-view

[Sysname] interface sslvpn-ac 1000

[Sysname-SSLVPN-AC1000] bandwidth 10000

certificate username-attribute

Use certificate username-attribute to specify the certificate attribute as the SSL VPN username.

Use undo certificate username-attribute to restore the default.

Syntax

certificate username-attribute { cn | email-prefix | oid extern-id }

undo certificate username-attribute

Default

The device uses the value of the CN attribute in the subject of the user certificate as the SSL VPN username.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

cn: Specifies the CN attribute value in the subject of the user certificate as the SSL VPN username.

email-prefix: Specifies the string before the at sign (@) of the email address in the subject of the user certificate as the SSL VPN username.

oid extern-id: Specifies a user certificate attribute by its OID. The value of the attribute will be used as the SSL VPN username. The extern-id argument represents the OID, which is an object identifier in dotted decimal notation.

Usage guidelines

The SSL VPN username specified by this command takes effect only after you execute the certificate-authentication enable command.

Examples

# Use the value of the attribute whose OID is 1.1.1.1 in the user certificate as the SSL VPN username.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] certificate username-attribute oid 1.1.1.1

Related commands

certificate-authentication enable

certificate-authentication enable

Use certificate-authentication enable to enable certificate authentication.

Use undo certificate-authentication enable to disable certificate authentication.

Syntax

certificate-authentication enable

undo certificate-authentication enable

Default

Certificate authentication is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Usage guidelines

After you enable certificate authentication, you must also execute the client-verify command in SSL server policy view. The SSL VPN gateway uses the digital certificate sent by an SSL VPN client to authenticate the client's identity. If the client's username and the username in the digital certificate are not the same, the client cannot log in to the SSL VPN gateway.

Examples

# Enable certificate authentication.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] certificate-authentication enable

Related commands

client-verify enable

client-verify optional

content-type

Use content-type to configure a file policy to rewrite a file in an HTTP response to a specific type of file.

Use undo content-type to restore the default.

Syntax

content-type { css | html | javascript | other }

undo content-type

Default

A file policy rewrites a file carried in an HTTP response to a file of the type indicated by the content-type field in the HTTP response.

Views

File policy view

Predefined user roles

network-admin

context-admin

Parameters

css: Changes the file type to CSS.

html: Changes the file type to HTML.

javascript: Changes the file type to JavaScript.

other: Does not change the file type.

Usage guidelines

A file policy rewrites a file carried in an HTTP response to a file of the type specified by this command. If the specified file type is different from that indicated by the content-type field in the HTTP response, users might not be able to read the file correctly.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure file policy fp to rewrite files to HTML files.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] file-policy fp

[Sysname-sslvpn-context-ctx-file-policy-fp] content-type html

country code

Use country-code to specify the mobile country code.

Use undo country-code to restore the default.

Syntax

country-code country-code

undo country-code

Default

The country code is 86.

Views

SMS gateway authentication view

Predefined user roles

network-admin

context-admin

Parameters

country-code: Specifies the country code, a string of 1 to 7 characters. Only digits are supported.

Examples

# Set the country code to 86 in SMS gateway authentication view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] sms-auth sms-gw

[Sysname-sslvpn-context-ctx1-sms-auth-sms-gw] country-code 86

custom-authentication request-header-field

Use custom-authentication request-header-field to configure an HTTP request header field for custom authentication.

Use undo custom-authentication request-header-field to remove the configuration of an HTTP request header field for custom authentication.

Syntax

custom-authentication request-header-field field-name value value

undo custom-authentication request-header-field field-name

Default

A custom authentication request header includes the following fields:

·     Content-type:application/x-www-form-urlencoded.

·     User-Agent:nodejs 4.1.

·     Accept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

field-name: Specifies a request header field name, a case-insensitive string of 1 to 63 characters. The name cannot include the following characters:

·     ()<>@,;:\"/[]?={}

·     Spaces.

·     Horizontal tabs.

·     ASCII characters with codes ≤ 31 or ≥ 127.

value value: Specifies the value of the request header field, a string of 1 to 255 characters, which cannot contain question mark (?) metacharacters.

Usage guidelines

Use this command to configure HTTP request header fields sent to the custom authentication server. Perform this configuration after the custom authentication server is specified by using the authentication server-type custom command. To have the configuration take effect, you must also configure other custom authentication request settings, such as the HTTP request method and the request template.

Execute this command multiple times to configure multiple HTTP request header fields. For the same field, the most recent configuration takes effect.

Examples

# Specify the host field as 192.168.56.2:8080 in the HTTP request header for custom authentication in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] custom-authentication request-header-field host value 192.168.56.2:8080

Related commands

authentication server-type

custom-authentication request-method

custom-authentication request-template

custom-authentication url

custom-authentication request-method

Use custom-authentication request-method to configure the HTTP request method for custom authentication.

Use undo custom-authentication request-method to restore the default.

Syntax

custom-authentication request-method { get | post }

undo custom-authentication request-method

Default

The HTTP request method is GET.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

get: Specifies the GET method.

post: Specifies the POST method.

Usage guidelines

Use this command to configure the HTTP request method for authentication requests sent to the custom authentication server. Perform this configuration after the custom authentication server is specified by using the authentication server-type custom command. To have the configuration take effect, you must also configure other custom authentication request settings, such as the HTTP request header fields and the request template.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the POST request method for custom authentication in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] custom-authentication request-method post

Related commands

authentication server-type

custom-authentication request-template

custom-authentication url

custom-authentication request-template

Use custom-authentication request-template to configure the request template for custom authentication.

Use undo custom-authentication request-template to restore the default.

Syntax

custom-authentication request-template template

undo custom-authentication request-template

Default

No request template is configured for custom authentication.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

template: Specifies the request template through which the SSL VPN gateway sends username and password information to the custom authentication server. The template is a case-insensitive string of 1 to 255 characters.

Usage guidelines

Use this command to configure the HTTP request template through which the SSL VPN gateway sends the username and password to the custom authentication server. Perform this configuration after the custom authentication server is specified by the authentication server-type custom command. To have the configuration take effect, you must also configure other custom authentication request settings, such as the HTTP request header fields and the request method.

If you execute this command multiple times, the most recent configuration takes effect.

This command supports the following request template formats:

·     Form format for the POST and GET methods: username=$$USERNAME$$&password=$$PASSWORD_MD5$$&resid=1234.

·     JSON type for the POST method: {“name”:”$$USERNAME$$”,“password”:”,$$PASSWORD$$”,“resid”:”1234”}.

·     XML type for the GET method: <uname>$$USERNAME$$</uname><psw>$$PASSWORD$$</psw>.

The USERNAME, PASSWORD, and PASSWORD_MD5 between $$ pairs in the request templates are variables. The PASSWORD_MD5 represents a password encrypted by MD5. When a user logs in to the SSL VPN gateway, the gateway replaces these variables with the login username and password. Then, the SSL VPN gateway sends the authentication request to the custom authentication server.

Examples

# Configure the custom authentication HTTP request template as username=$$USERNAME$$&password=$$PASSWORD_MD5$$&resid=1952252223973828 in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] custom-authentication request-template username=$$USERNAME$$&password=$$PASSWORD_MD5$$&resid=1952252223973828

Related commands

authentication server-type

custom-authentication request-template

custom-authentication url

custom-authentication response-custom-template

Use custom-authentication response-custom-template to configure response templates for the fields in the HTTP response for custom authentication.

Use undo custom-authentication response-custom-template to restore the default.

Syntax

custom-authentication response-custom-template { group | message | result } template

undo custom-authentication response-custom-template { group | message | result }

Default

No response templates are configured for custom authentication.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

group: Specifies the group field in the authentication response.

message: Specifies the message field in the authentication response.

result: Specifies the result field in the authentication response.

template: Specifies the content of the response template for the specified field. The template is a case-insensitive string of 1 to 63 characters.

Usage guidelines

Use this command to configure the response templates for the device to identify the fields in a custom-format authentication response. Perform this configuration after the custom authentication server is specified by using the authentication server-type custom command. This configuration is applicable when the HTTP response format is custom. When you configure response templates, the response template for the result field is required.

When you configure a response template for a field, follow these restrictions and guidelines:

·     A response template for a field must contain $$value$$.

¡     The value keyword represents the field value in the response.

¡     The pairs of dollar signs ($$) are used to identify the start and end of the field in a response. The device considers the content before the first $$ the start identifier and that after the second $$ the end identifier for parsing the field of the response.

·     Make sure the contents before and after $$value$$ in the response template are consistent with those before and after the field value in the response from the authentication server.

Here is an example. Assume that the result field information in the response from the authentication server is auth-result=true,. You must configure the response template for the result field as auth-result=$$value$$,. The contents before and after $$value$$ are auth-result= and a comma (,), which are the same as those before and after true, respectively. Then, the device can use the auth-result=$$value$$, template to correctly identify and parse the result field in the authentication response.

Examples

# Configure the response templates in SSL VPN context ctx1 as result=$$value$$,company=$$value$$,message=$$value$$.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] custom-authentication response-custom-template result result=$$value$$,

[Sysname-sslvpn-context-ctx1] custom-authentication response-custom-template group company=$$value$$,

[Sysname-sslvpn-context-ctx1] custom-authentication response-custom-template message message=$$value$$

Related commands

authentication server-type

custom-authentication response-format

custom-authentication response-success-value

custom-authentication response-field

Use custom-authentication response-field to configure a field name in the HTTP response for custom authentication.

Use undo custom-authentication response-field to restore the default.

Syntax

custom-authentication response-field { group group | message message | result result }

undo custom-authentication response-field { group | message | result }

Default

No HTTP response field names are configured.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

group group: Specifies the name of the policy group field in the HTTP response, a case-insensitive string of 1 to 31 characters. In the authentication response, the value following the group argument represents the policy groups authorized to the user.

message message: Specifies the name of the message field in the HTTP response, a case-insensitive string of 1 to 31 characters. In the authentication response, the value following the message argument represents the authentication prompt.

result result: Specifies the name of the result field in the HTTP response, a case-insensitive string of 1 to 31 characters. In the authentication response, the value following the message argument represents the authentication result.

Usage guidelines

Use this command to configure the names of the fields in the HTTP response. Perform this configuration after the custom authentication server is specified by using the authentication server-type custom command. This configuration is applicable when the HTTP response format is JSON or XML. When you configure HTTP response field names, the result field name is required.

The device uses the configured field names to parse the HTTP response returned from the custom authentication server, as follows:

·     If you specify the policy field name, the SSL VPN gateway uses the specified name to identify the policy group field in the response. For example, if the policy group field name is specified as company, the device uses the value following company in the response as the server-authorized policy group.

The policy group finally assigned to the user is determined as follows:

¡     If the SSL VPN context has the server-authorized policy group configured, the gateway assigns the authorized policy group to the user.

¡     If the SSL VPN context has no policy groups, or the server does not authorize a policy group, the gateway assigned the default policy to the user.

·     If you specify the message field name, the SSL VPN gateway uses the specified name to identify the authentication result message in the response. The message indicates the authentication result, such as authentication success or failure.

·     If you specify the result field name, the SSL VPN gateway uses the specified name to identify the authentication result value in the response. The gateway then determines the authentication result based on the configured authentication success value (see the custom-authentication response-success-value command).

If you execute this command multiple times for a field, the most recent configuration takes effect.

Examples

# Specify the group field name as company and the message field name as resultDescription in the custom authentication response for SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] custom-authentication response-field group company

[Sysname-sslvpn-context-ctx1] custom-authentication response-field message resultDescription

Related commands

authentication server-type

custom-authentication response-format

Use custom-authentication response-format to specify the HTTP response format for custom authentication.

Use undo custom-authentication response-format to restore the default.

Syntax

custom-authentication response-format { custom | json | xml }

undo custom-authentication response-format

Default

The HTTP response format for custom authentication is JSON.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

custom: Specifies the XML format.

json: Specifies the JSON format.

xml: Specifies the custom response format.

Usage guidelines

Use this command to configure the HTTP response format for custom authentication after the custom authentication server is specified by using the authentication server-type custom command. After you specify the HTTP response format, you must also configure corresponding HTTP response settings (such as the HTTP response templates and field names) for the specified format.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the HTTP response format as JSON in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] custom-authentication response-format json

Related commands

authentication server-type

custom-authentication response-custom-template

custom-authentication response-success-value

Use custom-authentication response-success-value to configure the authentication success value in the HTTP response for custom authentication.

Use undo custom-authentication response-success-value to restore the default.

Syntax

custom-authentication response-success-value success-value

undo custom-authentication response-success-value

Default

No authentication success value is configured for custom authentication.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

success-value: Specifies the value that represents the authentication success result, a case-insensitive string of 1 to 31 characters.

Usage guidelines

Use this command to configure the authentication success value in the HTTP response. Perform this configuration after the custom authentication server is specified by using the authentication server-type custom command. To have the configuration take effect, you must also configure other custom authentication settings, such as specifying the result field name in the HTTP response.

The SSL VPN gateway considers the user authentication successful only when the value of the result field in the custom authentication response is the value specified by this command.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the authentication success value as true in the custom authentication response for SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] custom-authentication response-success-value true

Related commands

authentication server-type

custom-authentication response-field

custom-authentication timeout

Use custom-authentication timeout to specify the custom authentication timeout.

Use undo custom-authentication timeout to restore the default.

Syntax

custom-authentication timeout seconds

undo custom-authentication timeout

Default

The custom authentication timeout is 15 seconds.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

seconds: Specifies the custom authentication timeout, in the range of 5 to 50 seconds.

Usage guidelines

After sending an HTTP request to the custom authentication server, the SSL VPN gateway waits for responses from the server. If the gateway receives no response within the authentication timeout, it returns an authentication failure message to the SSL VPN client.

Examples

# Specify the custom authentication timeout as 20 seconds in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] custom-authentication timeout 20

Related commands

authentication server-type

custom-authentication url

Use custom-authentication url to configure the URL of the custom authentication server.

Use undo custom-authentication url to restore the default.

Syntax

custom-authentication url url

undo custom-authentication url

Default

No URL is configured for the custom authentication server.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

url: Specifies the URL of the authentication server in an HTTP request sent by the SSL VPN gateway to the custom authentication server. The URL is a case-insensitive string of 1 to 255 characters, and it cannot contain question mark (?) metacharacters.

Usage guidelines

Use this command to configure the URL of the custom authentication server after the custom authentication server is specified by the authentication server-type custom command. To have the configuration take effect, you must also configure other custom authentication settings, such as the HTTP request header fields, request method, and request template.

A URL consists of the protocol type, host name or address, port number, and resource path. The complete URL format is protocol type://host name or address:port number/resource path. The protocol type currently supports only HTTP and HTTPS. If not specified, the protocol type is HTTP by default. If the URL contains an IPv6 address, enclose the IPv6 address in brackets, for example, http://[1234::5678]:8080.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure the URL of the custom authentication server in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] custom-authentication url http://192.168.56.2:8080/register/user/checkUserAndPwd

Related commands

authentication server-type

custom-authentication request-method

custom-authentication request-template

default

Use default to restore the default settings for an SSL VPN AC interface.

Syntax

default

Views

SSL VPN AC interface view

Predefined user roles

network-admin

context-admin

Usage guidelines

CAUTION

CAUTION:

The default command might interrupt ongoing network services. Make sure you are fully aware of the impact of this command when you use it on a live network.

 

This command might fail to restore the default settings for some commands for reasons such as command dependencies or system restrictions. Use the display this command in interface view to identify these commands. Use their undo forms or follow the command reference to restore their default settings. If your restoration attempt still fails, follow the error message instructions to resolve the problem.

Examples

# Restore the default settings of sslvpn-ac 1000.

<Sysname> system-view

[Sysname] interface sslvpn-ac 1000

[Sysname-SSLVPN-AC1000] default

This command will restore the default settings. Continue? [Y/N]:y

default-policy-group

Use default-policy-group to specify a policy group as the default policy group.

Use undo default-policy-group to restore the default.

Syntax

default-policy-group group-name

undo default-policy-group

Default

No policy group is specified as the default policy group.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

group-name: Specifies a policy group by its name, a case-insensitive string of 1 to 31 characters. The specified policy group must have been created.

Usage guidelines

You can configure multiple policy groups for an SSL VPN context. When a remote user accesses the SSL VPN context, the AAA server issues the authorized policy group to the associated SSL VPN gateway. The user can access only the resources allowed by the authorized policy group. If the AAA server does not issue an authorized policy group to the user, the user can access only the resources allowed by the default policy group.

Examples

# Specify policy group pg1 as the default policy group.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group-pg1] quit

[Sysname-sslvpn-context-ctx1] default-policy-group pg1

Related commands

display sslvpn context

policy-group

description (shortcut view)

Use description to configure a description for a shortcut.

Use undo description to restore the default.

Syntax

description text

undo description

Default

No description is configured for a shortcut.

Views

Shortcut view

Predefined user roles

network-admin

context-admin

Parameters

text: Specifies a description, a case-sensitive string of 1 to 63 characters.

Usage guidelines

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure a description for shortcut shortcut1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] shortcut shortcut1

[Sysname-sslvpn-context-ctx1-shortcut-shortcut1] description shortcut1

description (SSL VPN AC interface view)

Use description to configure the description of an interface.

Use undo description to restore the default.

Syntax

description text

undo description

Default

The description of an interface is interface name Interface, for example, SSLVPN-AC1000 Interface.

Views

SSL VPN AC interface view

Predefined user roles

network-admin

context-admin

Parameters

text: Specifies a description, a case-sensitive string of 1 to 255 characters.

Usage guidelines

Configure descriptions for interfaces for identification and management purposes.

You can use the display interface command to display the configured interface descriptions.

Examples

# Configure a description of SSL VPN A for SSL VPN AC 1000.

<Sysname> system-view

[Sysname] interface sslvpn-ac 1000

[Sysname-SSLVPN-AC1000] description SSL VPN A

display interface sslvpn-ac

Use display interface sslvpn-ac to display SSL VPN AC interface information.

Syntax

display interface [ sslvpn-ac [ interface-number ] ] [ brief [ description | down ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

sslvpn-ac [ interface-number ]: Specifies an SSL VPN AC interface by its number in the range of 0 to 4095. If you do not specify the sslvpn-ac keyword, this command displays information about all interfaces except virtual access (VA) interfaces. If you specify the sslvpn-ac keyword without the interface-number argument, this command displays information about all SSL VPN AC interfaces. For more information about VA interfaces, see PPP configuration in Layer 2—WAN Access Configuration Guide.

brief: Displays brief interface information. If you do not specify this keyword, the command displays detailed interface information.

description: Displays complete interface descriptions. If you do not specify this keyword, the command displays only the first 27 characters of interface descriptions.

down: Displays information about interfaces in the physical state of DOWN and the causes. If you do not specify this keyword, the command displays information about interfaces in all states.

Examples

# Display detailed information about SSL VPN AC 1000.

<Sysname> display interface sslvpn-ac 1000

SSLVPN-AC1000

Current state: UP

Line protocol state: DOWN

Description: SSLVPN-AC1000 Interface

Bandwidth: 64kbps

Maximum transmission unit: 1500

Internet protocol processing: Disabled

Link layer protocol is SSLVPN

Last clearing of counters: Never

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 0 packets, 0 bytes, 0 drops

Table 1 Command output

Field

Description

SSLVPN-AC1000

Information about interface SSL VPN AC 1000.

Current state

Physical link state of the interface:

·     Administratively DOWN—The interface has been shut down by using the shutdown command.

·     DOWN—The interface is administratively up, but its physical state is down (possibly because no physical link exists or the link has failed).

·     UP—The interface is both administratively and physically up.

Line protocol state

Data link layer state of the interface. The state is determined through automatic parameter negotiation at the data link layer.

·     UP—The data link layer protocol is up.

·     UP (spoofing)—The data link layer protocol is up, but the link is an on-demand link or does not exist. This attribute is typical of null interfaces and loopback interfaces.

·     DOWN—The data link layer protocol is down.

Description

Description of the interface.

Bandwidth

Expected bandwidth of the interface.

Maximum transmission unit

MTU of the interface.

Internet protocol processing: Disabled

The interface is not assigned an IP address and cannot process IP packets.

Internet address: ip-address/mask-length (Type)

IP address of the interface and type of the address in parentheses.

Possible IP address types include:

Primary—Manually configured primary IP address.

Last clearing of counters

Most recent time the counters were cleared by using the reset counters interface command.

If the reset counters interface command has never been executed since the device starts up, this field displays Never.

Last 300 seconds input rate

Average input rate in the last 300 seconds.

Last 300 seconds output rate

Average output rate in the last 300 seconds.

 

# Display brief information about all SSL VPN AC interfaces.

<Sysname> display interface sslvpn-ac brief

Brief information of interfaces in route mode:

Link: ADM - administratively down; Stby - standby

Protocol: (s) - spoofing

Interface            Link Protocol Primary IP         Description

SSLVPN-AC1000        UP   DOWN     --

# Display brief information about SSL VPN AC 1000, including the complete interface description.

<Sysname> display interface sslvpn-ac 1000 brief description

Brief information of interfaces in route mode:

Link: ADM - administratively down; Stby - standby

Protocol: (s) - spoofing

Interface            Link Protocol Primary IP         Description

SSLVPN-AC1000        UP    UP      1.1.1.1            SSLVPN-AC1000 Interface

# Display information about interfaces in DOWN state and the causes.

<Sysname> display interface sslvpn-ac brief down

Brief information of interfaces in route mode:

Link: ADM - administratively down; Stby - standby

Interface            Link Cause

SSLVPN-AC1000        ADM

SSLVPN-AC1001        ADM

Table 2 Command output

Field

Description

Brief information of interfaces in route mode:

Brief information about Layer 3 interfaces.

Interface

Abbreviated interface name.

Link

Physical link state of the interface:

·     UP—The interface is physically up.

·     DOWN—The interface is physically down.

·     ADM—The interface has been shut down by using the shutdown command. To restore the physical state of the interface, use the undo shutdown command.

·     Stby—The interface is a backup interface in standby state.

Protocol

Data link layer protocol state of the interface:

·     UP—The data link layer protocol of the interface is up.

·     UP(s)—The data link layer protocol of the interface is up, but the link is an on-demand link or does not exist. The (s) attribute represents the spoofing flag. This value is typical of null interfaces and loopback interfaces.

·     DOWN—The data link layer protocol of the interface is down.

Primary IP

Primary IP address of the interface.

Description

Description of the interface.

Cause

Cause for the physical link state of an interface to be DOWN:

·     Administratively—The interface has been manually shut down by using the shutdown command. To restore the physical state of the interface, use the undo shutdown command.

·     Not connected—No physical connection exists (possibly because the network cable is disconnected or faulty).

 

Related commands

reset counters interface

display sslvpn context

Use display sslvpn context to display SSL VPN context information.

Syntax

display sslvpn context [ brief | name context-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

brief: Displays brief SSL VPN context information. If you do not specify this keyword, the command displays detailed SSL VPN context information.

name context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays information about all SSL VPN contexts.

Examples

# Display detailed information about all SSL VPN contexts.

<Sysname> display sslvpn context

Context name: ctx1

  Operation state: Up

  AAA domain: domain1

  Certificate authentication: Enabled

  Certificate username-attribute: CN

  Password authentication: Enabled

  Authentication use: All

  SMS auth type: iMC

  Code verification: Disabled

  Default policy group: Not configured

  Associated SSL VPN gateway: gw1

    Domain name: 1

  Associated SSL VPN gateway: gw2

    Virtual host: abc.com

  Associated SSL VPN gateway: gw3

  SSL client policy configured: ssl1

  SSL client policy in use: ssl

  Maximum users allowed: 200

  VPN instance:vpn1

  Idle timeout: 30 min

  Idle-cut traffic threshold: 100 Kilobytes

  Authentication server-type: aaa

  Password changing: Disabled

 

Context name: ctx2

  Operation state: Down

  Down reason: Administratively down

  AAA domain not specified

  Certificate authentication: Enabled

  Certificate username-attribute: OID(2.5.4.10)

  Password authentication: Disabled

  Authentication use: Any-one

  SMS auth type: sms-gw

  Code verification: Disabled

  Default group policy: gp

  Associated SSL VPN gateway: -

  SSL client policy configured: ssl1

  SSL client policy in use: ssl

  Maximum users allowed: 200

  VPN instance not configured

  Idle timeout: 50 min

  Idle-cut traffic threshold: 100 Kilobytes

  Address pool: Conflicted with an IP address on the device

  Authentication server-type: custom

  Password changing: Disabled

Table 3 Command output

Field

Description

Context name

Name of the SSL VPN context.

Operation state

Operation state of the SSL VPN context:

·     Up—The context is running.

·     Down—The context is not running.

Down reason

Causes for the Down operations status:

·     Administratively down—The context is disabled. To enable the context, use the service enable command.

·     No gateway associated—The context is not associated with an SSL VPN gateway.

AAA domain

ISP domain for the SSL VPN context.

Certificate authentication

Whether certificate authentication is enabled for the SSL VPN context.

Password authentication

Whether username/password authentication is enabled for the SSL VPN context.

Authentication use

Authentication methods required for user login:

·     All—A user must pass all the enabled authentication methods to log in to the SSL VPN context.

·     Any-one—A user can log in to the SSL VPN context after passing any enabled authentication method.

Certificate username-attribute

Certificate attribute whose value is used as the SSL VPN username:

·     CN—CN attribute in the subject of the user certificate.

·     Email-prefix—String before the at sign (@) of the email address in the subject of the user certificate.

·     OID(x.x.x.x)—Object identifier of a user certificate attribute in dotted decimal notation.

This field is displayed only when certificate authentication is enabled.

SMS auth type

SMS authentication types:

·     iMC—SMS authentication by an IMC server.

·     sms-gw—SMS authentication by an SMS gateway.

Code verification

Whether code verification is enabled for the SSL VPN context.

Default policy group

Default policy group used by the SSL VPN context.

Associated SSL VPN gateway

SSL VPN gateway associated with the SSL VPN context.

Domain name

Domain name specified for the SSL VPN context.

Virtual host

Virtual host name specified for the SSL VPN context.

SSL client policy configured

SSL client policy configured for the SSL VPN context.

A newly configured SSL client policy takes effect only after the SSL VPN context is restarted.

SSL client policy in use

SSL client policy being used by the SSL VPN context.

Maximum users allowed

Maximum number of sessions allowed in the SSL VPN context.

VPN instance

VPN instance associated with the SSL VPN context.

Idle timeout

Maximum idle time of an SSL VPN session, in minutes.

Idle-cut traffic threshold

SSL VPN idle session disconnection traffic threshold.

Address pool: Conflicted with an IP address on the device

An IP address conflict was detected in the SSL VPN context.

Authentication server-type

Authentication server types:

·     aaa—AAA server.

·     custom—Custom authentication server.

Password changing

Status of the SSL VPN login password modification feature:

·     Enabled.

·     Disabled.

 

# Display brief information about all SSL VPN contexts.

<Sysname> display sslvpn context brief

Context name   Admin   Operation   VPN instance   Gateway   Domain/VHost

ctx1           Up      Up          -              gw1       -/1

                                                  gw2       abc.com/-

                                                  gw3       -/-

ctx2           Down   Down         -              -         -/-

Table 4 Command output

Field

Description

Context name

Name of the SSL VPN context.

Admin

Administrative status of the SSL VPN context:

·     Up—The context has been enabled by using the service enable command.

·     Down—The context is disabled.

Operation

Operation state of the SSL VPN context:

·     Up—The context is running.

·     Down—The context is not running.

VPN instance

VPN instance associated with the SSL VPN context.

Gateway

SSL VPN gateway associated with the SSL VPN context.

Domain/VHost

Domain name or virtual host name specified for the SSL VPN context.

display sslvpn gateway

Use display sslvpn gateway to display SSL VPN gateway information.

Syntax

display sslvpn gateway [ brief | name gateway-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

brief: Displays brief SSL VPN gateway information. If you do not specify this keyword, the command displays detailed SSL VPN gateway information.

name gateway-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays information about all SSL VPN gateways.

Examples

# Display detailed information about all SSL VPN gateways.

<Sysname> display sslvpn gateway

Gateway name: gw1

  Operation state: Up

  IP: 192.168.10.75  Port: 443

  HTTP redirect port: 80

  SSL server policy configured: ssl1

  SSL server policy in use: ssl

  Front VPN instance: vpn1

Gateway name: gw2

  Operation state: Down

  Down reason: Administratively down

  IP: 0.0.0.0  Port: 443

  SSL server policy configured: ssl1

  SSL server policy in use: ssl

  Front VPN instance: Not configured

Gateway name: gw3

  Operation state: Up

  IPv6: 3000::2  Port: 443

  SSL server policy configured: ssl1

  SSL server policy in use: ssl

  Front VPN instance: Not configured

Table 5 Command output

Field

Description

 

Gateway name

Name of the SSL VPN gateway.

 

Operation state

Operation state of the SSL VPN gateway:

·     Up—The gateway is running.

·     Down—The gateway is not running.

 

Down reason

Causes for the Down operation status:

·     Administratively down—The SSL VPN gateway is disabled. To enable the gateway, use the service enable command.

·     VPN instance not exist—The VPN instance to which the SSL VPN gateway belongs does not exist.

·     Applying SSL server-policy failed—Failed to apply the SSL server policy to the SSL VPN gateway.

 

IP

IPv4 address of the SSL VPN gateway.

 

IPv6

IPv6 address of the SSL VPN gateway.

Port

Port number of the SSL VPN gateway.

 

HTTP redirect port

HTTP redirection port number of the SSL VPN gateway.

 

SSL server policy configured

SSL server policy configured for the SSL VPN gateway.

A newly configured SSL server policy takes effect only after the SSL VPN gateway is restarted.

 

SSL server policy in use

SSL server policy being used by the SSL VPN gateway.

 

Front VPN instance

Front VPN instance to which the SSL VPN gateway belongs.

 

# Display brief information about all SSL VPN gateways.

<Sysname> display sslvpn gateway brief

Gateway name                    Admin  Operation

gw1                             Up     Up

gw2                             Down   Down (Administratively down)

gw3                             Up     Up

Table 6 Command output

Field

Description

Gateway name

Name of the SSL VPN gateway.

Admin

Administrative status of the SSL VPN gateway:

·     Up—The gateway has been enabled by using the service enable command.

·     Down—The gateway is disabled.

Operation

Operation state of the SSL VPN gateway:

·     Up—The gateway is running.

·     Down (Administratively down)—The gateway is disabled. To enable the gateway, use the service enable command.

·     Down (VPN instance not exist)—The gateway is down because the VPN instance to which the gateway belongs does not exist.

·     Down (Applying SSL server-policy failed)—The gateway is down because the SSL server policy failed to be applied to the gateway.

display sslvpn ip-tunnel statistics

Use display sslvpn ip-tunnel statistics to display packet statistics for IP access users.

Syntax

display sslvpn ip-tunnel statistics [ context context-name ] [ user user-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_).

user user-name: Specifies an IP access user by username, a case-insensitive string of 1 to 63 characters.

Usage guidelines

If you do not specify any parameters, this command displays IP access packets statistics for all SSL VPN contexts.

If you only specify an SSL VPN context, this command displays IP access packet statistics for the specified context and for each SSL VPN user in the context.

If you only specify an SSL VPN user, this command displays IP access packet statistics for the specified user in all SSL VPN contexts.

If you specify both an SSL VPN context and user, this command displays IP access packet statistics for the specified user in the specified context.

Examples

# Display IP access packet statistics for all SSL VPN contexts.

<Sysname> display sslvpn ip-tunnel statistics

IP-tunnel statistics in SSL VPN context ctx1:

  Client:

    In bytes  : 125574               Out bytes  : 1717349

  Server:

    In bytes  : 1717349              Out bytes  : 116186

 

IP-tunnel statistics in SSL VPN context ctx2:

  Client:

    In bytes  : 521                  Out bytes  : 1011

  Server:

    In bytes  : 1011                 Out bytes  : 498

# Display IP access packet statistics for SSL VPN context ctx1 and for each user in the context.

<Sysname> display sslvpn ip-tunnel statistics context ctx1

IP-tunnel statistics in SSL VPN context ctx1:

  Client:

    In bytes  : 125574               Out bytes  : 1717349

  Server:

    In bytes  : 1717349              Out bytes  : 116186

 

SSL VPN session IP-tunnel statistics:

Context                       : ctx1

User                          : user1

Session ID                    : 1

User IPv4 address             : 192.168.56.1

Received requests             : 81

Sent requests                 : 0

Dropped requests              : 81

Received replies              : 0

Sent replies                  : 0

Dropped replies               : 0

Received keepalives           : 1

Sent keepalive replies        : 1

Received configuration updates: 0

Sent configuration updates    : 0

 

Context                       : ctx1

User                          : user2

Session ID                    : 2

User IPv6 address             : 1234::5001

Received requests             : 81

Sent requests                 : 0

Dropped requests              : 81

Received replies              : 0

Sent replies                  : 0

Dropped replies               : 0

Received keepalives           : 1

Sent keepalive replies        : 1

Received configuration updates: 0

Sent configuration updates    : 0

 

# Display IP access packet statistics for user user1 in all SSL VPN contexts.

<Sysname> display sslvpn ip-tunnel statistics user user1

SSL VPN session IP-tunnel statistics:

Context                       : ctx1

User                          : user1

Session ID                    : 1

User IPv4 address             : 192.168.56.1

Received requests             : 81

Sent requests                 : 0

Dropped requests              : 81

Received replies              : 0

Sent replies                  : 0

Dropped replies               : 0

Received keepalives           : 1

Sent keepalive replies        : 1

Received configuration updates: 0

Sent configuration updates    : 0

 

Context                       : ctx2

User                          : user1

Session ID                    : 2

User IPv6 address             : 1234::5001

Received requests             : 81

Sent requests                 : 0

Dropped requests              : 81

Received replies              : 0

Sent replies                  : 0

Dropped replies               : 0

Received keepalives           : 1

Sent keepalives replies       : 1

Received configuration updates: 0

Sent configuration updates    : 0

 

# Display IP access packet statistics for user user1 in SSL VPN context ctx1.

<Sysname> display sslvpn ip-tunnel statistics context ctx1 user user1

SSL VPN session IP-tunnel statistics:

Context                       : ctx1

User                          : user1

Session ID                    : 1

User IPv4 address             : 192.168.56.1

Received requests             : 81

Sent requests                 : 0

Dropped requests              : 81

Received replies              : 0

Sent replies                  : 0

Dropped replies               : 0

Received keepalives           : 1

Sent keepalive replies        : 1

Received configuration updates: 0

Sent configuration updates    : 0

 

Context                       : ctx1

User                          : user1

Session ID                    : 2

User IPv6 address             : 1234::5001

Received requests             : 81

Sent requests                 : 0

Dropped requests              : 81

Received replies              : 0

Sent replies                  : 0

Dropped replies               : 0

Received keepalives           : 1

Sent keepalives replies       : 1

Received configuration updates: 0

Sent configuration updates    : 0

Table 7 Command output

Field

Description

Context

SSL VPN context to which the SSL VPN user belongs.

User

Login username used by the SSL VPN user.

User IPv4 address

IPv4 address of the SSL VPN user.

User IPv6 address

IPv6 address of the SSL VPN user.

Received requests

Number of IP access requests received by the SSL VPN gateway from the user.

Sent requests

Number of IP access requests forwarded by the SSL VPN gateway to internal servers.

Dropped requests

Number of IP access requests dropped by the SSL VPN gateway.

Received replies

Number of IP access replies received by the SSL VPN gateway from internal servers.

Sent replies

Number of IP access replies forwarded by the SSL VPN gateway to the user.

Dropped replies

Number of IP access replies dropped by the SSL VPN gateway.

Received keepalives

Number of keepalive messages received by the SSL VPN gateway from the user.

Sent keepalives replies

Number of keepalive replies sent by the SSL VPN gateway to the user.

Received configuration updates

Number of configuration update messages received by the SSL VPN gateway from the user.

Sent configuration updates

Number of configuration update messages sent by the SSL VPN gateway to the user.

Client

Statistics of the traffic transmitted between the SSL VPN gateway and the IP access client:

·     In bytes—Number of bytes received by the SSL VPN gateway from the client.

·     Out bytes—Number of bytes sent by the SSL VPN gateway to the client.

Server

Statistics of the traffic transmitted between the SSL VPN gateway and the server:

·     In bytes—Number of bytes received by the SSL VPN gateway from the server.

·     Out bytes—Number of bytes sent by the SSL VPN gateway to the client.

display sslvpn policy-group

Use display sslvpn policy-group to display SSL VPN policy group information.

Syntax

display sslvpn policy-group group-name [ context context-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

group-name: Specifies a policy group by its name, a case-insensitive string of 1 to 31 characters.

context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays information about policy groups with the specified group name in all SSL VPN contexts.

Examples

# Display information about policy groups named pg1 in all SSL VPN contexts.

<Sysname> display sslvpn policy-group pg1

Group policy: pg1

  Context: context1

   Idle timeout: 35 min

   Redirect resource type: url-item

   Redirect resource name: url1

 

  Context: context2

   Idle timeout: 40 min

   Redirect resource: Not configured

Table 8 Command output

Field

Description

Idle timeout

Maximum idle time of an SSL VPN session, in minutes.

Redirect resource

Redirect resource in the policy group assigned to the SSL VPN context.

display sslvpn port-forward connection

Use display sslvpn port-forward connection to display TCP port forwarding connection information.

Syntax

display sslvpn port-forward connection [ context context-name ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays TCP port forwarding connection information for all SSL VPN contexts.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays TCP port forwarding connection information for all member devices.

Examples

# Display TCP port forwarding connection information for all SSL VPN contexts.

<Sysname> display sslvpn port-forward connection

SSL VPN context  : ctx1

  Client address : 192.0.2.1

  Client port    : 1025

  Server address : 192.168.0.39

  Server port    : 80

  Slot           : 1

  Status         : Connected

SSL VPN context  : ctx2

  Client address : 3000::983F:7A36:BD06:342D

  Client port    : 56190

  Server address : 300::1

  Server port    : 23

  Slot           : 1

  Status         : Connecting

Table 9 Command output

Field

Description

Client address

IP address of the SSL VPN client.

Client port

Port number of the SSL VPN client.

Server address

IP address of the internal server.

Server port

Port number of the internal server.

Slot

IRF member ID of the device.

Status

Connection status, Connected or Connecting.

display sslvpn prevent-cracking frozen-ip

Use display sslvpn prevent-cracking frozen-ip to display information about IP addresses frozen for cracking prevention.

Syntax

display sslvpn prevent-cracking frozen-ip { statistics | table } [ context context-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

statistics: Displays frozen IP address statistics.

table: Displays information about frozen IP address entries.

context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays frozen IP address information for all SSL VPN contexts.

Examples

# Display frozen IP address statistics in all SSL VPN contexts.

<Sysname> display sslvpn prevent-cracking frozen-ip statistics

SSL VPN context: ctx1

Total number of frozen IP addresses: 1

Total number of username/password authentication failures: 1

Total number of code verification failures: 1

Total number of SMS authentication failures: 1

Total number of custom authentication failures: 1

SSL VPN context: ctx2

Total number of frozen IP addresses: 1

Total number of username/password authentication failures: 1

Total number of code verification failures: 1

Total number of SMS authentication failures: 1

Total number of custom authentication failures: 1

# Display frozen IP address entries in all SSL VPN contexts.

<Sysname> display sslvpn prevent-cracking frozen-ip table

SSL VPN context: ctx1

IP address   Authentication method              Frozen at            Unfrozen at

8.1.1.80     code verification                  2019-10-08 08:30:01  2019-10-08 08:35:04

3.3.3.30     Username/password authentication   2019-10-08 08:35:01  2019-10-08 08:39:04

SSL VPN context: ctx2

IP address   Authentication method              Frozen at            Unfrozen at

121.5.5.32   Username/password authentication   2019-10-08 08:31:01  2019-10-08 08:45:04

123.3.3.3    code verification                  2019-10-08 08:35:01  2019-10-08 08:55:04

Table 10 Command output

Field

Description

SSL VPN context

Name of the SSL VPN context.

IP address

Frozen IP address.

Authentication method

Authentication methods required for logging in to the SSL VPN context. Options include:

·     Username/password authentication.

·     Code verification.

·     SMS authentication.

·     Custom authentication.

The use of authentication methods must meet the following requirements:

·     You can enable one or multiple authentication methods.

·     Username/password authentication must be enabled in an SSL VPN context.

·     Custom authentication and SMS authentication cannot both be enabled at the same time.

All authentication methods can be used independently except for code verification.

Frozen at

Time when the IP address was frozen.

Unfrozen at

Time when the frozen IP address is to be unfrozen. N/A means that the IP address will never be unfrozen.

display sslvpn session

Use display sslvpn session to display SSL VPN session information.

Syntax

display sslvpn session [ context context-name ] [ user user-name | verbose ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command displays SSL VPN session information for all SSL VPN contexts.

user user-name: Specifies an SSL VPN user by the username, a case-insensitive string of 1 to 63 characters. If you specify a user, this command displays detailed SSL VPN session information for the user. If you do not specify a user, this command displays brief SSL VPN session information for all users.

verbose: Displays detailed SSL VPN session information for all SSL VPN users. If you do not specify this keyword, the command displays brief SSL VPN session information for the specified or all SSL VPN users.

Examples

# Display brief SSL VPN session information for all users in all SSL VPN contexts.

<Sysname> display sslvpn session

Total users: 4

 

SSL VPN context: ctx1

Users: 2

Username        Connections  Idle time   Created       User IP

user1           5            0/00:00:23  0/04:47:16    192.0.2.1

user2           5            0/00:00:46  0/04:48:36    192.0.2.2

 

SSL VPN context: ctx2

Users: 2

Username        Connections  Idle time   Created       User IP

user3           5            0/00:00:30  0/04:50:06    192.168.2.1

user4           5            0/00:00:50  0/04:51:16    192.168.2.2

Table 11 Command output

Field

Description

Total users

Total number of users in all SSL VPN contexts.

SSL VPN context

Name of the SSL VPN context.

Users

Number of users in the SSL VPN context.

Username

Login name for the SSL VPN session.

Connections

Number of connections in the SSL VPN session.

Idle time

Duration that the SSL VPN session has been idle, in the format of days/hh:mm:ss.

Created

Time elapsed since the SSL VPN session was created, in the format of days/hh:mm:ss.

User IP

IP address used by the SSL VPN session.

 

# Display SSL VPN session information for SSL VPN user user1.

<Sysname> display sslvpn session user user1

User                   : user1

Authentication method  : Username/password authentication

Context                : context1

Policy group           : pgroup

Idle timeout           : 30 min

Created at             : 13:49:27 UTC Wed 05/14/2014

Lastest                : 17:50:58 UTC Wed 05/14/2014

User IPv4 address      : 192.0.2.1

Session ID             : 1

Web browser/OS         : Internet Explorer

Send rate              : 0.00 B/s

Receive rate           : 0.00 B/s

Sent bytes             : 0.00 B

Received bytes         : 0.00 B

 

User                   : user1

Authentication method  : Username/password authentication

Context                : context2

Policy group           : Default

Idle timeout           : 2100 sec

Created at             : 14:15:12 UTC Wed 05/14/2014

Lastest                : 18:56:58 UTC Wed 05/14/2014

User IPv6 address      : 0:30::983F:7A36:BD06:342D

Session ID             : 5

Web browser/OS         : Internet Explorer

Send rate              : 0.00 B/s

Receive rate           : 0.00 B/s

Sent bytes             : 0.00 B

Received bytes         : 0.00 B

# Display detailed SSL VPN session information for all users in all SSL VPN contexts.

<Sysname> display sslvpn session verbose

User                   : user1

Authentication method  : Username/password authentication

Context                : context1

Policy group           : pgroup

Idle timeout           : 30 min

Created at             : 13:49:27 UTC Wed 05/14/2014

Lastest                : 17:50:58 UTC Wed 05/14/2014

User IPv4 address      : 192.0.2.1

Session ID             : 1

Web browser/OS         : Internet Explorer

Send rate              : 0.00 B/s

Receive rate           : 0.00 B/s

Sent bytes             : 0.00 B

Received bytes         : 0.00 B

 

User                   : user1

Authentication method  : Username/password authentication

Context                : context2

Policy group           : Default

Idle timeout           : 2100 sec

Created at             : 14:15:12 UTC Wed 05/14/2014

Lastest                : 18:56:58 UTC Wed 05/14/2014

User IPv6 address      : 0:30::983F:7A36:BD06:342D

Session ID             : 5

Web browser/OS         : Internet Explorer

Send rate              : 0.00 B/s

Receive rate           : 0.00 B/s

Sent bytes             : 0.00 B

Received bytes         : 0.00 B

Table 12 Command output

Field

Description

User

SSL VPN username.

Authentication method

Authentication methods required for logging in to the SSL VPN context. Options include:

·     Username/password authentication.

·     Certificate authentication.

·     Code verification.

·     SMS authentication.

·     Custom authentication.

The use of authentication methods must meet the following requirements:

·     You can enable one or multiple authentication methods.

·     Username/password authentication, certificate authentication, or both must be enabled in an SSL VPN context.

·     Custom authentication and SMS authentication cannot both be enabled at the same time.

·     All authentication methods can be used independently except for code verification.

Context

Context to which the user belongs.

Policy group

Policy group used by the user.

Idle timeout

Idle timeout time of the SSL VPN session, in seconds.

Created at

Time at which the SSL VPN session was created.

Lastest

Most recent time when the SSL VPN user accessed resources through the SSL VPN session.

Allocated IP

IP address allocated to the iNode client of the SSL VPN user.

This field is displayed only for iNode users.

User IPv4 address

IPv4 address used by the SSL VPN session.

User IPv6 address

IPv6 address used by the SSL VPN session.

Web browser/OS

Web browser or operating system used by the SSL VPN user.

Send rate

Sending rate of the SSL VPN session in one of the following units:

·     B/s—Bytes per second.

·     KB/s—Kilobytes per second.

·     MB/s—Megabytes per second.

·     GB/s—Gigabytes per second.

·     TB/s—Terabytes per second.

·     PB/s—Petabytes per second.

Receive rate

Receiving rate of the SSL VPN session in one of the following units:

·     B/s—Bytes per second.

·     KB/s—Kilobytes per second.

·     MB/s—Megabytes per second.

·     GB/s—Gigabytes per second.

·     TB/s—Terabytes per second.

·     PB/s—Petabytes per second.

Sent bytes

Traffic sent by the SSL VPN session in one of the following units:

·     B—Bytes.

·     KB—Kilobytes.

·     MB—Megabytes.

·     GB—Gigabytes.

·     TB—Terabytes.

·     PB—Petabytes.

Received bytes

Traffic received by the SSL VPN session in one of the following units:

·     B—Bytes.

·     KB—Kilobytes.

·     MB—Megabytes.

·     GB—Gigabytes.

·     TB—Terabytes.

·     PB—Petabytes.

display sslvpn webpage-customize template

Use display sslvpn webpage-customize template to display SSL VPN webpage template information.

Syntax

display sslvpn webpage-customize template

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Examples

# Display information about all webpage templates.

<Sysname> display sslvpn webpage-customize template

Template name            Type              Status

default                  Pre-defined       Normal

system                   Predefined        Normal

User1                    User-defined      File login.html missing

User2                    User-defined      File home.html missing

Table 13 Command output

Field

Description

Template name

Name of the SSL VPN webpage template.

Type

Type of the SSL VPN webpage template:

·     Pre-defined.

·     User-defined.

Status

State of the SSL VPN webpage template:

·     Normal—The template is complete and can be used.

·     File login.html missing—The login.html file is missing in the template.

·     File home.html missing—The home.html file is missing in the template.

·     Version incompatible—The version of the template is inconsistent with the version of the predefined template.

Related commands

sslvpn webpage-customize

webpage-customize

emo-server

Use emo-server to specify an Endpoint Mobile Office (EMO) server for mobile clients.

Use undo emo-server to restore the default.

Syntax

emo-server address { host-name | ipv4-address } port port-number

undo emo-server

Default

No EMO server is specified for mobile clients.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

address: Specifies the host name or IPv4 address of the EMO server.

host-name: Specifies the host name of the EMO server, a case-insensitive string of 1 to 127 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.).

ipv4-address: Specifies the IPv4 address of the EMO server, in dotted decimal notation. The IP address cannot be a multicast, broadcast, or loopback address.

port port-number: Specifies the port number of the EMO server, in the range of 1025 to 65535.

Usage guidelines

An EMO server provides services for mobile clients. The SSL VPN gateway issues the EMO server information to the clients, and the clients can access available service resources through the EMO server.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the IP address of the EMO server as 10.10.1.1 and the port number as 9058 for context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] emo-server address 10.10.1.1 port 9058

exclude

Use exclude to add an excluded route to a route list.

Use undo exclude to delete an excluded route from a route list.

Syntax

exclude ip-address { mask | mask-length }

undo exclude ip-address { mask | mask-length }

Default

No excluded routes exist in a route list.

Views

Route list view

Predefined user roles

network-admin

context-admin

Parameters

ip-address: Specifies the destination IP address of the route. It cannot be a multicast, broadcast, or loopback address.

mask: Specifies the subnet mask of the destination IP address.

mask-length: Specifies the mask length of the destination IP address, an integer in the range of 0 to 32.

Usage guidelines

To deny user access to specific network nodes or segments behind an SSL VPN gateway, configure excluded routes for those nodes or segments.

When a client accesses the SSL VPN gateway in IP access mode, the SSL VPN gateway issues excluded routes to the client. The client adds the excluded routes to the local routing table. Traffic that matches the excluded routes are not sent to the SSL VPN gateway.

You can add multiple excluded routes to a route list.

If you execute the include and exclude commands to add the same route to a route list, the most recent configuration takes effect.

Examples

# Add excluded route 192.168.0.0/16 to route list rtlist.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] ip-route-list rtlist

[Sysname-sslvpn-context-ctx1-route-list-rtlist] exclude 192.168.0.0 16

Related commands

include

execution (port forwarding item view)

Use execution to configure a resource link for a port forwarding item.

Use undo execution to restore the default.

Syntax

execution script

undo execution

Default

No resource link is configured for a port forwarding item.

Views

Port forwarding item view

Predefined user roles

network-admin

context-admin

Parameters

script: Specifies the script for the resource link, a case-insensitive string of 1 to 255 characters.

Usage guidelines

You can configure a resource link in one of the following methods:

·     Enter a URL resource in the format of url('url-value'). The url-value argument specifies the URL link. The complete format for url-value is protocol://hostname or address:port number/resource path.

·     Enter an executable JavaScript for a resource to provide access to the resource.

After you configure a resource link for a port forwarding item, you can click the port forwarding name on the SSL VPN Web page to access the resource.

If you execute this command for a port forwarding item multiple times, the most recent configuration takes effect.

Examples

# Configure the url(‘http://127.0.0.1’) resource for port forwarding item pfitem1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] port-forward-item pfitem1

[Sysname-sslvpn-context-ctx1-forward-item-pfitem1] execution url(‘http://127.0.0.1’)

execution (shortcut view)

Use execution to configure a resource link for a shortcut.

Use undo execution to restore the default.

Syntax

execution script

undo execution

Default

No resource link is configured for a shortcut.

Views

Shortcut view

Predefined user roles

network-admin

context-admin

Parameters

script: Specifies the script for the resource, a case-insensitive string of 1 to 255 characters.

Usage guidelines

You can configure a resource link in either of the following methods:

·     Enter the resource link in the format of url('url-value'). The url-value argument specifies the corresponding resource. The complete format for url-value is protocol://hostname or address:port number/resource path.

·     Enter an application resource in the format of app('app-value'). The app-value argument specifies the application path. For example, the app-value argument can be c:\windows\system32\notepad++.exe, which is used for opening the notepad++.exe application.

·     Enter an executable JavaScript for a resource to provide access to the resource.

After you configure a resource link for a shortcut, you can click the shortcut name on the SSL VPN Web page to access the resource.

If you execute this command for a shortcut multiple times, the most recent configuration takes effect.

Examples

# Configure the url(‘http://10.0.0.1’) resource for shortcut shortcut1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] shortcut shortcut1

[Sysname-sslvpn-context-ctx1-shortcut-shortcut1] execution url(‘http://10.0.0.1’)

# Configure the app(‘c:\windows\system32\notepad++.exe’) resource for shortcut shortcut2.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] shortcut shortcut2

[Sysname-sslvpn-context-ctx1-shortcut-shortcut2] execution app(‘c:\windows\system32\notepad++.exe’)

file-policy

Use file-policy to create a file policy and enter its view, or enter the view of an existing file policy.

Use undo file-policy to delete a file policy.

Syntax

file-policy policy-name

undo file-policy policy-name

Default

No file policies exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

policy-name: Specifies a file policy name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

The SSL VPN gateway uses a file policy to rewrite the content of Web page files before forwarding them to requesting Web access users.

You can configure multiple file policies in an SSL VPN context.

Examples

# Create a file policy named fp and enter its view.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] file-policy fp

[Sysname-sslvpn-context-ctx-file-policy-fp]

Related commands

sslvpn context

filter ip-tunnel acl

Use filter ip-tunnel acl to specify an advanced ACL for IP access filtering.

Use undo filter ip-tunnel acl to remove the advanced ACL configuration for IP access filtering.

Syntax

filter ip-tunnel [ ipv6 ] acl advanced-acl-number

undo filter ip-tunnel [ ipv6 ] acl

Default

All IP accesses are permitted.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

ipv6: Specifies an IPv6 ACL. Do not configure this keyword if you want to specify an IPv4 ACL.

acl advanced-acl-number: Specifies an advanced ACL by its number in the range of 3000 to 3999. If a rule in the specified ACL contains VPN settings, the rule does not take effect.

Usage guidelines

You can specify both an advanced ACL and a URI ACL for IP access filtering.

The SSL VPN gateway uses the following procedure to determine whether to forward an IP access request:

1.     Matches the request against rules in the URI ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 2.

2.     Matches the request against rules in the advanced ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.

If no URI ACL or advanced ACL is specified for IP access filtering, the SSL VPN gateway permits all IP accesses by default.

You can specify an IPv4 ACL, IPv6 ACL, or both by using this command, but you cannot specify multiple IPv4 ACLs or IPv6 ACLs. If you specify IPv4 or IPv6 ACLs multiple times, the most recent IPv4 or IPv6 ACL configuration takes effect.

Examples

# Configure policy group pg1 to use IPv4 ACL 3000 and IPv6 ACL 3500 for IP access filtering.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group-pg1] filter ip-tunnel acl 3000

[Sysname-sslvpn-context-ctx1-policy-group-pg1] filter ip-tunnel ipv6 acl 3500

Related commands

filter ip-tunnel uri-acl

filter ip-tunnel uri-acl

Use filter ip-tunnel uri-acl to specify a URI ACL for IP access filtering.

Use undo filter ip-tunnel uri-acl to remove the URI ACL configuration for IP access filtering.

Syntax

filter ip-tunnel uri-acl uri-acl-name

undo filter ip-tunnel uri-acl

Default

All IP accesses are permitted.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist.

Usage guidelines

You can specify both an advanced ACL and a URI ACL for IP access filtering.

The SSL VPN gateway uses the following procedure to determine whether to forward an IP access request:

1.     Matches the request against rules in the URI ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 2.

2.     Matches the request against rules in the advanced ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.

If no URI ACL or advanced ACL is specified for IP access filtering, the SSL VPN gateway permits all IP accesses by default.

If a rule in the URI ACL specified for IP access filtering contains HTTP or HTTPS settings, the rule does not take effect.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure policy group abcpg to use URI ACL abcuriacl for IP access filtering.

<Sysname> system-view

[Sysname] sslvpn context abc

[Sysname-sslvpn-context-abc] policy-group abcpg

[Sysname-sslvpn-context-abc-policy-group-abcpg] filter ip-tunnel uri-acl abcuriacl

filter tcp-access acl

Use filter tcp-access acl to specify an advanced ACL for TCP access filtering.

Use undo filter tcp-access acl to remove the advanced ACL configuration for TCP access filtering.

Syntax

filter tcp-access [ ipv6 ] acl advanced-acl-number

undo filter tcp-access [ ipv6 ] acl

Default

A user can access only the TCP resources in the TCP port forwarding list authorized to the user.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

ipv6: Specifies an IPv6 ACL. Do not configure this keyword if you want to specify an IPv4 ACL.

acl advanced-acl-number: Specifies an advanced ACL by its number in the range of 3000 to 3999. If a rule in the specified ACL contains VPN settings, the rule does not take effect.

Usage guidelines

You can specify both an advanced ACL and a URI ACL for TCP access filtering.

For mobile client users, the SSL VPN gateway uses the following procedure to determine whether to forward a TCP access request:

1.     Matches the request against the authorized port forwarding list.

¡     If the request matches a port forwarding item in the list, the gateway forwards the request.

¡     If the request does not match any port forwarding items in the list, the gateway proceeds to step 2.

2.     Matches the request against the rules in the URI ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 3.

3.     Matches the request against the rules in the advanced ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.

For PC users, the ACLs configured for TCP access filtering do not take effect. They can access only the TCP resources authorized to them through the TCP port forwarding list.

You can specify an IPv4 ACL, IPv6 ACL, or both by using this command, but you cannot specify multiple IPv4 ACLs or IPv6 ACLs. If you specify IPv4 or IPv6 ACLs multiple times, the most recent IPv4 or IPv6 ACL configuration takes effect.

Examples

# Configure policy group pg1 to use IPv4 ACL 3000 and IPv6 ACL 3500 for TCP access filtering.

<Sysname> system-view

[Sysname]sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group pg1] filter tcp-access acl 3000

[Sysname-sslvpn-context-ctx1-policy-group pg1] filter tcp-access ipv6 acl 3500

Related commands

filter tcp-access uri-acl

filter tcp-access uri-acl

Use filter tcp-access uri-acl to specify a URI ACL for TCP access filtering.

Use undo filter tcp-access uri-acl to remove the URI ACL configuration for TCP access filtering.

Syntax

filter tcp-access uri-acl uri-acl-name

undo filter tcp-access uri-acl

Default

A user can access only the TCP resources in the TCP port forwarding list authorized to the user.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist.

Usage guidelines

You can specify both an advanced ACL and a URI ACL for TCP access filtering.

For mobile client users, the SSL VPN gateway uses the following procedure to determine whether to forward a TCP access request:

1.     Matches the request against the authorized port forwarding list.

¡     If the request matches a port forwarding items in the list, the gateway forwards the request.

¡     If the request does not match any port forwarding items in the list, the gateway proceeds to step 2.

2.     Matches the request against the rules in the URI ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 3.

3.     Matches the request against the rules in the advanced ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.

For PC users, the ACLs configured for TCP access filtering do not take effect. They can access only the TCP resources authorized to them through the TCP port forwarding list.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure policy group abcpg to use URI ACL abcuriacl2 for TCP access filtering.

<Sysname> system-view

[Sysname] sslvpn context abc

[Sysname-sslvpn-context-abc] policy-group abcpg

[Sysname-sslvpn-context-abc-policy-group-abcpg] filter tcp-access uri-acl abcuriacl2

Related commands

filter tcp-access acl

filter web-access acl

Use filter web-access acl to specify an advanced ACL for Web access filtering.

Use undo filter web-access acl to remove the advanced ACL configuration for Web access filtering.

Syntax

filter web-access [ ipv6 ] acl advanced-acl-number

undo filter web-access [ ipv6 ] acl

Default

A user can access only the Web resources in the URL list authorized to the user.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

ipv6: Specifies an IPv6 ACL. Do not configure this keyword if you want to specify an IPv4 ACL.

acl advanced-acl-number: Specifies an advanced ACL by its number in the range of 3000 to 3999. If a rule in the specified ACL contains VPN settings, the rule does not take effect.

Usage guidelines

You can specify both an advanced ACL and a URI ACL for Web access filtering.

The SSL VPN gateway uses the following procedure to determine whether to forward a Web access request:

1.     Matches the request against the authorized URL list.

¡     If the request matches a URL item in the list, the gateway forwards the request.

¡     If the request does not match any URL entries in the list, the gateway proceeds to step 2.

2.     Matches the request against rules in the URI ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 3.

3.     Matches the request against rules in the advanced ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.

You can specify an IPv4 ACL, IPv6 ACL, or both by using this command, but you cannot specify multiple IPv4 ACLs or IPv6 ACLs. If you specify IPv4 or IPv6 ACLs multiple times, the most recent IPv4 or IPv6 ACL configuration takes effect.

Examples

# Configure policy group pg1 to use IPv4 ACL 3000 and IPv6 ACL 3500 for Web access filtering.

<Sysname> system-view

[Sysname]sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group pg1] filter web-access acl 3000

[Sysname-sslvpn-context-ctx1-policy-group pg1] filter web-access ipv6 acl 3500

Related commands

filter web-access uri-acl

filter web-access uri-acl

Use filter web-access uri-acl to specify a URI ACL for Web access filtering.

Use undo filter web-access uri-acl to remove the URI ACL configuration for Web access filtering.

Syntax

filter web-access uri-acl uri-acl-name

undo filter web-access uri-acl

Default

Users can access only the Web resources authorized to them through the URL list.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist.

Usage guidelines

The SSL VPN gateway uses the following procedure to determine whether to forward a Web access request:

1.     Matches the request against the authorized URL list.

¡     If the request matches a URL item in the list, the gateway forwards the request.

¡     If the request does not match any URL entries in the list, the gateway proceeds to step 2.

2.     Matches the request against rules in the URI ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the URI ACL or if no URI ACL is available, the gateway proceeds to step 3.

3.     Matches the request against rules in the advanced ACL:

¡     If the request matches a permit rule, the gateway forwards the request.

¡     If the request matches a deny rule, the gateway drops the request.

¡     If the request does not match any rules in the advanced ACL or if no advanced ACL is available, the gateway drops the request.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Configure policy group abcpg to use URI ACL abcuriacl1 for Web access filtering.

<Sysname> system-view

[Sysname] sslvpn context abc

[Sysname-sslvpn-context-abc] policy-group abcpg

[Sysname-sslvpn-context-abc-policy-group-abcpg] filter web-access uri-acl abcuriacl1

Related commands

filter web-access acl

force-logout

Use force-logout to force online users to log out.

Syntax

force-logout [ all | session session-id | user user-name ]

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

all: Logs out all users.

session session-id: Logs out all users in a session. The session-id argument specifies the session ID in the range of 1 to 4294967295.

user user-name: Logs out a user. The user-name argument specifies the username, a case-sensitive string of 1 to 63 characters.

Examples

# Log out all users in session 1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] force-logout session 1

force-logout max-onlines enable

force-logout max-onlines enable to enable the force logout feature.

undo force-logout max-onlines enable to disable the force logout feature.

Syntax

force-logout max-onlines enable

undo force-logout max-onlines enable

Default

The force logout feature is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Usage guidelines

By default, a user cannot log in if the number of logins using the account reaches the limit.

When a login is attempted but logins using the account reach the maximum, this feature logs out the user with the longest idle time to allow the new login.

Examples

# Enable the force logout feature.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] force-logout max-onlines enable

gateway (SMS gateway authentication view)

Use gateway to specify an SMS gateway for SMS authentication.

Use undo gateway to restore the default.

Syntax

gateway sms-gateway-name

undo gateway

Default

No SMS gateway is specified for SMS authentication.

Views

SMS gateway authentication view

Predefined user roles

network-admin

context-admin

Parameters

sms-gateway-name: Specifies an SMS gateway by its name, a case-insensitive string of 1 to 31 characters. Valid characters are letters, digits, and underscores (_).

Examples

# Specify SMS gateway gw1 in SMS gateway authentication view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] sms-auth sms-gw

[Sysname-sslvpn-context-ctx1-sms-auth-sms-gw] gateway gw1

gateway (SSL VPN context view)

Use gateway to associate an SSL VPN context with an SSL VPN gateway.

Use undo gateway to remove associated SSL VPN gateways.

Syntax

gateway gateway-name [ domain domain-name | virtual-host virtual-host-name ]

undo gateway [ gateway-name ]

Default

An SSL VPN context is not associated with an SSL VPN gateway.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

gateway-name: Specifies an SSL VPN gateway by its name, a case-insensitive string of 1 to 31 characters. Valid characters are letters, digits, and underscores (_).

domain domain-name: Specifies a domain name for the SSL VPN context, a case-insensitive string of 1 to 127 characters.

virtual-host virtual-host-name: Specifies a virtual host name for the SSL VPN context, a case-insensitive string of 1 to 127 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.).

Usage guidelines

When you associate an SSL VPN context with an SSL VPN gateway, follow these guidelines:

·     Make sure the context has a domain name or virtual host name different than any existing contexts associated with the SSL VPN gateway.

The SSL VPN gateway uses the domain name or virtual host name that a remote user entered to determine the SSL VPN context to which the user belongs.

·     If you do not specify a domain name or virtual host name for the context, you cannot associate other SSL VPN contexts with the SSL VPN gateway.

You can associate an SSL VPN context with a maximum of 10 SSL VPN gateways.

Examples

# Associate SSL VPN context ctx1 with SSL VPN gateway gw1, and specify the domain name as domain1 for the context.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] gateway gw1 domain domain1

Related commands

display sslvpn context

heading

Use heading to configure a heading for a URL list.

Use undo heading to restore the default.

Syntax

heading string

undo heading

Default

The heading of a URL list is Web.

Views

URL list view

Predefined user roles

network-admin

context-admin

Parameters

string: Specifies a URL list heading, a case-sensitive string of 1 to 31 characters.

Examples

# Specify urlhead as the heading of URL list url.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-list url

[Sysname-sslvpn-context-ctx1-url-list-url] heading urlhead

Related commands

sslvpn context

url-list

http-redirect

Use http-redirect to enable HTTP redirection.

Use undo http-redirect to disable HTTP redirection.

Syntax

http-redirect [ port port-number ]

undo http-redirect

Default

HTTP redirection is disabled. An SSL VPN gateway does not process HTTP traffic.

Views

SSL VPN gateway view

Predefined user roles

network-admin

context-admin

Parameters

port-number: Specifies the HTTP port number to listen to, a value of 80 (the default) or in the range of 1025 to 65535.

Usage guidelines

This command enables an SSL VPN gateway to perform the following operations:

1.     Listen to an HTTP port.

2.     Redirect HTTP requests with the port number to the port used by HTTPS.

3.     Send redirection packets to clients.

Examples

# Enable HTTP redirection for HTTP port 1025.

<Sysname> system-view

[Sysname] sslvpn gateway gateway1

[Sysname-sslvpn-gateway-gateway1] http-redirect port 1025

idle-cut traffic-threshold

Use idle-cut traffic-threshold to set the SSL VPN session idle-cut traffic threshold.

Use undo idle-cut traffic-threshold to restore the default.

Syntax

idle-cut traffic-threshold kilobytes

undo idle-cut traffic-threshold

Default

The SSL VPN session idle-cut traffic threshold is 0 Kilobytes. An SSL VPN session will be disconnected if no traffic is transmitted within the session idle timeout.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

kilobytes: Specifies the session idle-cut traffic threshold in Kilobytes. The value range is 1 to 4294967295.

Usage guidelines

The SSL VPN session idle-cut traffic threshold refers to the minimum traffic required in the session idle timeout interval for a session not to be disconnected as an idle session.

After the idle-cut traffic threshold is set, the system counts the traffic transmitted in each SSL VPN session at intervals specified by the timeout idle command. If the traffic is less than the idle-cut traffic threshold, the system determines the session to be idle and disconnects the session.

If you change the setting of the idle-cut traffic-threshold or timeout idle command in an SSL VPN context, all session idle-cut traffic counters in the SSL VPN context will be cleared.

Examples

# Set the SSL VPN session idle-cut traffic threshold to 1000 Kilobytes in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] idle-cut traffic-threshold 1000

Related commands

timeout idle

include

Use include to add an included route to a route list.

Use undo include to delete an included route from a route list.

Syntax

include ip-address { mask | mask-length }

undo include ip-address { mask | mask-length }

Default

No included routes exist.

Views

Route list view

Predefined user roles

network-admin

context-admin

Parameters

ip-address: Specifies the destination IP address of the route. It cannot be a multicast, broadcast, or loopback address. The specified IP address must be the address of the network segment where the internal servers reside.

mask: Specifies the subnet mask.

mask-length: Specifies the mask length of the route, an integer in the range of 0 to 32.

Usage guidelines

To permit user access to specific network nodes or segments behind an SSL VPN gateway, configure included routes for those nodes or segments.

When a client accesses an SSL VPN gateway in IP access mode, the SSL VPN gateway issues the included routes to the client. The client adds the included routes to the local routing table, using the VNIC as the output interface. Traffic that matches the included routes are sent to the SSL VPN gateway through the VNIC.

You can add multiple included routes to a route list.

If you execute the include and exclude commands to add the same route to a route list, the most recent configuration takes effect.

Examples

# Add included route 10.0.0.0/8 to route list rtlist.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] ip-route-list rtlist

[Sysname-sslvpn-context-ctx1-route-list-rtlist] include 10.0.0.0 8

Related commands

exclude

interface sslvpn-ac

Use interface sslvpn-ac to create an SSL VPN AC interface and enter its view, or enter the view of an existing SSL VPN AC interface.

Use undo interface sslvpn-ac to delete an SSL VPN AC interface.

Syntax

interface sslvpn-ac interface-number

undo interface sslvpn-ac interface-number

Default

No SSL VPN AC interfaces exist.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

interface-number: Specifies an SSL VPN AC interface number in the range of 0 to 4095.

Examples

# Create SSL VPN AC 1000 and enter its view.

<Sysname>system-view

[Sysname]interface SSLVPN-AC 1000

[Sysname-SSLVPN-AC1000]

ip address

Use ip address to configure an IPv4 address and a port number for an SSL VPN gateway.

Use undo ip address to restore the default.

Syntax

ip address ip-address [ port port-number ]

undo ip address

Default

An SSL VPN gateway uses IPv4 address 0.0.0.0 and port number 443.

Views

SSL VPN gateway view

Predefined user roles

network-admin

context-admin

Parameters

ip-address: Specifies an IP address for the SSL VPN gateway, in dotted decimal notation.

port port-number: Specifies a port number for the SSL VPN gateway. The port number is 443 (the default value) or in the range of 1025 to 65535.

Usage guidelines

A remote user uses the IPv4 address and port number configured by this command to access an SSL VPN gateway.

The specified IPv4 address must be the IP address of an interface on the gateway device and is reachable from clients and internal servers.

If the gateway uses the default address (0.0.0.0), make sure its port number is different from the port number of the HTTPS server on the device.

The IPv4 address and port number of an SSL VPN gateway cannot both be the same as those of the HTTPS server on the device. Otherwise, you can access only the SSL VPN Web interface but cannot access the device management Web interface by using those IPv4 address and port number.

If you execute this command multiple times, the most recent configuration takes effect.

An SSL VPN gateway can use an IPv4 address, an IPv6 address, but not both. If you configure both IPv4 and IPv6 addresses, the most recent configuration takes effect. (The IPv6 address is configured by using the ipv6 address command.)

Examples

# Configure the IPv4 address of SSL VPN gateway gw1 as 10.10.1.1 and the port number as 8000.

<Sysname> system-view

[Sysname] sslvpn gateway gw1

[Sysname-sslvpn-gateway-gw1] ip address 10.10.1.1 port 8000

Related commands

display sslvpn gateway

ipv6 address

ip-route-list

Use ip-route-list to create a route list for an SSL VPN context and enter its view, or enter the view of an existing route list.

Use undo ip-route-list to delete a route list.

Syntax

ip-route-list list-name

undo ip-route-list list-name

Default

No route lists exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

list-name: Specifies a name for the route list, a case-insensitive string of 1 to 31 characters.

Usage guidelines

You can add routes to a route list. The routes can be issued to IP access clients for them to access internal servers behind the SSL VPN gateway.

You cannot delete a route list that is used by a policy group. To delete the route list, execute the undo ip-tunnel access-route command to remove the configuration and then execute the undo ip-route-list command.

Examples

# In SSL VPN context ctx1, create a route list named rtlist and enter its view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] ip-route-list rtlist

[Sysname-sslvpn-context-ctx1-route-list-rtlist]

Related commands

ip-tunnel access-route

ip-tunnel access-route

Use ip-tunnel access-route to specify the routes to be issued to clients.

Use undo ip-tunnel access-route to restore the default.

Syntax

ip-tunnel access-route { ip-address { mask-length | mask } | force-all | ip-route-list list-name }

undo ip-tunnel access-route

Default

No routes to be issued to clients are specified.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

ip-address { mask-length | mask }: Configures a route to be issued to a client. The ip-address argument specifies the destination address of the route. It cannot be a multicast, broadcast, or loopback address. The mask-length argument specifies the mask length of the route, in the range of 0 to 32.

force-all: Forces all traffic to be sent to the SSL VPN gateway.

ip-route-list list-name: Issues routes in the specified route list to clients. The list-name argument specifies the route list name, a case-insensitive string of 1 to 31 characters. The specified route list must have been created by using the ip-route-list command.

Usage guidelines

When a client accesses an SSL VPN gateway in IP access mode, the SSL VPN gateway issues the configured route or the specified routes to the client. The client adds the routes, using the VNIC as the output interface. Packets from the client to the internal servers match the routes, and therefore are sent to the SSL VPN gateway through the VNIC.

To issue multiple routes to a client, execute the ip-tunnel access-route ip-route-list list-name command. To issue a route to a client, execute the ip-tunnel access-route ip-address { mask-length | mask } command.

After you execute the ip-tunnel access-route force-all command, the SSL VPN gateway issues a default route to the SSL VPN client. The default route uses the VNIC as the output interface and has the highest priority among all default routes on the client. Packets for destinations not in the routing table are sent to the SSL VPN gateway through the VNIC. The SSL VPN gateway monitors the SSL VPN client in real time. It does not allow the client to delete the default route or add a default route with a higher priority.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In the view of policy group pg1, configure the SSL VPN gateway to issue routes in route list rtlist to a client.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] ip-route-list rtlist

[Sysname-sslvpn-context-ctx1-route-list-rtlist] include 10.0.0.0 8

[Sysname-sslvpn-context-ctx1-route-list-rtlist] include 20.0.0.0 8

[Sysname-sslvpn-context-ctx1-route-list-rtlist] quit

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group-pg1] ip-tunnel access-route ip-route-list rtlist

Related commands

ip-route-list

ip-tunnel address-pool (SSL VPN context view)

Use ip-tunnel address-pool to specify an address pool for IP access in an SSL VPN context.

Use undo ip-tunnel address-pool to restore the default.

Syntax

ip-tunnel address-pool pool-name mask { mask-length | mask }

undo ip-tunnel address-pool

Default

No address pool is specified for IP access in an SSL VPN context.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

pool-name: Specifies an address pool by its name, a case-insensitive string of 1 to 31 characters.

mask { mask-length | mask }: Specifies the mask length or mask of the address pool. The value range for the mask length is 1 to 30.

Usage guidelines

When a client accesses an SSL VPN gateway in IP access mode, the SSL VPN gateway allocates an IP address to the client from either of the following address pools:

·     Address pool specified for the policy group authorized to the client.

·     Address pool specified for the SSL VPN context. This address pool is used only if no address pool is specified for the policy group authorized to the client.

If no free address is available in the address pool or the address pool does not exist, address allocation to the client will fail and the client's IP access request will be rejected.

If you specify a nonexistent address pool, the pool is effective for address allocation after it is created.

You can specify only one address pool for an SSL VPN context. If you execute this command multiple times, the most recent configuration takes effect.

For IP access users to access the SSL VPN gateway correctly, make sure the IP addresses in the address pool do not conflict with the IP addresses used on the device.

Examples

# Specify address pool pool1 for IP access.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] ip-tunnel address-pool pool1 mask 24

Related commands

sslvpn ip address-pool

ip-tunnel address-pool (SSL VPN policy group view)

Use ip-tunnel address-pool to specify an address pool for IP access in an SSL VPN policy group.

Use undo ip-tunnel address-pool to restore the default.

Syntax

ip-tunnel address-pool pool-name mask { mask-length | mask }

undo ip-tunnel address-pool

Default

No address pool is specified for IP access in an SSL VPN policy group.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

pool-name: Specifies an address pool by its name, a case-insensitive string of 1 to 31 characters.

mask { mask-length | mask }: Specifies the mask length or mask of the address pool. The value range for the mask length is 1 to 30.

Usage guidelines

When a client accesses an SSL VPN gateway in IP access mode, the SSL VPN gateway allocates an IP address to the client from either of the following address pools:

·     Address pool specified for the policy group authorized to the client.

·     Address pool specified for the SSL VPN context. This address pool is used only if no address pool is specified for the policy group authorized to the client.

If no free address is available in the address pool or the address pool does not exist, address allocation to the client will fail and the client's IP access request will be rejected.

If you specify a nonexistent address pool, the pool is effective for address allocation after it is created.

You can specify only one address pool for an SSL VPN policy group. If you execute this command for an SSL VPN policy group multiple times, the most recent configuration takes effect.

For IP access users to access the SSL VPN gateway correctly, make sure the IP addresses in the address pool do not conflict with the IP addresses used on the device.

Examples

# Specify address pool pool1 for IP access in SSL VPN policy group pg1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group-pg1] ip-tunnel address-pool pool1 mask 24

Related commands

sslvpn ip address-pool

ip-tunnel bind address

Use ip-tunnel bind address to bind IP addresses to an SSL VPN user.

Use undo ip-tunnel bind address to restore the default.

Syntax

ip-tunnel bind address { ip-address-list | auto-allocate number }

undo ip-tunnel bind address

Default

An SSL VPN user is not bound to IP addresses.

Views

SSL VPN user view

Predefined user roles

network-admin

context-admin

Parameters

ip-address-list: Specifies an IP address list, a string of 1 to 255 characters, which can contain digits, dots (.), commas (,), and hyphens (-). The IP address list specifies comma-separated IP address items. Each item specifies an IP address or specifies a range of IP addresses in the form of start IP address-end IP address. For example, 10.1.1.5,10.1.1.10-10.1.1.20. The IP address list can contain a maximum of 10000 addresses excluding multicast addresses, broadcast addresses, and loopback addresses.

auto-allocate number: Enables the SSL VPN gateway to automatically bind the specified number of free IP addresses to the user. The value range for the number argument is 1 to 10.

Usage guidelines

When an SSL VPN user accesses the SSL VPN gateway in IP access mode, the SSL VPN gateway must assign an IP address to the user. This command allows you to specify the IP addresses that can be assigned to a user.

You can bind IP addresses to an SSL VPN user as follows:

·     Use the ip-address-list argument to bind a list of IP addresses to the user.

When the user accesses the SSL VPN gateway in IP access mode, the SSL VPN gateway assigns a bound IP address to the user.

If an IP address has been assigned to another user, the SSL VPN gateway terminates the connection for that user and releases the IP address.

·     Use the auto-allocate number option to enable the SSL VPN gateway to automatically bind the specified number of free addresses in the IP access address pool to the user.

The IP addresses to be bound to an SSL VPN user must meet the following requirements:

·     If an IP access address pool is specified for the SSL VPN policy group authorized to the user, the IP addresses must exist in the address pool.

·     If no address pool is specified for the SSL VPN policy group, the IP addresses must exist in the address pool specified for the SSL VPN context of the user.

You can bind the same IP address to different SSL VPN users only when the SSL VPN contexts of the users are associated with different VPN instances.

If you configure this command multiple times, the most recent configuration takes effect.

Examples

# Bind IP addresses 10.1.1.5, 10.1.1.10 through 10.1.1.20, and 10.1.1.30 to SSL VPN user user1.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] user user1

[Sysname-sslvpn-context-ctx-user-user1] ip-tunnel bind address 10.1.1.5,10.1.1.10-10.1.1.20,10.1.1.30

Related commands

user

ip-tunnel dns-server

Use ip-tunnel dns-server to specify a DNS server for IP access.

Use undo ip-tunnel dns-server to restore the default.

Syntax

ip-tunnel dns-server { primary | secondary } ip-address

undo ip-tunnel dns-server { primary | secondary }

Default

No DNS servers are specified for IP access.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

primary: Specifies the primary DNS server.

secondary: Specifies the secondary DNS server.

ip-address: Specifies the IP address of the DNS server. It cannot be a multicast, broadcast, or loopback address.

Examples

# Specify the primary DNS server 1.1.1.1 for IP access.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] ip-tunnel dns-server primary 1.1.1.1

ip-tunnel interface

Use ip-tunnel interface to specify an SSL VPN AC interface for IP access in an SSL VPN context.

Use undo ip-tunnel interface to restore the default.

Syntax

ip-tunnel interface sslvpn-ac interface-number

undo ip-tunnel interface

Default

No SSL VPN AC interface is specified for IP access in an SSL VPN context.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

sslvpn-ac interface-number: Specifies the number of an SSL VPN AC interface. The interface must have been created.

Usage guidelines

The SSL VPN gateway uses the specified SSL VPN AC interface to communicate with SSL VPN users in IP access mode. It uses the SSL VPN AC interface to forward packets sent by the user to remote servers and to forward the servers' replies back to the user.

Examples

# Specify SSL VPN AC 100 for IP access.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] ip-tunnel interface sslvpn-ac 100

Related commands

interface sslvpn-ac

ip-tunnel keepalive

Use ip-tunnel keepalive to set the keepalive interval for IP access.

Use undo ip-tunnel keepalive to restore the default.

Syntax

ip-tunnel keepalive seconds

undo ip-tunnel keepalive

Default

The keepalive interval is 30 seconds for IP access.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

seconds: Specifies the keepalive interval in the range of 0 to 600 seconds. If the interval is set to 0 seconds, a client does not send keepalive messages to the SSL VPN gateway.

Usage guidelines

A client sends keepalive messages to the SSL VPN gateway to maintain sessions between them.

If an SSL VPN gateway does not receive any data or keepalive messages from a client during the session idle timeout time, it terminates the session with the client.

Set the keepalive interval to be shorter than the session idle timeout timer configured by the timeout idle command.

Examples

# Set the keepalive interval to 50 seconds for SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] ip-tunnel keepalive 50

ip-tunnel log

Use ip-tunnel log to enable logging for IP address allocations and releases, IP access connection close events, or IP access packet drop events.

Use undo ip-tunnel log to disable logging for IP address allocations and releases, IP access connection close events, or IP access packet drop events.

Syntax

ip-tunnel log { address-alloc-release | connection-close | packet-drop }

undo ip-tunnel log { address-alloc-release | connection-close | packet-drop }

Default

Logging is disabled for IP access connection close events or IP access packet drop events.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

address-alloc-release: Enables logging for IP address allocations and releases for the VNIC of the IP access client.

connection-close: Enables logging for IP access connection close events.

packet-drop: Enables logging for IP access packet drop events.

Usage guidelines

If logging is enabled for IP address allocations and releases for the VNIC of the IP access client, the SSL VPN gateway generates logs when the VNIC's IP address is allocated or released.

If logging for IP access connection close events is enabled, the SSL VPN gateway generates logs when the connections established for SSL VPN IP access users are closed.

If logging for IP access packet drop events is enabled, the SSL VPN gateway generates logs when packets for SSL VPN IP access users are dropped.

The logs are sent to the information center of the device. For the logs to be output correctly, you must also configure the information center on the device. For more information about the information center, see Network Management and Monitoring Configuration Guide.

Examples

# Enable logging for IP access connection close events.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] ip-tunnel log connection-close

Related commands

sslvpn context

ip-tunnel rate-limit

Use ip-tunnel rate-limit to set a rate limit for IP access upstream or downstream traffic.

Use undo ip-tunnel rate-limit to remove the rate limit set for IP access upstream or downstream traffic.

Syntax

ip-tunnel rate-limit { downstream | upstream } { kbps | pps } value

undo ip-tunnel rate-limit { downstream | upstream }

Default

No rate limit is set for IP access upstream or downstream traffic.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

downstream: Specifies the IP access downstream traffic, which is sent by internal servers to IP access users.

upstream: Specifies the IP access upstream traffic, which is sent by IP access users to internal servers.

kbps: Sets the unit of measurement for the rate limit to kilobits per second.

pps: Sets the unit of measurement for the rate limit to packets per second.

value: Sets the rate limit value, in the range of 1000 to 100000000.

Usage guidelines

You can set a rate limit for IP access upstream and downstream traffic, respectively. If you set the rate limit for the same traffic direction multiple times, the most recent configuration takes effect.

If the IP access upstream or downstream traffic exceeds the rate limit, subsequent upstream or downstream traffic will be discarded.

Examples

# In SSL VPN context ctx1, set the rate limit to 10000 pps for IP access upstream traffic.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] ip-tunnel rate-limit upstream pps 10000

ip-tunnel web-resource auto-push

Use ip-tunnel web-resource auto-push to enable automatic pushing of accessible resources to IP access users through the Web page.

Use undo ip-tunnel web-resource auto-push to disable automatic pushing of accessible resources to IP access users through the Web page.

Syntax

ip-tunnel web-resource auto-push

undo ip-tunnel web-resource auto-push

Default

Automatic pushing of accessible resources to IP access users through the Web page is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Usage guidelines

This feature enables automatic pushing of accessible resources to a user through the Web page after the user logs in to the SSL VPN gateway through the IP access client (iNode client).

This feature is supported only when the iNode client is installed in the Windows system. You can install the iNode client in one of the following methods:

·     Log in to the SSL VPN gateway through the browser, and then download and install the iNode client that comes with the device.

·     Install the iNode client downloaded from the official website. In this way, you must select the iNode installation package for VPN gateway generation when customizing the iNode client. Otherwise, the user will be automatically logged out because the pushed webpage cannot detect whether the iNode client is logged in.

Examples

# Enable automatic pushing of accessible resources to IP access users through the Web page in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] ip-tunnel web-resource auto-push

ip-tunnel wins-server

Use ip-tunnel wins-server to specify a WINS server for IP access.

Use undo ip-tunnel wins-server to restore the default.

Syntax

ip-tunnel wins-server { primary | secondary } ip-address

undo ip-tunnel wins-server { primary | secondary }

Default

No WINS servers are specified for IP access.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

primary: Specifies the primary WINS server.

secondary: Specifies the secondary WINS server.

ip-address: Specifies the IPv4 address of the WINS server. It cannot be a multicast, broadcast, or loopback address.

Examples

# Specify the primary WINS server 1.1.1.1 for IP access.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] ip-tunnel wins-server primary 1.1.1.1

ipv6 address

Use ipv6 address to configure an IPv6 address and a port number for an SSL VPN gateway.

Use undo ipv6 address to restore the default.

Syntax

ipv6 address ipv6-address [ port port-number ]

undo ipv6 address

Default

No IPv6 address is configured for an SSL VPN gateway.

Views

SSL VPN gateway view

Predefined user roles

network-admin

context-admin

Parameters

ipv6-address: Specifies an IPv6 address for the SSL VPN gateway, a 16-byte hexadecimal string separated by colons.

port port-number: Specifies a port number for the SSL VPN gateway. The port number is 443 (the default value) or in the range of 1025 to 65535.

Usage guidelines

A remote user uses the IPv6 address and port number configured by this command to access an SSL VPN gateway.

The specified IPv6 address must be the address of an interface on the gateway device and is reachable from clients and internal servers.

Do not use the management address of the device as the IPv6 address of the SSL VPN gateway.

The IPv6 address and port number of an SSL VPN gateway cannot both be the same as those of the HTTPS server on the device. Otherwise, you can access only the SSL VPN Web interface but cannot access the device management Web interface by using those IPv6 address and port number.

If you execute this command multiple times, the most recent configuration takes effect.

An SSL VPN gateway can use an IPv4 address, an IPv6 address, but not both. If you configure both IPv4 and IPv6 addresses, the most recent configuration takes effect. (The IPv4 address is configured by using the ip address command.)

Examples

# Configure the IPv6 address of SSL VPN gateway gw1 as 200::1 and the port number as 8000.

<Sysname> system-view

[Sysname] sslvpn gateway gw1

[Sysname-sslvpn-gateway-gw1] ipv6 address 200::1 port 8000

Related commands

display sslvpn gateway

ip address

local-port

Use local-port to configure a port forwarding instance for a port forwarding item.

Use undo local-port to remove the configuration.

Syntax

local-port local-port-number local-name local-name remote-server remote-server remote-port remote-port-number [ description text ]

undo local-port

Default

A port forwarding item does not contain a port forwarding instance.

Views

Port forwarding item view

Predefined user roles

network-admin

context-admin

Parameters

local-port-number: Specifies a local port number in the range of 1 to 65535. The specified port number must be different from the port numbers of any existing services on the SSL VPN client.

local-name local-name: Specifies a local address or a local host name, a case-insensitive string of 1 to 253 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.). To specify an IPv4 address, use an address in the network segment 127.0.0.0/8. To specify an IPv6 address, enclose the IPv6 address in brackets. For example, local-name [1234::5678].

remote-server remote-server: Specifies the IP address or domain name of a TCP service on an internal server. The remote-server argument is a case-insensitive string of 1 to 253 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.). To specify an IPv6 address, enclose the IPv6 address in brackets. For example, remote-server [1234::5678].

remote-port remote-port-number: Specifies the port number of the TCP service on the internal server, in the range of 1 to 65535.

description text: Specifies a description, a case-sensitive string of 1 to 63 characters.

Usage guidelines

A port forwarding instance maps a TCP service on an internal server to a local address and port number on an SSL VPN client.

For example, for an SSL VPN client to use local address 127.0.0.1 and port 80 to access the internal HTTP server 192.168.0.213, perform the following tasks:

1.     Create a port forwarding item (tcp1 in this example).

2.     Configure a port forwarding instance for the port forwarding item.

local-port 80 local-name 127.0.0.1 remote-server 192.168.0.213 remote-port 80

The port forwarding instance will be displayed together with the port forwarding item name on the SSL VPN Web page. In this example, tcp1 (127.0.0.1:80 -> 192.168.0.213) will be displayed.

If you map a TCP service to a local host name, the TCP access client software will add the IP address corresponding to the host name to the host file hosts. When the client logs out, the software restores the original host file. The host file hosts is in the directory C:\Windows\System32\drivers\etc of the client host.

You can configure only one port forwarding instance for a port forwarding item. If you execute this command for a port forwarding item multiple times, the most recent configuration takes effect.

Examples

# Configure a port forwarding instance for port forwarding item pfitem1. The port forwarding instance maps IP address 192.168.0.213 and port 80 of the internal HTTP server to local address 127.0.0.1 and port 80.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] port-forward-item pfitem1

[Sysname-sslvpn-context-ctx1-port-forward-item-pfitem1] local-port 80 local-name 127.0.0.1 remote-server 192.168.0.213 remote-port 80 description http

Related commands

port-forward-item

log resource-access enable

Use log resource-access enable to enable resource access logging.

Use undo log resource-access enable to disable resource access logging.

Syntax

log resource-access enable [ brief | filtering ] *

undo log resource-access enable

Default

Resource access logging is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

brief: Records brief resource access information. If you specify this keyword, only the address and port number of the accessed resource will be recorded. If you do not specify this keyword, a large amount of information including webpage formatting information will be recorded.

filtering: Enables resource access log filtering. With this keyword specified, the device generates only one log for accesses of the same user to the same resource in a minute. If this keyword is not specified, the device generates a log for each resource access.

Usage guidelines

This feature logs resource accesses of SSL VPN users. The logs are sent to the information center of the device.

With the information center, you can set log message filtering and output rules, including output destinations.

The information center can output SSL VPN resource access logs to any destinations except the console and the monitor terminal. If you configure the console or monitor terminal as an output destination, the output destination setting will not take effect.

To view SSL VPN resource access logs stored on the device, use the display logbuffer command. Make sure you do not disable log output to the log buffer, which is enabled by default.

For more information about configuring the information center, see Network Management and Monitoring Configuration Guide.

If you execute the log resource-access enable command multiple times, the most recent configuration takes effect.

Examples

# Enable resource access logging.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] log resource-access enable

log user-login enable

Use log user-login enable to enable logging for user login and logoff events.

Use undo log user-login enable to disable logging for user login and logoff events.

Syntax

log user-login enable

undo log user-login enable

Default

Logging for user login and logoff events is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Usage guidelines

This feature logs user login and logoff events. The logs are sent to the information center of the device. For the logs to be output correctly, you must also configure the information center on the device. For more information about the information center, see Network Management and Monitoring Configuration Guide.

Examples

# Enable logging for user logins and logouts.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] log user-login enable

login-message

Use login-message to configure the welcome message to be displayed on the SSL VPN login page.

Use undo log login-message to restore the default.

Syntax

login-message { chinese chinese-message | english english-message }

undo login-message { chinese | english }

Default

The login welcome message is Welcome to SSL VPN.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

chinese chinese-message: Configures a login welcome message for the Chinese Web interface, a case-sensitive string of 1 to 255 characters.

english english-message: Configures a login welcome message for the English Web  interface, a case-sensitive string of 1 to 255 characters.

Examples

# Configure the login welcome message as hello.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] login-message english hello

logo

Use logo to specify a logo to be displayed on SSL VPN webpages.

Use undo logo to restore the default.

Syntax

logo { file file-name | none }

undo logo

Default

The logo displayed on SSL VPN webpages is H3C.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

file file-name: Specifies a logo file by its name, a case-insensitive string of 1 to 255 characters. The file must be a .gif, .jpg, or .png file, and its size cannot exceed 100 KB. As a best practice, use a file whose image resolution is 110*30 pixels.

none: Specifies that no logo is displayed.

Usage guidelines

The specified logo file must exist on the local device.

After you specify a logo file, the logo is displayed on SSL VPN webpages even if the file is deleted.

Examples

# Specify the logo in file flash:/mylogo.gif as the logo displayed on SSL VPN webpages.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] logo file flash:/mylogo.gif

max-onlines

Use max-onlines to set the maximum number of concurrent logins for each account.

Use undo max-onlines to restore the default.

Syntax

max-onlines number

undo max-onlines

Default

The maximum number of concurrent logins for each account is 32.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

number: Specifies the maximum number, in the range of 0 to 1048575. Value 0 indicates that the number of concurrent logins for each account is not limited.

Usage guidelines

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Set the maximum number of concurrent logins for each account to 50.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] max-onlines 50

max-users

Use max-users to set the maximum number of sessions for an SSL VPN context.

Use undo max-users to restore the default.

Syntax

max-users max-number

undo max-users

Default

An SSL VPN context supports a maximum of 1048575 sessions.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

max-number: Specifies the maximum number of sessions, in the range of 1 to 1048575

Usage guidelines

If the limit is reached, new users cannot access the SSL VPN gateway.

Examples

# Set the maximum number of sessions to 500 for SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] max-users 500

Related commands

display sslvpn context

message-server

Use message-server to specify a message server for mobile clients.

Use undo message-server to restore the default.

Syntax

message-server address { host-name | ipv4-address } port port-number

undo message-server

Default

No message server is specified for mobile clients.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

address: Specifies the host name or IPv4 address of the message server.

host-name: Specifies the host name of the message server, a case-insensitive string of 1 to 127 characters. Valid characters are letters, digits, underscores (_), hyphens (-), and dots (.).

ipv4-address: Specifies the IPv4 address of the message server, in dotted decimal notation. The IP address cannot be a multicast, broadcast, or loopback address.

port port-number: Specifies the port number of the message server, in the range of 1025 to 65535.

Usage guidelines

A message server provides services for mobile clients. The SSL VPN gateway issues the message server information to the clients, and the clients can access the message server.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the IP address of the message server as 10.10.1.1 and the port number as 8000 for context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] message-server address 10.10.1.1 port 8000

Related commands

sslvpn context

mobile-num

Use mobile-num to specify the mobile number for receiving SMS messages.

Use undo mobile-num to restore the default.

Syntax

mobile-num number

undo mobile-num

Default

No mobile number is specified for receiving SMS messages.

Views

SSL VPN user view

Predefined user roles

network-admin

context-admin

Parameters

number: Specifies the mobile number, a string of 1 to 31 digits.

Usage guidelines

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the mobile number as 111111 for user user1 to receive SMS messages.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] user user1

[Sysname-sslvpn-context-ctx1-user-user1] mobile-num 111111

mobile-num-binding enable

Use mobile-num-binding enable to enable mobile number binding.

Use undo mobile-num-binding enable to disable mobile number binding.

Syntax

mobile-num-binding enable

undo mobile-num-binding enable

Default

Mobile number binding is disabled.

Views

SMS gateway authentication view

Predefined user roles

network-admin

context-admin

Usage guidelines

After SMS gateway authentication is enabled, a user must complete authentication through SMS messages to log in to the SSL VPN gateway.

·     If the mobile number binding feature is enabled, the SSL VPN gateway displays Please enter mobile number for the user at the first login of the user. The user will use the entered mobile number to receive SMS messages for authentication. The SSL VPN gateway will bind the mobile number to the user and will not ask the user for the mobile number in subsequent logins.

·     If the mobile number binding feature is disabled, the SSL VPN gateway will use the mobile number specified in SSL VPN user view for authentication of the user. If no mobile number is specified in SSL VPN user view, the login will fail.

If a mobile number is specified in SSL VPN user view, the mobile number binding feature does not take effect for the user. The SMS gateway always sends SMS messages to the specified mobile number for authentication of the user.

Examples

# Enable mobile number binding in SMS gateway authentication view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] sms-auth sms-gw

[Sysname-sslvpn-context-ctx-sms-auth-sms-gw] mobile-num-binding enable

Related commands

mobile-num

mtu

Use mtu to set the MTU of an SSL VPN AC interface.

Use undo mtu to restore the default.

Syntax

mtu size

undo mtu

Default

The default MTU is 1500 bytes.

Views

SSL VPN AC interface view

Predefined user roles

network-admin

context-admin

Parameters

size: Specifies an MTU value in the range of 100 to 64000 bytes.

Examples

# Set the MTU of interface SSL VPN AC 1000 to 1430 bytes.

<Sysname> system-view

[Sysname] interface sslvpn-ac 1000

[Sysname-SSLVPN-AC1000] mtu 1430

new-content

Use new-content to specify the new content used to replace the old content.

Use undo new-content to restore the default.

Syntax

new-content string

undo new-content

Default

The new content used to replace the old content is not specified.

Views

Rewrite rule view

Predefined user roles

network-admin

context-admin

Parameters

string: Specifies the new content, a case-sensitive string of 1 to 256 characters.

Usage guidelines

During file content rewriting, the new content will replace the old content specified by using the old-content command.

If the new content contains spaces, enclose the content in double quotation marks.

Examples

# Specify the new content in rewrite rule rule1 of file policy fp.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] file-policy fp

[Sysname-sslvpn-context-ctx-file-policy-fp] rewrite-rule rule1

[Sysname-sslvpn-context-ctx-file-policy-fp-rewrite-rule-rule1] new-content sslvpn_rewrite_htmlcode(d)

Related commands

old-content

notify-message

Use notify-message to configure a notification message to be displayed on a webpage.

Use undo notify-message to restore the default.

Syntax

notify-message { login-page | resource-page } { chinese chinese-message | english english-message }

undo notify-message { login-page | resource-page } { chinese | english }

Default

No notification message is configured.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

login-page: Specifies the SSL VPN gateway login page.

resource-page: Specifies the SSL VPN gateway resource page.

chinese chinese-message: Specifies the notification message to be displayed on the Chinese Web interface, a case-sensitive string of 1 to 255 characters.

english english-message: Specifies the notification message to be displayed on the English Web interface, a case-sensitive string of 1 to 255 characters.

Usage guidelines

Execute this command to configure a notification message displayed on the SSL VPN login page or resource page. The message is generally used to notify users to change their passwords.

In an SSL VPN context, if you execute this command multiple times for the same page of the same language, the most recent configuration takes effect.

Examples

# In SSL VPN context ctx1, specify the notification message on the SSL VPN gateway login page as Please change the password after login.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] notify-message login-page english Please change the password after login

old-content

Use old-content to specify the old file content to be rewritten.

Use undo old-content to restore the default.

Syntax

old-content string

undo old-content

Default

The old file content to be rewritten is not specified.

Views

Rewrite rule view

Predefined user roles

network-admin

context-admin

Parameters

string: Specifies the old content, a case-sensitive string of 1 to 256 characters.

Usage guidelines

During file content rewriting, the old file content will be replaced by the new content specified by using the new-content command.

If the old content contains spaces, enclose the content in double quotation marks.

In the same file policy, the old content specified in different rewrite rules must be unique.

Examples

# Specify the content to be rewritten in rewrite rule rule1 of file policy fp.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] file-policy fp

[Sysname-sslvpn-context-ctx-file-policy-fp] rewrite rule rule1

[Sysname-sslvpn-context-ctx-file-policy-fp-rewrite-rule-rule1] old-content "a.b.c.innerHTML = d;"

Related commands

new-content

password-authentication enable

Use password-authentication enable to enable username/password authentication.

Use undo password-authentication enable to disable username/password authentication.

Syntax

password-authentication enable

undo password-authentication enable

Default

Username/password authentication is enabled for an SSL VPN context.

Views

SSL VPN context

Predefined user roles

network-admin

context-admin

Examples

# Disable username/password authentication for SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] undo password-authentication enable

Related commands

certificate-authentication enable

display sslvpn context

password-box hide

Use password-box hide to hide the password input box on the SSL VPN Web login page.

Use undo password-box hide to display the password input box on the SSL VPN Web login page.

Syntax

password-box hide

undo password-box hide

Default

The password input box is displayed on the SSL VPN Web login page.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Usage guidelines

If you want users to log in to the SSL VPN webpage by using authentication methods other than the username/password method, hide the password input box and configure the intended authentication methods.

After the password input box is hidden on the SSL VPN Web login page, only SSL VPN users with empty passwords can log in through the username/password authentication method.

Examples

# Hide the password input box on the SSL VPN Web login page.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] password-box hide

password-changing enable (SSL VPN context view)

Use password-changing enable to enable SSL VPN users to modify passwords.

Use undo password-changing enable to disable SSL VPN users from modifying passwords.

Syntax

password-changing enable

undo password-changing enable

Default

SSL VPN users are allowed to modify passwords.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Usage guidelines

The password modification feature allows you to determine whether SSL VPN users in the SSL VPN context can modify their login passwords.

If you enable this feature, SSL VPN users that log in to the SSL VPN Web interface can modify the login password on the personal settings page. If you disable this feature, the modify password function will be hidden on the SSL VPN Web interface, so users cannot modify their passwords.

An SSL VPN user is able to modify the password only when password modification is enabled in both SSL VPN user view and SSL VPN context view.

Examples

# Enable password modification for SSL VPN users in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] password-changing enable

Related commands

display sslvpn context

password-changing enable (SSL VPN user view)

password-changing enable (SSL VPN user view)

Use password-changing enable to enable an SSL VPN user to modify the password.

Use undo password-changing enable to disable an SSL VPN user from modifying the password.

Syntax

password-changing enable

undo password-changing enable

Default

An SSL VPN user is allowed to modify the password.

Views

SSL VPN user view

Predefined user roles

network-admin

context-admin

Usage guidelines

The password modification feature allows you to determine whether the specified SSL VPN user can modify the login password.

If you enable this feature, a user that logs in to the SSL VPN Web interface can modify the login password on the personal settings page. If you disable this feature, the modify password function will be hidden on the SSL VPN Web interface, so a user cannot modify the password.

Examples

# Enable password modification for SSL VPN user user1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] user user1

[Sysname-sslvpn-context-ctx1-user-user1] password-changing enable

Related commands

password-changing enable (SSL VPN context view)

password-complexity-message

Use password-complexity-message to configure a password complexity message.

Use undo password-complexity-message to restore the default.

Syntax

password-complexity-message { chinese chinese-message | english english-message }

undo password-complexity-message { chinese | english }

Default

No password complexity message is configured.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

chinese chinese-message: Specifies the password complexity message to be displayed on the Chinese Web interface, a case-sensitive string of 1 to 255 characters.

english english-message: Specifies the password complexity message to be displayed on the English Web interface, a case-sensitive string of 1 to 255 characters.

Usage guidelines

The password complexity message will be displayed on the SSL VPN password modification page to notify users of password complexity requirements.

In an SSL VPN context, if you execute this command multiple times for the same language, the most recent configuration takes effect.

Examples

# In SSL VPN context ctx1, specify the password complexity message as The password must contain uppercase and lowercase letters.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] password-complexity-message english The password must contain uppercase and lowercase letters

policy-group

Use policy-group to create an SSL VPN policy group and enter its view, or enter the view of an existing SSL VPN policy group.

Use undo policy-group to delete a policy group.

Syntax

policy-group group-name

undo policy-group group-name

Default

No SSL VPN policy groups exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

group-name: Specifies a name for the policy group, a case-insensitive string of 1 to 31 characters.

Usage guidelines

An SSL VPN policy group contains a set of rules for resource access authorization.

You can configure multiple SSL VPN policy groups for an SSL VPN context. When a remote user accesses the SSL VPN context, the AAA server issues the authorized policy group to the associated SSL VPN gateway. The user can access only the resources allowed by the authorized policy group. If the AAA server does not authorize the user to use a policy group, the user can access only the resources allowed by the default policy group.

Examples

# Create a policy group named pg1 and enter its view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group-pg1]

Related commands

default-policy-group

port-forward

Use port-forward to create a port forwarding list for an SSL VPN context and enter its view, or enter the view of an existing port forwarding list.

Use undo port-forward to delete a port forwarding list.

Syntax

port-forward port-forward-name

undo port-forward port-forward-name

Default

No port forwarding lists exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

port-forward-name: Specifies a name for the port forwarding list, a case-insensitive string of 1 to 31 characters. The name cannot start with item-.

Usage guidelines

Port forwarding lists provide TCP access services for SSL VPN users.

In port forwarding list view, you can use the port-forward-item command to create port forwarding items. Each port forwarding item defines an accessible TCP service provided on an internal server.

You can assign a port forwarding list to a policy group by using the resources port-forward command. After the AAA server authorizes a user to use a policy group, the SSL VPN Web page provides the user the port forwarding list assigned to the group. The user can access the TCP services provided by the port forwarding list.

Examples

# Create port forwarding list pflist1 and enter its view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] port-forward pflist1

[Sysname-sslvpn-context-ctx1-port-forward-pflist1]

Related commands

local-port

resources port-forward

port-forward-item

Use port-forward-item to create a port forwarding item and enter its view, or enter the view of an existing port forwarding item.

Use undo port-forward-item to delete a port forwarding item.

Syntax

port-forward-item item-name

undo port-forward-item item-name

Default

No port forwarding items exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

item-name: Specifies a name for the port forwarding item, a case-insensitive string of 1 to 31 characters.

Usage guidelines

A port forwarding item defines an accessible TCP service provided on an internal server. It contains the following settings:

·     A port forwarding instance.

A port forwarding instance is configured by using the local-port command. It makes an internal TCP service accessible through a local address and port number on the SSL VPN client.

·     (Optional.) A resource link.

A resource link is configured by using the execution command.

After you configure a resource link for a port forwarding item, the port forwarding item name will be displayed on the SSL VPN Web page as a link. You can click the link to access the resource directly.

Make sure the resource link matches the TCP service specified by the port forwarding instance.

After you create a port forwarding item, you can assign it to a port forwarding list by using the resources port-forward-item command.

Examples

# Create a port forwarding item named pfitem1 and enter its view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] port-forward-item pfitem1

[Sysname-sslvpn-context-ctx1-port-forward-item-pfitem1]

Related commands

execution

local-port

resources port-forward-item

prevent-cracking freeze-ip

Use prevent-cracking freeze-ip to configure IP address freezing parameters for cracking prevention.

Use undo prevent-cracking freeze-ip to restore the default.

Syntax

prevent-cracking freeze-ip login-failures login-failures freeze-time freeze-time

undo prevent-cracking freeze-ip

Default

The maximum number of consecutive login failures allowed for an IP address is 64, and the period of time to freeze an IP address is 30 seconds.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

login-failures login-failures: Specifies the maximum number of consecutive login failures allowed for an IP address before freezing it to prevent cracking.

freeze-time freeze-time: Specifies the period of time to freeze an IP address, in the range of 30 to 1800 seconds.

Usage guidelines

The cracking prevention feature reduces the risk of brute-force cracking of user login information by limiting the number of login attempts from the same IP address.

If the number of consecutive login failures of the same IP address reaches the maximum number specified by this command, the IP address will be frozen for the specified period. During the freeze period, the IP address is prohibited from logging in to the SSL VPN context. When the freeze period expires, the frozen IP address will be unfrozen automatically.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In SSL VPN context ctx1, configure the device to freeze an IP address if it consecutively fails login for 100 times and set the freeze period of time to 60 seconds.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] prevent-cracking freeze-ip login-failures 100 freeze-time 60

Related commands

display sslvpn prevent-cracking frozen-ip

prevent-cracking freeze-ip enable

Use prevent-cracking freeze-ip enable to enable IP address freezing for cracking prevention.

Use undo prevent-cracking freeze-ip enable to disable IP address freezing for cracking prevention.

Syntax

prevent-cracking freeze-ip enable

undo prevent-cracking freeze-ip enable

Default

IP address freezing for cracking prevention is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Examples

# In SSL VPN context ctx1, enable IP address freezing for cracking prevention.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] prevent-cracking freeze-ip enable

Related commands

display sslvpn prevent-cracking frozen-ip

pevent-cracking unfreeze-ip

Use prevent-cracking unfreeze-ip to unfreeze IP addresses frozen for cracking prevention.

Syntax

prevent-cracking unfreeze-ip { all | { ipv4 | ipv6 } ip-address }

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

all: Specifies all frozen IP addresses.

ipv4: Specifies a frozen IPv4 address.

Ipv6: Specifies a frozen IPv6 address.

ip-address: IP address to be unfrozen.

Usage guidelines

Unfrozen IP addresses are allowed to log in to the SSL VPN context again.

Examples

# In SSL VPN context ctx1, unfreeze all frozen IP addresses.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] prevent-cracking unfreeze-ip all

Related commands

display sslvpn prevent-cracking frozen-ip

pevent-cracking verify-code

Use prevent-cracking verify-code to configure code verification parameters for cracking prevention.

Use undo prevent-cracking verify-code to restore the default.

Syntax

prevent-cracking verify-code login-failures login-failures

undo prevent-cracking verify-code

Default

A maximum of five consecutive login failures are allowed for an IP address.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

login-failures login-failures: Specifies the maximum number of consecutive login failures allowed for an IP address, in the range of 1 to 63.

Usage guidelines

The cracking prevention feature reduces the risk of brute-force cracking of user login information by limiting the number of login attempts from the same IP address.

If the number of consecutive login failures of an IP address exceeds the maximum number specified by this command, code verification is performed to prevent cracking. An SSL VPN user using the IP address must enter a correct verification code to log in to the SSL VPN context.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In SSL VPN context ctx1, configure the device to perform code verification if an IP address consecutively fails login for more than 10 times.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] prevent-cracking verify-code login-failures-times 10

pevent-cracking verify-code enable

Use prevent-cracking verify-code enable to enable code verification for cracking prevention.

Use undo prevent-cracking verify-code enable to disable code verification for cracking prevention.

Syntax

prevent-cracking verify-code enable

undo prevent-cracking verify-code enable

Default

Code verification for cracking prevention is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Examples

# In SSL VPN context ctx1, enable code verification for cracking prevention.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] prevent-cracking verify-code enable

rate-limit

Use rate-limit to set a rate limit for SSL VPN session upstream or downstream traffic.

Use undo rate-limit to remove the rate limit set for SSL VPN session upstream or downstream traffic.

Syntax

rate-limit { downstream | upstream } value

undo rate-limit { downstream | upstream }

Default

No rate limit is set for SSL VPN session upstream or downstream traffic.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

downstream: Specifies the SSL VPN downstream traffic, which is sent by internal servers to SSL VPN users.

upstream:  Specifies the SSL VPN upstream traffic, which is sent by SSL VPN users to internal servers.

value: Sets the rate limit for the specified traffic, in the range of 1000 to 100000000 kbps.

Usage guidelines

You can set a rate limit for SSL VPN session upstream and downstream traffic, respectively. If you set the rate limit for the same traffic direction multiple times, the most recent configuration takes effect.

If the SSL VPN session upstream or downstream traffic exceeds the rate limit, subsequent upstream or downstream traffic will be discarded.

Examples

# In SSL VPN context ctx1, set the rate limit to 10000 kbps for SSL VPN session upstream traffic.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] rate-limit upstream 10000

redirect-resource

Use redirect-resource to specify the Web resource to which SSL VPN users are redirected after login.

Use undo redirect-resource to restore the default.

Syntax

redirect-resource { shortcut | url-item } resource-name

undo redirect-resource

Default

After logging in to the SSL VPN gateway, a user directly enters the SSL VPN resource list page, and no webpage redirection is performed.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

shortcut: Specifies a shortcut resource.

url-item: Specifies a URL item resource.

resource-name: Specifies the resource name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

By default, a user directly enters the SSL VPN resource list page after logging in to the SSL VPN gateway. You can use this command to redirect a user to a specific webpage after the user logs in to the SSL VPN gateway.

If a policy group authorized to a user contains a redirect resource, the SSL VPN gateway first opens the SSL VPN resource list page for the user. After a while, it redirects the user to the webpage specified in the redirect resource. The user can press the back button on the Web browser to return to the SSL VPN resource list page.

If multiple policy groups are authorized to a user, the device searches the policy groups for a redirect resource in authorization time order (first authorized first searched). If a redirect resource is found, the device stops searching and redirects the user to the redirect resource. If no redirect resource is found, no redirection will be performed.

In an SSL VPN policy group view, if you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify URL item url1 as the redirect resource of SSL VPN policy group pg1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group-pg1] redirect-resource url-item url1

Related commands

display sslvpn policy-group

reset counters interface sslvpn-ac

Use reset counters interface sslvpn-ac to clear SSL VPN AC interface statistics.

Syntax

reset counters interface [ sslvpn-ac [ interface-number ] ]

Views

User view

Predefined user roles

network-admin

context-admin

Parameters

sslvpn-ac [ interface-number ]: Specifies an SSL VPN AC interface by its number in the range of 0 to 4095. If you do not specify this option, the command clears statistics for all interfaces. If you specify the sslvpn-ac keyword without the interface-number argument, this command clears statistics for all existing SSL VPN AC interfaces.

Usage guidelines

Use this command to clear old statistics so you can observe new traffic statistics on an SSL VPN AC interface.

Examples

# Clear statistics for SSL VPN AC 1000.

<Sysname> reset counters interface sslvpn-ac 1000

Related commands

display interface sslvpn-ac

reset sslvpn ip-tunnel statistics

Use reset sslvpn ip-tunnel statistics to clear packet statistics for IP access users.

Syntax

reset sslvpn ip-tunnel statistics [ context context-name [ session session-id ] ]

Views

User view

Predefined user roles

network-admin

context-admin

Parameters

context context-name: Specifies an SSL VPN context by its name. An SSL VPN context name is a case-insensitive string of 1 to 31 characters, and can contain only letters, digits, and underscores (_). If you do not specify an SSL VPN context, this command clear packet statistics for IP access users in all SSL VPN contexts.

session session-id: Specifies a session by its ID in the range of 1 to 4294967295. If you do not specify a session, this command clears packet statistics for all IP access users in the specified SSL VPN context.

Usage guidelines

To view the SSL VPN sessions in different SSL VPN contexts, execute the display sslvpn session command.

If you do not specify any parameters, this command clear packets statistics for all IP access users in all SSL VPN contexts.

Examples

# Clear the IP access packet statistics in all SSL VPN contexts.

<Sysname> reset sslvpn ip-tunnel statistics

# Clear the IP access packet statistics in SSL VPN context ctx1.

<Sysname> reset sslvpn ip-tunnel statistics context ctx1

# Clear the IP access packet statistics of session 1 in SSL VPN context ctx.

<Sysname> reset sslvpn ip-tunnel statistics context ctx1 session 1

Related commands

display sslvpn ip-tunnel statistics

display sslvpn session

resources port-forward

Use resources port-forward to assign a port forwarding list to an SSL VPN policy group.

Use undo resources port-forward to remove the configuration.

Syntax

resources port-forward port-forward-name

undo resources port-forward

Default

An SSL VPN policy group does not contain a port forwarding list.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

port-forward-name: Specifies the name of an existing port forwarding list. A port forwarding list name is a case-insensitive string of 1 to 31 characters.

Usage guidelines

After the AAA server authorizes a user to use a policy group, the SSL VPN Web page provides the user the port forwarding list assigned to the group. The user can access the TCP services provided by the port forwarding list.

Examples

# Assign port forwarding list pflist1 to SSL VPN policy group pg1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group-pg1] resources port-forward pflist1

Related commands

local-port

port-forward

resources port-forward-item

Use resources port-forward-item to assign a port forwarding item to a port forwarding list.

Use undo resources port-forward-item to remove a port forwarding item from a port forwarding list.

Syntax

resources port-forward-item item-name

undo resources port-forward-item item-name

Default

A port forwarding list does not contain any port forwarding items.

Views

Port forwarding list view

Predefined user roles

network-admin

context-admin

Parameters

item-name: Specifies a port forwarding item by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

Before you assign a port forwarding item to a port forwarding list, make sure the port forwarding item has been created by using the port-forward-item command.

You can assign multiple port forwarding items to a port forwarding list.

Examples

# Create a port forwarding item named pfitem1, and then assign it to port forwarding list pflist1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] port-forward-item pfitem1

[Sysname-sslvpn-context-ctx1-port-forward-item-pfitem1] quit

[Sysname-sslvpn-context-ctx1] port-forward pflist1

[Sysname-sslvpn-context-ctx1-port-forward-pflist1] resources port-forward-item pfitem1

Related commands

port-forward-item

resources shortcut

Use resources shortcut to assign a shortcut to a shortcut list.

Use undo resources shortcut to remove a shortcut from a shortcut list.

Syntax

resources shortcut shortcut-name

undo resources shortcut shortcut-name

Default

A shortcut list does not contain any shortcuts.

Views

Shortcut list view

Predefined user roles

network-admin

context-admin

Parameters

shortcut-name: Specifies a shortcut by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

You can assign multiple shortcuts to a shortcut list.

Examples

# Assign shortcut list1 to shortcut list shortcut1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] shortcut shortcut1

[Sysname-sslvpn-context-ctx1-shortcut-shortcut1] quit

[Sysname-sslvpn-context-ctx1] shortcut-list list1

[Sysname-sslvpn-context-ctx1-shortcut-list-list1] resources shortcut shortcut1

resources shortcut-list

Use resources shortcut-list to assign a shortcut list to an SSL VPN policy group.

Use undo resources shortcut-list to restore the default.

Syntax

resources shortcut-list list-name

undo resources shortcut-list

Default

An SSL VPN policy group does not contain a shortcut list.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

list-name: Specifies a shortcut list by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

You can assign only one shortcut list to an SSL VPN policy group. After the AAA server authorizes a user to use a policy group, the SSL VPN Web page provides the user the shortcut list assigned to the group. The user can click a shortcut to access the associated resource.

If you execute this command for an SSL VPN policy group multiple times, the most recent configuration takes effect.

Examples

# Assign shortcut list list1 to SSL VPN policy group pg1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] shortcut-list list1

[Sysname-sslvpn-context-ctx1-shortcut-list-list1] quit

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group-pg1] resources shortcut-list list1

resources uri-acl

Use resources uri-acl to specify a URI ACL for URL resource filtering in a URL item.

Use undo resources uri-acl to remove the URI ACL configuration from a URL item.

Syntax

resources uri-acl uri-acl-name

undo resources uri-acl

Default

No URI ACL is specified for URL resource filtering in a URL item.

Views

URL item view

Predefined user roles

network-admin

context-admin

Parameters

uri-acl-name: Specifies a URI ACL by its name, a case-insensitive string of 1 to 31 characters. The specified URI ACL must already exist.

Usage guidelines

The specified URI ACL will be used to filter the accessible resources under the URL specified in the URL item.

Examples

# Specify URI ACL abc in URL item serverA.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item serverA

[Sysname-sslvpn-context-ctx1-url-item-serverA] resources uri-acl abc

Related commands

uri-acl

resources url-item

Use resources url-item to assign a URL item to a URL list.

Use undo resources url-item to remove a URL item from a URL list.

Syntax

resources url-item url-item-name

undo resources url-item url-item-name

Default

A URL list does not contain any URL items.

Views

URL list view

Predefined user roles

network-admin

context-admin

Parameters

url-item-name: Specifies a URL item by its name, a case-insensitive string of 1 to 31 characters. The specified URL item must already exist.

Usage guidelines

You can assign multiple URL items to a URL list.

Examples

# Assign URL item serverA to URL list list1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-list list1

[Sysname-sslvpn-context-ctx1-url-list-list1] resources url-item serverA

Related commands

url-item

resources url-list

Use resources url-list to assign a URL list to an SSL VPN policy group.

Use undo resources url-list to remove the configuration.

Syntax

resources url-list url-list-name

undo resources url-list url-list-name

Default

An SSL VPN policy group does not contain a URL list.

Views

SSL VPN policy group view

Predefined user roles

network-admin

context-admin

Parameters

url-list-name: Specifies an existing URL list by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

In Web access mode, a remote user can use a Web browser to access URL resources in the URL list assigned to the authorized SSL VPN policy group.

Examples

# Assign URL list url1 to SSL VPN policy group pg1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] policy-group pg1

[Sysname-sslvpn-context-ctx1-policy-group-pg1] resources url-list url1

Related commands

policy-group

sslvpn context

url-list

resources-file

Use resources-file to specify a file for SSL VPN users to download on the SSL VPN resource page.

Use undo resources-file to restore the default.

Syntax

resources-file { chinese chinese-filename | english english-filename }

undo resources-file { chinese | english }

Default

No file is provided for SSL VPN users to download.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

chinese chinese-filename: Specifies the name of the file to be provided on the Chinese Web interface, a case-sensitive string of 1 to 31 characters.

english english-filename: Specifies the name of the file to be provided on the English Web interface, a case-sensitive string of 1 to 31 characters.

Usage guidelines

Before executing this command, you must upload the file for users to download to the file system on the device in advance. The specified file name must be the absolute path of the file.

In an SSL VPN context, if you execute this command multiple times for the same language, the most recent configuration takes effect.

Examples

# In SSL VPN context ctx1, specify the file for users to download on the SSL VPN resource page as flash:/sslvpnhelp.pdf.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] resources-file english flash:/sslvpnhelp.pdf

rewrite server-response-message

Use rewrite server-response-message to rewrite a server reply message.

Use undo rewrite server-response-message to restore the default.

Syntax

rewrite server-response-message server-response-message { chinese chinese-message | english english-message }

undo rewrite server-response-message server-response-message { chinese | english }

Default

No server reply message is rewritten.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

server-response-message: Specifies the original server reply message to be rewritten, a case-sensitive string of 1 to 127 characters. If this message contains spaces, enclose the message in double quotation marks.

chinese chinese-message: Specifies the new server reply message to be displayed on the Chinese Web interface, a case-sensitive string of 1 to 127 characters.

english english-message: Specifies the new server reply message to be displayed on the English Web interface, a case-sensitive string of 1 to 127 characters.

Usage guidelines

If a server reply message (for example, an authentication, authorization, or accounting reply message) is hard to understand, execute this command to rewrite the server reply message. You can obtain server reply messages from the server to determine which messages should be rewritten.

If you execute this command multiple times to rewrite the same original server reply message in the same language, the most recent configuration takes effect.

Examples

# In SSL VPN context ctx1, rewrite the server reply message Success to User identity authentication succeeded.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] rewrite server-response-message Success english User identity authentication succeeded

rewrite-rule

Use rewrite-rule to create a rewrite rule and enter its view, or enter the view of an existing rewrite rule.

Use undo rewrite-rule to delete a rewrite rule.

Syntax

rewrite-rule rule-name

undo rewrite-rule rule-name

Default

No rewrite rules exist.

Views

File policy view

Predefined user roles

network-admin

context-admin

Parameters

rule-name: Specifies a rule name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

You can configure multiple rewrite rules in a file policy.

Examples

# Create a rewrite rule named rule1 and enter its view.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] file-policy fp

[Sysname-sslvpn-context-ctx-file-policy-fp] rewrite-rule rule1

[Sysname-sslvpn-context-ctx-file-policy-fp-rewrite-rule-rule1]

rule

Use rule to create a rule for a URI ACL.

Use undo rule to remove a rule from a URI ACL.

Syntax

rule [ rule-id ] { deny | permit } uri uri-pattern-string

undo rule rule-id

Default

No URL ACL rules exist in a URI ACL

Views

URI ACL view

Predefined user roles

network-admin

context-admin

Parameters

deny: Denies matching packets to pass.

permit: Allows matching packets to pass.

rule-id: Specifies a rule ID in the range of 0 to 65534. If you do not specify a rule ID when creating an ACL rule, the system automatically assigns it a rule ID. The numbering step is 5 for automatic numbering of rule IDs. An automatically assigned rule ID takes the nearest multiple of 5 higher than the current highest rule ID. For example, if the current highest rule ID is 28, the rule is numbered 30.

uri uri-pattern-string: Specifies a URI pattern. The URI pattern can contain a maximum of 256 characters in the format of protocol://host:port/path, where protocol and host are required. See Table 14 for descriptions of the fields in a URI pattern.

Table 14 URI field descriptions

Field

Description

protocol

Protocol name. Options are:

·     http.

·     https.

·     tcp.

·     udp.

·     icmp.

·     ip.

host

Domain name or address of a host.

·     Valid host address formats:

¡     IPv4 or IPv6 address. For example, 192.168.1.1.

¡     IPv4 or IPv6 address range in the format of start address-end address. For example, 3.3.3.1-3.3.3.200.

¡     IPv4 address with a mask length or IPv6 address with a prefix length. For example 2.2.2.2/24.

¡     A combination of the preceding host address formats separated by comma (,). For example, 192.168.1.1,3.3.3.1-3.3.3.200,2.2.2.2/24.

·     Valid domain name formats:

¡     Fully qualified domain name. For example, www.domain.com

¡     Domain name with the following wildcard characters:
Asterisk (*)—Matches zero or more characters. For example, *.com.
Question mark (?)—Matches one character. For example, www.do?main.com.
Percent sign (%)—Matches one or more characters in a field of the domain name. For example, www.%.com.

port

Port number. If no port number is specified, the default port number of the protocol is used.

Valid formats for this field:

·     Single port number. For example, 1002.

·     Port number range in the format of start port-end port. For example, 8080-8088.

·     A combination of the preceding formats separate by comma (,). For example, 1002,90,8080-8088.

path

String that identifies a directory or file on the host. The path is a sequence of fields separated by forward or backward slashes.

The following wildcard characters are supported:

·     Asterisk (*)—Matches zero or more characters. For example, /path1/*.

·     Question mark (?)—Matches one character. For example, /path?/.

·     Percent sign (%)—Matches one or more characters in a field of the path. For example, /path1/%/.

 

Usage guidelines

You can add multiple rules to a URI ACL. The device matches a packet against the rules in ascending order of rule ID. The match process stops once a matching rule is found.

Examples

# Add a rule to URI ACL uriacla.

<Sysname> system-view

[Sysname] sslvpn context abc

[Sysname-sslvpn-context-abc] uri-acl uriacla

[Sysname-sslvpn-context-abc-uri-acl-uriacla] rule 1 permit uri http://*.abc.com:80,443,2000-5000/path/

self-service imc address

Use self-service imc address to specify an IMC server for password modification.

Use undo self-service imc address to restore the default.

Syntax

self-service imc address ip-address port port-number [ vpn-instance vpn-instance-name ]

undo self-service imc address

Default

No IMC server is specified for password modification.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

ip-address: Specifies the IP address of the IMC server, in dotted decimal notation.

port port-number: Specifies the port number of the IMC server, in the range of 1 to 65535.

vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the IMC server belongs. The vpn-instance-name argument represents the VPN instance name, a case-sensitive string of 1 to 31 characters. Do not specify this option if the IMC server is on the public network.

Usage guidelines

Password modification allows users to modify login passwords by themselves, and it is supported for local users and users authenticated by an IMC server.

Execute this command only when IMC authentication users need to modify the SSL VPN login passwords. After a user passes the identity authentication, the user can modify the password on the SSL VPN Web page. The new password is sent to the IMC server specified by this command for verification. If the verification succeeds, the user will use the new password for next logins.

Examples

# Specify the IMC server at IP address 192.168.10.1 and port 443 in VPN instance vpn1 for password modification of users in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] self-service imc address 192.168.10.1 port 443 vpn-instance vpn1

server-address

Use server-address to specify an IMC server for SMS authentication.

Use undo server-address to restore the default.

Syntax

server-address ip-address port port-number [ vpn-instance vpn-instance-name ]

undo server-address

Default

No IMC server is specified for SMS authentication.

Views

IMC SMS authentication view

Predefined user roles

network-admin

context-admin

Parameters

ip-address: Specifies the IP address of the IMC server, in dotted decimal notation.

port port-number: Specifies the port number of the IMC server, in the range of 1 to 65535.

vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the IMC server belongs. The vpn-instance-name argument represents the VPN instance name, a case-sensitive string of 1 to 31 characters. Do not specify this option if the IMC server is on the public network.

Examples

# In IMC SMS authentication view, specify an IMC server (with IP address 192.168.151.1 and port 2000) in VPN instance vpn1 for SMS authentication of users.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] sms-auth imc

[Sysname-sslvpn-context-ctx1-sms-auth-imc] server-address 192.168.151.1 port 2000 vpn-instance vpn1

service enable (SSL VPN context view)

Use service enable to enable an SSL VPN context.

Use undo service enable to disable an SSL VPN context.

Syntax

service enable

undo service enable

Default

An SSL VPN context is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Examples

# Enable SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] service enable

Related commands

display sslvpn context

service enable (SSL VPN gateway view)

Use service enable to enable an SSL VPN gateway.

Use undo service enable to disable an SSL VPN gateway.

Syntax

service enable

undo service enable

Default

An SSL VPN gateway is disabled.

Views

SSL VPN gateway view

Predefined user roles

network-admin

context-admin

Examples

# Enable SSL VPN gateway gw1.

<Sysname> system-view

[Sysname] sslvpn gateway gw1

[Sysname-sslvpn-gateway-gw1] service enable

Related commands

display sslvpn gateway

session-connections

Use session-connections to set the maximum number of connections allowed per session.

Use undo session-connections to restore the default.

Syntax

session-connections number

undo session-connections

Default

A maximum of 64 connections are allowed per session.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

number: Set the maximum number of connections allowed per session. The value can be 0 or in the range of 10 to 1000. Value 0 indicates that the number of connections per session is not limited.

Usage guidelines

If the number of connections in a session has reached the maximum, new connection requests for the session will be rejected with a 503 Service Unavailable message.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Set the maximum number of connections allowed per session to 10.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] session-connections 10

shortcut

Use shortcut to create a shortcut and enter its view, or enter the view of an existing shortcut.

Use undo shortcut to delete a shortcut.

Syntax

shortcut shortcut-name

undo shortcut shortcut-name

Default

No shortcuts exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

shortcut-name: Specifies a shortcut name, a case-insensitive string of 1 to 31 characters. The shartcut name cannot start with list-.

Usage guidelines

After you create a shortcut, use the execution command to configure a resource link for it. Users can then click the shortcut name on the SSL VPN Web page to access the associated resource.

Examples

# Create a shortcut named shortcut1 and enter its view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] shortcut shortcut1

[Sysname-sslvpn-context-ctx1-shortcut-shortcut1]

shortcut-list

Use shortcut-list to create a shortcut list and enter its view, or enter the view of an existing shortcut list.

Use undo shortcut-list to delete a shortcut list.

Syntax

shortcut-list list-name

undo shortcut-list list-name

Default

No shortcut lists exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

list-name: Specifies a name for the shortcut list, a case-insensitive string of 1 to 31 characters.

Examples

# Create a shortcut list named list1 and enter its view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] shortcut-list list1

[Sysname-sslvpn-context-ctx1-shortcut-list-list1]

shutdown

Use shutdown to shut down an SSL VPN AC interface.

Use undo shutdown to bring up an SSL VPN AC interface.

Syntax

shutdown

undo shutdown

Default

An SSL VPN AC interface is up.

Views

SSL VPN AC interface view

Predefined user roles

network-admin

context-admin

Usage guidelines

CAUTION

CAUTION:

The shutdown command interrupts ongoing network services. Make sure you are fully aware of the impact of this command when you use it on a live network.

 

Examples

# Shut down SSL VPN AC 1000.

<Sysname> system-view

[Sysname] interface sslvpn-ac 1000

[Sysname-SSLVPN-AC1000] shutdown

sms-auth

Use sms-auth to create an SMS authentication view and enter its view, or enter the view of an existing SMS authentication view.

Use undo sms-auth to delete an SMS authentication view.

Syntax

sms-auth { imc | sms-gw }

undo sms-auth { imc | sms-gw }

Default

No SMS authentication views exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

imc: Specifies the IMC SMS authentication view.

sms-gw: Specifies the SMS gateway authentication view.

Examples

# Create and enter SMS gateway authentication view in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] sms-auth sms-gw

[Sysname-sslvpn-context-ctx1-sms-auth-sms-gw]

Related commands

sms-auth type

sms-auth type

Use sms-auth type to specify an SMS authentication type and enable SMS authentication.

Use undo sms-auth type to restore the default.

Syntax

sms-auth type { imc | sms-gw }

undo sms-auth type

Default

SMS authentication is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

imc: Specifies IMC SMS authentication.

sms-gw: Specifies SMS gateway authentication.

Usage guidelines

After you enable SMS authentication, the device uses SMS verification codes to authenticate SSL VPN users. A user is allowed to log in to the SSL VPN gateway only when the user passes the SMS authentication.

The device supports the following types of SMS authentication:

·     IMC SMS authentication.

SMS authentication for SSL VPN users is performed by an IMC server. You must configure the IP address and port number for the IMC server in IMC SMS authentication view.

·     SMS gateway authentication.

SMS gateway authentication for SSL VPN users is performed by an SMS gateway. You must specify the SMS gateway, the verification code resend interval, and the verification code validity period in SMS gateway authentication view.

Examples

# Specify the SMS authentication type as SMS gateway authentication in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] sms-auth type sms-gw

Related commands

display sslvpn context

sms-auth

sms-content

Use sms-content to configure the SMS content template.

Use undo sms-content to restore the default.

Syntax

sms-content string

undo sms-content

Default

The SMS content template is Hello, $$USER$$, the verification code is $$VERIFYCODE$$, and its validity period is $$VALIDTIME$$ minutes.

Views

SMS gateway authentication view

Predefined user roles

network-admin

context-admin

Parameters

string: Specifies the SMS content template, a case-sensitive string of 1 to 127 characters.

Usage guidelines

Use this command to configure the SMS content template that the SMS gateway uses to send SMS messages.

An SMS content template must contain the following variables:

·     $$USERNAME$$—User name variable.

·     $$VERIFYCODE$$—Verification code variable.

·     $$VALIDTIME$$—Verification code validity period variable.

Examples

# In SMS gateway authentication view, configure the SMS content template as Hello, $$USER$$, the verification code is $$VERIFYCODE$$, and its validity period is $$VALIDTIME$$ in minutes.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] sms-auth sms-gw

[Sysname-sslvpn-context-ctx1-sms-auth-sms-gw] sms-content Hello, $$USER$$, the verification code is $$VERIFYCODE$$, and its validity period is $$VALIDTIME$$ in minutes.

ssl client-policy

Use ssl client-policy to apply an SSL client policy to an SSL VPN context.

Use undo ssl client-policy to restore the default.

Syntax

ssl client-policy policy-name

undo ssl client-policy

Default

The default SSL client policy for SSL VPN is used. This policy supports the dhe_rsa_aes_128_cbc_sha, dhe_rsa_aes_256_cbc_sha, rsa_3des_ede_cbc_sha, rsa_aes_128_cbc_sha, and rsa_aes_256_cbc_sha cipher suites.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

policy-name: Specifies an SSL client policy by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

You can apply only one SSL client policy to an SSL VPN context. For the applied SSL client policy to take effect, you must enable the SSL VPN context by using the service enable command. The SSL VPN gateway will use the parameters defined by the policy to establish SSL connections to HTTPS servers.

If you execute this command multiple times, the new configuration overwrites the previous configuration, but does not take effect. For the new configuration to take effect, disable the SSL VPN context and then re-enable it.

For information about configuring SSL client policies, see Security Configuration Guide.

Examples

# Apply SSL client policy abc to SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] ssl client-policy abc

ssl server-policy

Use ssl server-policy to apply an SSL server policy to an SSL VPN gateway.

Use undo ssl server-policy to remove the application.

Syntax

ssl server-policy policy-name

undo ssl server-policy

Default

An SSL VPN gateway uses the SSL server policy of its self-signed certificate.

Views

SSL VPN gateway view

Predefined user roles

network-admin

context-admin

Parameters

policy-name: Specifies the name of an SSL server policy, a case-insensitive string of 1 to 31 characters.

Usage guidelines

You can apply only one SSL server policy to an SSL VPN gateway. For the applied SSL server policy to take effect, you must enable the SSL VPN gateway by using the service enable command. The SSL VPN gateway will use the parameters defined by the policy to establish SSL connections to remote users.

If you execute this command multiple times, the new configuration overwrites the previous configuration but does not take effect. For the new configuration to take effect, disable the SSL VPN gateway and then enable the SSL VPN gateway. To disable and enable an SSL VPN gateway, use the undo service enable and service enable commands.

After you modify the content of the SSL server policy applied to an SSL VPN gateway, you must disable and then re-enable the gateway to validate the policy. To disable and enable an SSL VPN gateway, use the undo service enable and service enable commands.

Examples

# Apply SSL server policy CA_CERT to SSL VPN gateway gw1.

<Sysname> system-view

[Sysname] sslvpn gateway gw1

[Sysname-sslvpn-gateway-gw1] ssl server-policy CA_CERT

Related commands

display sslvpn gateway

sslvpn context

Use sslvpn context to create an SSL VPN context and enter its view, or enter the view of an existing SSL VPN context.

Use undo sslvpn context to delete an SSL VPN context.

Syntax

sslvpn context context-name

undo sslvpn context context-name

Default

No SSL VPN contexts exist.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

context-name: Specifies an SSL VPN context name, a case-insensitive string of 1 to 31 characters. Valid characters are letters, digits, and underscores (_).

Usage guidelines

SSL VPN contexts contain different user sessions, accessible resources, and user authentication methods.

An SSL VPN gateway can be associated with multiple SSL VPN contexts. After a remote user logs in to an SSL VPN gateway, the user can access only the resources in the SSL VPN context to which the user belongs.

Examples

# Create an SSL VPN context named ctx1 and enter its view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1]

Related commands

display sslvpn context

sslvpn gateway

Use sslvpn gateway to create an SSL VPN gateway and enter its view, or enter the view of an existing SSL VPN gateway.

Use undo sslvpn gateway to delete an SSL VPN gateway.

Syntax

sslvpn gateway gateway-name

undo sslvpn gateway gateway-name

Default

No SSL VPN gateways exist.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

gateway-name: Specifies an SSL VPN gateway name, a case-insensitive string of 1 to 31 characters. Valid characters are letters, digits, and underscores (_).

Usage guidelines

An SSL VPN gateway resides between remote users and the enterprise network to ensure secure access of remote users to the enterprise internal network. The SSL VPN gateway establishes an SSL connection to a remote user, and then authenticates the user before allowing the user to access an internal server.

You must perform the following tasks in the view of an SSL VPN gateway:

·     Execute the ip address command to configure an IP address and a port number for the SSL VPN gateway.

·     Execute the ssl server-policy command to apply an SSL server policy to the SSL VPN gateway.

·     Execute the service enable command to enable the SSL VPN gateway.

You cannot delete an SSL VPN gateway that has been associated with an SSL VPN context. To delete the SSL VPN gateway, execute the undo gateway command to remove the association and then execute the undo sslvpn gateway command.

Examples

# Create an SSL VPN context named gw1 and enter its view.

<Sysname> system-view

[Sysname] sslvpn gateway gw1

[Sysname-sslvpn-gateway-gw1]

Related commands

display sslvpn gateway

sslvpn ip address-pool

Use sslvpn ip address-pool to create an address pool.

Use undo sslvpn ip address-pool to delete an address pool.

Syntax

sslvpn ip address-pool pool-name start-ip-address end-ip-address

undo sslvpn ip address-pool pool-name

Default

No address pools exist.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

pool-name: Specifies a name for the address pool, a case-insensitive string of 1 to 31 characters.

start-ip-address end-ip-address: Specifies the start IP address and end IP address for the pool. The end IP address must be greater than the start IP address. The start IP address and end IP address cannot be a multicast, broadcast, or loopback address.

Usage guidelines

The created address pools are used for address allocation to SSL VPN IP access clients. You can specify an address pool for an SSL VPN context or an SSL VPN policy group. An SSL VPN gateway uses the specified address pools to assign IP addresses to IP access clients.

Examples

# Create an address pool named pool1 and specify the address range as 10.1.1.1 to 10.1.1.254.

<Sysname> system-view

[Sysname] sslvpn ip address-pool pool1 10.1.1.1 10.1.1.254

Related commands

ip-tunnel address-pool (SSL VPN context view)

ip-tunnel address-pool (SSL VPN policy group view)

sslvpn log enable

Use sslvpn log enable to enable the SSL VPN global logging feature.

Use undo sslvpn log enable to disable the SSL VPN global logging feature.

Syntax

sslvpn log enable

undo sslvpn log enable

Default

The SSL VPN global logging feature is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

This feature logs the following global events:

·     SSL VPN access failures because of not associating SSL VPN contexts with gateways.

·     SSL VPN access failures because of not enabling SSL VPN contexts.

The logs are sent to the information center of the device. For the logs to be output correctly, you must also configure the information center on the device. For more information about the information center, see Network Management and Monitoring Configuration Guide.

Examples

# Enable the SSL VPN global logging feature.

<Sysname> system-view

[Sysname] sslvpn log enable

sslvpn webpage-customize

Use sslvpn webpage-customize to specify a webpage template for SSL VPN webpage customization.

Use undo sslvpn webpage-customize to restore the default.

Syntax

sslvpn webpage-customize template-name

undo sslvpn webpage-customize

Default

SSL VPN uses the system default webpages.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

template-name: Specifies a webpage template by its name, a string of 1 to 31 characters. The name cannot contain any of the following characters: forward slash (/), backslash (\), vertical bar (|), colon (:), asterisk (*), quotation mark ("), question mark (?), left angle bracket (<), and right angle bracket (>).

Usage guidelines

This command allows you to set the global SSL VPN webpage template. Both predefined and user-defined webpage templates are available.

You can upload and download webpage templates through the SSL VPN Web interface.

To view all webpage templates in the system, use the display sslvpn webpage-customize template command.

In an SSL VPN context, the webpage template specified for the SSL VPN context takes precedence over the global SSL VPN webpage template. To specify a webpage template for an SSL VPN context, use the webpage-customize command in SSL VPN context view.

Examples

# Use webpage template template1 to customize SSL VPN webpages.

<Sysname> system-view

[Sysname] sslvpn webpage-customize template1

Related commands

display sslvpn webpage-customize template

webpage-customize

sso auto-build code

Use sso auto-build code to specify a character encoding method for SSO login requests that are built automtically.

Use undo sso auto-build code to restore the default.

Syntax

sso auto-build code { gb18030 | utf-8 }

undo sso auto-build code

Default

UTF-8 encoding is used for automatically built SSO login requests.

Views

URL item view

Predefined user roles

network-admin

context-admin

Parameters

gb18030: Specifies GB18030 encoding.

utf-8: Specifies UTF-8 encoding.

Usage guidelines

Encoding a login request is to convert the login request into a binary string for transmission. The SSL VPN gateway supports GB18030 and UTF-8 encoding methods. Specify an encoding method according to the decoding method used by the internal server.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In URL item servera, set the encoding method to GB18030 for automatically built SSO login requests.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item servera

[Sysname-sslvpn-context-ctx1-url-item-servera] sso auto-build code gb18030

Related commands

sso auto-build custom-login-parameter

sso auto-build login-parameter-field

sso auto-build request-method

sso method

sso auto-build custom-login-parameter

Use sso auto-build custom-login-parameter to configure a custom login parameter for automatic building of SSO login requests.

Use undo sso auto-build custom-login-parameter to restore the default.

Syntax

sso auto-build custom-login-parameter name parameter-name value value [ encrypt ]

undo sso auto-build custom-login-parameter name parameter-name

Default

No custom parameter is configured for automatic building of SSO login requests.

Views

URL item view

Predefined user roles

network-admin

context-admin

Parameters

name parameter-name: Specifies the parameter name, a case-sensitive string of 1 to 63 characters.

value value: Specifies the attribute value, a case-sensitive string of 1 to 255 characters.

encrypt: Enables attribute value encryption through an encryption file. The encryption file is specified by the sso auto-build encrypt-file command.

Usage guidelines

Use this command to configure a custom login parameter (attribute name and value) if the auto-build SSO method is enabled.

The SSL VPN gateway will use the custom login parameter and other auto-build login parameters (configured by using the sso auto-build login-parameter command) to build login requests automatically.

Examples

# In URL item servera, configure a custom login parameter for auto-build SSO. Configure the parameter's name as commit and the value as login.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item servera

[Sysname-sslvpn-context-ctx1-url-item-servera] sso auto-build custom-login-parameter name commit value login

Related commands

sso auto-build code

sso auto-build encrypt-file

sso auto-build login-parameter

sso auto-build request-method

sso method

sso auto-build encrypt-file

Use sso auto-build encrypt-file to specify an encryption file to encrypt login parameters in automatically built SSO login requests.

Use undo timeout idle to restore the default.

Syntax

sso auto-build encrypt-file filename

undo sso auto-build encrypt-file

Default

No encryption file is specified for SSO login in the auto-build method.

Views

URL item view

Predefined user roles

network-admin

context-admin

Parameters

filename: Specifies an encryption file by its name, a case-insensitive string of 1 to 255 characters.

Usage guidelines

Use this command to specify an encryption file to encrypt the values of the parameters in automatically built SSO login requests. Encryption files are files that contain encryption functions written in JavaScript, and these files must be uploaded to the file management system of the device in advance.

If the encryption file to be used is the root directory of the device, you do not need to specify the file path when you execute this command. If the encryption file to be used is in a non-root directory of the device, you must specify the absolute path of the file when you execute this command.

You must write encryption functions in the following template:

function sslvpn_sso_encrypt(code)

{

//Encryption code

}

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In URL item servera, specify encryption file test.js to encrypt the values of the parameters in automatically built SSO login requests.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item servera

[Sysname-sslvpn-context-ctx1-url-item-servera] sso auto-build encrypt-file test.js

Related commands

sso auto-build custom-login-parameter

sso auto-build login-parameter-field

sso method

sso auto-build login-parameter

Use sso auto-build login-parameter to configure a login parameter for automatic building of SSO login requests.

Use undo sso auto-build login-parameter to restore the default.

Syntax

sso auto-build login-parameter { cert-fingerprint | cert-serial | cert-title | custom-password | custom-username | login-name | login-password | mobile-num | user-group } name parameter-name [ encrypt ]

undo sso auto-build login-parameter { cert-fingerprint | cert-serial | cert-title | custom-password | custom-username | login-name | login-password | mobile-num | user-group }

Default

No login parameters are configured for automatic building of SSO login requests.

Views

URL item view

Predefined user roles

network-admin

context-admin

Parameters

login-name: Uses the SSL VPN login username as the value of the SSO login parameter.

login-password: Uses the SSL VPN login password as the value of the SSO login parameter.

cert-title: Uses the certificate title as the value of the SSO login parameter.

cert-serial: Uses the certificate serial number as the value of the SSO login parameter.

cert-fingerprint: Uses the certificate fingerprint as the value of the SSO login parameter.

mobile-num: Uses the mobile phone number as the value of the SSO login parameter.

user-group: Uses the user group name as the value of the SSO login parameter.

custom-username: Uses the customized username as the value of the SSO login parameter.

custom-password: Uses the customized password as the value of the SSO login parameter.

name parameter-name: Specifies an attribute name for the SSO login parameter, a case-sensitive string of 1 to 63 characters.

encrypt: Enables attribute value encryption through an encryption file. The encryption file is specified by the sso auto-build encrypt-file command.

Usage guidelines

Use this command to configure a login parameter (attribute name and value) if the auto-build SSO method is enabled by using the sso method auto-build command. The attribute name is the parameter name used by the SSL VPN gateway to log in to the internal server. The parameter value used to log in to the internal server is the actual value abstracted according to the parameter value keyword specified in the command. For example, if you specify the login-name keyword for a parameter, the parameter value carried in the login request is the actual SSL VPN login username.

You can configure different values for the same attribute name, and configure different attribute names with the same value.

The SSL VPN gateway will use the login parameters configured by this command and custom login parameters (configured by the sso auto-build custom-login-parameter command) to build login requests automatically.

Upon receiving a login request, the internal server searches for the parameter values according to the parameter names to determine whether the login user is legitimate.

Examples

# In URL item servera, configure a login parameter for auto-build SSO. Configure the parameter's value keyword as cert-title and attribute name as login.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item servera

[Sysname-sslvpn-context-ctx1-url-item-servera] sso auto-build login-parameter cert-title name login encrypt

Related commands

sso auto-build code

sso auto-build custom-login-parameter

sso auto-build encrypt-file

sso auto-build request-method

sso method

sso auto-build request-method

Use sso auto-build request-method to specify the HTTP request method for automatically built SSO login requests.

Use undo sso auto-build request-method to restore the default.

Syntax

sso auto-build request-method { get | post }

undo sso auto-build request-method

Default

The GET request method is used for automatically built SSO login requests.

Views

URL item view

Predefined user roles

network-admin

context-admin

Parameters

get: Specifies the GET request method.

post: Specifies the POST request method.

Usage guidelines

This command specifies the HTTP request method used by the SSL VPN gateway to send HTTP requests to the internal server for SSO login. Specify the HTTP request method according to the internal server settings.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# In URL item servera, set the HTTP request method to POST for auto-build SSO login.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item servera

[Sysname-sslvpn-context-ctx1-url-item-servera] sso auto-build request-method post

Related commands

sso auto-build code

sso auto-build custom-login-parameter

sso auto-build login-parameter-field

sso method

sso basic custom-username-password enable

Use sso basic custom-username-password enable to enable using a custom username and password for SSO login through basic authentication.

Use undo sso basic custom-username-password enable to restore the default.

Syntax

sso basic custom-username-password enable

undo sso basic custom-username-password enable

Default

SSL VPN login username and password are used for SSO login through basic authentication.

Views

URL item view

Predefined user roles

network-admin

context-admin

Usage guidelines

Execute this command if you specify basic authentication for SSO login. The custom username and password are configured in the SSL VPN Web interface.

Examples

# In URL item servera, enable using the custom username and password for SSO login through basic authentication.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item servera

[Sysname-sslvpn-context-ctx1-url-item-servera] sso basic custom-username-password enable

Related commands

sso method

sso method

Use sso method to enable SSO and specify the SSO method.

Use undo sso method to restore the default.

Syntax

sso method { auto-build | basic }

undo sso method

Default

SSL VPN SSO login is disabled.

Views

URL item view

Predefined user roles

network-admin

context-admin

Parameters

auto-build: Automatically builds login requests to implement SSO.

basic: Performs basic authentication automatically to implement SSO.

Usage guidelines

SSO allows a user to use one set of login credentials (such as username and password) to access multiple trusted systems. With SSO, after users log in to the SSL VPN gateway in Web access mode, they can gain access to internal servers without entering the login credentials for the internal servers. The device supports the following methods for SSO login:

·     Auto-build method

Use a packet capture tool to obtain internal server login requests, and then configure SSO login settings based on the login requests to automatically build login requests to the internal servers. SSO login settings include the HTTP request method, login request encoding method, login parameters, and login data encryption file.

·     Basic authentication

Basic authentication is a simple HTTP authentication scheme, which requires a Web client to enter a username and password to access the server. The server authenticates the client based on the username and password.

To implement SSO in the basic authentication method, the SSL VPN gateway acts as a Web client and automatically enters a username and password to perform HTTP basic authentication. The entered username and password can be SSL VPN username and password or a custom username and password.

The basic authentication SSO method is applicable only for logging in to the internal servers that support basic authentication.

Examples

# In URL item servera, specify the SSO method as basic authentication.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item servera

[Sysname-sslvpn-context-ctx1-url-item-servera] sso method basic

Related commands

sso auto-build code

sso auto-build custom-login-parameter

sso auto-build login-parameter

sso auto-build request-method

sso basic custom-username-password enable

sso encrypt file

timeout idle

Use timeout idle to set the idle timeout timer for SSL VPN sessions.

Use undo timeout idle to restore the default.

Syntax

timeout idle minutes

undo timeout idle

Default

The idle timeout timer is 30 minutes for SSL VPN sessions.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

seconds: Specifies the idle timeout timer in the range of 1 to 1440 minutes.

Usage guidelines

If the idle time of an SSL VPN session exceeds the specified idle timeout time, the session is terminated.

Examples

# Set the idle timeout timer to 50 minutes for SSL VPN sessions.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] timeout idle 50

Related commands

display sslvpn policy-group

title

Use title to configure a title to be displayed on SSL VPN webpages.

Use undo title to restore the default.

Syntax

title { chinese chinese-title | english english-title }

undo title { chinese | english }

Default

The title is SSL VPN.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

chinese chinese-title: Configures a title in Chinese, a case-sensitive string of 1 to 255 characters.

english english-title: Configures a title in English, a case-sensitive string of 1 to 255 characters.

Examples

# Configure the title as SSL VPN service for company A.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] title english SSL VPN service for company A

uri-acl

Use uri-acl to create a URI ACL and enter its view, or enter the view of an existing URI ACL.

Use undo uri-acl to delete a URI ACL.

Syntax

uri-acl uri-acl-name

undo uri-acl uri-acl-name

Default

No URI ACLs exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

uri-acl-name: Specifies a name for the URI ACL, a case-insensitive string of 1 to 31 characters.

Usage guidelines

A URI ACL is a set of rules that permit or deny access to resources. You can use URI ACLs for IP, TCP, and Web access filtering of SSL VPN users.

You can create multiple URI ACLs in an SSL VPN context.

Examples

# Create a URI ACL named uriacla and enter its view.

<Sysname> system-view

[Sysname] sslvpn context abc

[Sysname-sslvpn-context-abc] uri-acl uriacla

[Sysname-sslvpn-context-abc-uri-acl-uriacla]

url (file policy view)

Use url to specify the URL of the Web page file to be rewritten in a file policy.

Use undo url to restore the default.

Syntax

url url

undo url

Default

No file URL is specified in a file policy.

Views

File policy view

Predefined user roles

network-admin

context-admin

Parameters

url: Specifies the complete file path, a case-insensitive string of 1 to 256 characters.

Usage guidelines

A file policy can be used to modify only the Web page file whose URL is the same as the URL configured in the policy.

A file URL is in the format of scheme://user:password@host:port/path. Table 15 describes the fields in the file URL.

Table 15 URL field descriptions

Field

Description

scheme

Protocol type. Options include http and https.

user:password

Username and password used to access the file.

host

Host name or IP address of the server where the file resides.

To specify an IPv6 address, enclose the IPv6 address in brackets. For example, http://[1234::5678]:8080/a.html.

port

Port number on which the server listens for resource access requests.

If you do not specify a port number, the default port number of the protocol is used, which is 80 for HTTP and 443 for HTTPS.

path

Local path of the file on the server.

 

You can specify only one file URL in a file policy. In the same SSL VPN context, the URL specified for each file policy must be unique.

Examples

# Specify a file URL for file policy fp.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] file-policy fp

[Sysname-sslvpn-context-ctx-file-policy-fp] url http://192.168.1.1:8080/js/test.js

url (URL item view)

Use url to specify a URL in a URL item.

Use undo url to remove the URL from a URL item.

Syntax

url url

undo url

Default

No URL is specified in a URL item.

Views

URL item view

Predefined user roles

network-admin

context-admin

Parameters

url: Specifies a URL, a case-insensitive string of 1 to 253 characters in the format of protocol://host:port/path.

Usage guidelines

Table 16 describes the fields in a URL.

Table 16 URL field descriptions

Field

Description

protocol

Protocol name. Options are:

·     http.

·     https.

If you do not specify a protocol name, the default protocol (HTTP) is used.

host

Domain name or IP address of a host.

To specify an IPv6 address, enclose the IPv6 address in brackets. For example. http://[1234::5678]:8080.

port

Port number.

If you do not specify a port number, the default port number of the protocol is used, which is 80 for HTTP and 443 for HTTPS.

path

Path to the resource on the host.

 

You can specify only one URL in a URL item. If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify www.abc.com as the URL in URL item serverA.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item serverA

[Sysname-sslvpn-context-ctx1-url-item-serverA] url www.abc.com

url-item

Use url-item to create a URL item and enter its view, or enter the view of an existing URL item.

Use undo url-item to delete a URL item.

Syntax

url-item url-item-name

undo url-item url-item-name

Default

No URL items exist in an SSL VPN context.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

url-item-name: Specifies a name for the URL item, a case-insensitive string of 1 to 31 characters.

Usage guidelines

You can create multiple URL items in an SSL VPN context. Each URL item contains an accessible resource URL and can be assigned to a URL list in the SSL VPN context.

A URL item that has been assigned to a URL list cannot be deleted.

Examples

# Create a URL item named serverA and enter URL item view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item serverA

[Sysname-sslvpn-context-ctx1-url-item-serverA]

url-list

Use url-list to create a URL list and enter its view, or enter the view of an existing URL list.

Use undo url-list to delete a URL list.

Syntax

url-list name

undo url-list name

Default

No URL lists exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

name: Specifies a name for the URL list, a case-insensitive string of 1 to 31 characters.

Examples

# Create a URL list named url1 and enter URL list view.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-list url1

[Sysname-sslvpn-context-ctx1-url-list-url1]

Related commands

sslvpn context

url-mapping

Use url-mapping to configure URL mapping in a URL item.

Use undo url-mapping to restore the default.

Syntax

url-mapping { domain-mapping domain-name | port-mapping gateway gateway-name [ virtual-host virtual-host-name ] } [ rewrite-enable ]

undo url-mapping

Default

The normal rewriting method is used.

Views

URL item view

Predefined user roles

network-admin

context-admin

Parameters

domain-mapping domain-name: Specifies the domain name mapping method. This method maps the URL to a domain name, a case-insensitive string of 1 to 127 characters which can contain letters, digits, underscores (_), hyphens (-), and dots (.). The specified domain cannot be the same as the domain name of the SSL VPN gateway.

port-mapping gateway gateway-name: Specifies the port mapping method. This method maps the URL to a gateway name and an optional virtual host name. The gateway-name argument specifies the gateway name, a case-insensitive string of 1 to 31 characters which can contain letters, digits, and underscores (_). The specified SSL VPN gateway name must be the name of an existing SSL VPN gateway.

virtual-host virtual-host-name: Specifies the virtual host name, a case-insensitive string of 1 to 127 characters which can contain letters, digits, underscores (_), hyphens (-), and dots (.). Do not specify a virtual host name if you want to use the SSL VPN gateway exclusively for the URL item.

rewrite-enable: Enables the SSL VPN gateway to rewrite the absolute URLs in the resource access response returned from the internal server. These absolute URLs are generally the URLs linked to other servers from the internal server. If you do not specify this keyword, these absolute URLs are not accessible. Enable this rewriting feature as a best practice to improve user experience.

Usage guidelines

The SSL VPN gateway rewrites the resource URLs in resource access responses that contain HTML, XML, CSS, or JavaScript files before sending the URLs to the requesting users. By default, the normal rewriting method is used for the URL rewriting. You can also configure the SSL VPN gateway to use the domain mapping or port mapping method.

Normal rewriting might cause problems such as missed URL rewriting and rewriting errors, resulting in SSL VPN clients not being able to access the internal resources. Use domain mapping or port mapping as a best practice. For more information about these mapping methods, see SSL VPN configuration in Security Configuration Guide.

When configuring the domain mapping method, make sure the SSL VPN client can resolve the mapped domain name (through DNS or the Hosts file) into the IP address of the SSL VPN gateway.

When configuring the port mapping method, you can specify an SSL VPN gateway exclusively for a URL item by specifying the gateway name without a virtual host name. To share an SSL VPN gateway with other URL items or SSL VPN contexts, specify the SSL VPN gateway name together with a virtual host name.

If you execute this command for a URL item multiple times, the most recent configuration takes effect.

Examples

# Create URL item serverA and specify www.server.com as the resource URL. Map the resource URL to domain name www.domain.com and enable URL rewriting.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item serverA

[Sysname-sslvpn-context-ctx1-url-item-serverA] url www.server.com

[Sysname-sslvpn-context-ctx1-url-item-serverA] url-mapping domain-mapping www.domain.com rewrite-enable

# Create URL item serverB and specify www.server.com as the resource URL. Map the resource URL to gateway gw1 with virtual host name host1 and enable URL rewriting.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] url-item serverB

[Sysname-sslvpn-context-ctx1-url-item-serverB] url www.server.com

[Sysname-sslvpn-context-ctx1-url-item-serverB] url-mapping port-mapping gateway gw1 virtual-host host1 rewrite-enable

Related commands

url-item

url

url-masking enable

Use url-masking enable to enable URL masking.

Use undo url-masking enable to disable URL masking.

Syntax

url-masking enable

undo url-masking enable

Default

URL masking is disabled.

Views

SSL VPN context view

URL item view

Predefined user roles

network-admin

context-admin

Usage guidelines

The URL masking feature hides the real Web access resource URLs configured in an SSL VPN context by converting the URLs into coded strings.

If URL masking is enabled in an SSL VPN context, all the Web resources in the context are enabled with URL masking. In this case, if you want to disable URL masking, you must use the undo url-masking enable command in the SSL VPN context view for all the Web resources.

You can enable or disable URL masking for a single URL in URL item view only when URL masking is disabled in SSL VPN context view.

Examples

# Enable URL masking for the Web resource URL in a URL item.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] url-item urlitem

[Sysname-sslvpn-context-ctx-url-item-urlitem] url-masking enable

# Enable URL masking for all Web resource URLs in an SSL VPN context.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] url-masking enable

user

Use user to create an SSL VPN user and enter SSL VPN user view, or enter the view of an existing SSL VPN user.

Use undo user to delete an SSL VPN user.

Syntax

user username

undo user username

Default

No SSL VPN users exist.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

username: Specifies the SSL VPN username, a case-sensitive string of 1 to 63 characters. The username cannot contain any of the following characters: forward slash (/), backslash (\), vertical bar (|), colon (:), asterisk (*), question mark (?), left angle bracket (<), and right angle bracket (>).

Usage guidelines

You can create multiple SSL VPN users in an SSL VPN context.

Examples

# Create SSL VPN user user1 and enter SSL VPN user view.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] user user1

[Sysname-sslvpn-context-ctx-user-user1]

verification-code send-interval

Use verification-code send-interval to set the SMS verification code resend interval.

Use undo verification-code send-interval to restore the default.

Syntax

verification-code send-interval seconds

undo verification-code send-interval

Default

The SMS verification code resend interval is 60 seconds.

Views

SMS gateway authentication view

Predefined user roles

network-admin

context-admin

Parameters

seconds: Specifies the verification code resend interval, in the range of 0 to 3600 seconds.

Usage guidelines

This interval is the minimum amount of time that a user must wait before the user can re-obtain the SMS verification code.

Examples

# In SMS gateway authentication view, set the verification code resend interval to 80 seconds.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] sms-auth sms-gw

[Sysname-sslvpn-context-ctx1-sms-auth-sms-gw] verification-code send-interval 80

verification-code validity

Use verification-code validity to set the SMS verification code validity period.

Use undo verification-code validity to restore the default.

Syntax

verification-code validity minutes

undo verification-code validity

Default

The SMS verification code validity period is one minute.

Views

SMS gateway authentication view

Predefined user roles

network-admin

context-admin

Parameters

seconds: Specifies the verification code validity period, in the range of 1 to 1440 minutes.

Examples

# In SMS gateway authentication view, set the verification code validity period to 30 minutes.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] sms-auth sms-gw

[Sysname-sslvpn-context-ctx1-sms-auth-sms-gw] verification-code validity 30

verify-code

Use verify-code enable to enable code verification.

Use undo verify-code enable to disable code verification.

Syntax

verify-code enable

undo verify-code enable

Default

Code verification is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Usage guidelines

After code verification is enabled, a user must enter a correct verification code to log in to the SSL VPN webpage.

Examples

# Enable code verification.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] verify-code enable

vpn-instance (SSL VPN context view)

Use vpn-instance to associate an SSL VPN context with a VPN instance.

Use undo vpn-instance to restore the default.

Syntax

vpn-instance vpn-instance-name

undo vpn-instance

Default

An SSL VPN context is associated with the public network.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

vpn-instance-name: Specifies the name of a VPN instance, a case-sensitive string of 1 to 31 characters.

Usage guidelines

After you associate an SSL VPN context with a VPN instance, the resources managed by the context belong to the VPN instance.

An SSL VPN context can be associated with only one VPN instance.

You can associate an SSL VPN context with a nonexistent VPN instance. The context does not take effect until the associated VPN instance is created.

If you change the VPN instance associated with an SSL VPN context, all user-to-IP address bindings configured for SSL VPN users in the SSL VPN context will be removed.

Examples

# Associate SSL VPN context context1 with VPN instance vpn1.

<Sysname> System-view

[Sysname] sslvpn context context1

[Sysname-sslvpn-context-context1] vpn-instance vpn1

vpn-instance (SSL VPN gateway view)

Use vpn-instance to specify a VPN instance for an SSL VPN gateway.

Use undo vpn-instance to restore the default.

Syntax

vpn-instance vpn-instance-name

undo vpn-instance

Default

An SSL VPN gateway belongs to the public network.

Views

SSL VPN gateway view

Predefined user roles

network-admin

context-admin

Parameters

vpn-instance-name: Specifies the name of a VPN instance, a case-sensitive string of 1 to 31 characters.

Usage guidelines

The VPN instance specified for an SSL VPN gateway is called a front VPN instance.

You can specify only one VPN instance for an SSL VPN gateway.

You can specify a nonexistent VPN instance for an SSL VPN gateway. The SSL VPN gateway does not take effect until the VPN instance is created.

Examples

# Specify VPN instance vpn1 for SSL VPN gateway gateway1.

<Sysname> system-view

[Sysname] sslvpn gateway gateway1

[Sysname-sslvpn-gateway-gateway1] vpn-instance vpn1

web-access ip-client auto-activate

Use web-access ip-client auto-activate to enable automatic startup of the IP access client after Web login.

Use undo web-access ip-client auto-activate to disable automatic startup of the IP access client after Web login.

Syntax

web-access ip-client auto-activate

undo web-access ip-client auto-activate

Default

Automatic startup of the IP access client after Web login is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Usage guidelines

With this feature enabled, after a user logs in to the SSL VPN gateway through a Web browser, the IP access client on the user host will automatically connect to the gateway. If the IP access client software is not installed, the user will be prompted to install the software first.

For the IP access client to connect to the SSL VPN gateway correctly, make sure the IP access service and resources are configured on the SSL VPN gateway.

If an SSL VPN user has already logged in through an IP access client when this feature is enabled, the user cannot access the SSL VPN gateway directly through the Web browser. To access the SSL VPN gateway through the Web browser, the user must click Open Resource List in the IP access client.

Examples

# Enable automatic startup of the IP access client after Web login in SSL VPN context ctx1.

<Sysname> system-view

[Sysname] sslvpn context ctx1

[Sysname-sslvpn-context-ctx1] web-access ip-client auto-activate

webpage-customize

Use webpage-customize to specify a webpage template for SSL VPN webpage customization.

Use undo webpage-customize to restore the default.

Syntax

webpage-customize template-name

undo webpage-customize

Default

The global SSL VPN webpage template is used.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

template-name: Specifies a webpage template by its name, a string of 1 to 31 characters. The name cannot contain any of the following characters: forward slash (/), backslash (\), vertical bar (|), colon (:), asterisk (*), quotation mark ("), question mark (?), left angle bracket (<), and right angle bracket (>).

Usage guidelines

This command allows you to set the webpage template for an SSL VPN context. Both predefined and user-defined webpage templates are available.

You can upload and download webpage templates through the SSL VPN Web interface.

To view all webpage templates in the system, use the display sslvpn webpage-customize template command.

In an SSL VPN context, the webpage template specified for the SSL VPN context takes precedence over the global SSL VPN webpage template. To set the global SSL VPN webpage template, use the sslvpn webpage-customize command in system view.

If a user-defined webpage template is specified in an SSL VPN context, all other webpage customization settings are invalid for the SSL VPN context.

Examples

# Use webpage template template1 to customize SSL VPN webpages in SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] webpage-customize template1

Related commands

display sslvpn webpage-customize template

sslvpn webpage-customize

wechat-work-authentication app-secret

Use wechat-work-authentication app-secret to specify the app secret key for WeChat Work (or WeCom) authentication.

Use undo wechat-work-authentication app-secret to restore the default.

Syntax

wechat-work-authentication app-secret app-secret

undo wechat-work-authentication app-secret

Default

No app secret key is specified for WeChat Work authentication.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

template-name: Specifies the app secret key, a case-insensitive string of 1 to 127 characters.

Usage guidelines

Each app has an independent secret key to ensure data security. Make sure the app secret key is not leaked.

The app secret key and the company ID are used together to generate important credentials for the SSL VPN gateway to obtain user information from the WeChat Work API server.

To view this secret key on the WeChat Work management platform, select the target app on the App Management page.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the app secret key as hpLRFnu7OxedV5bNd9OD0Xi in SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] wechat-work-authentication app-secret hpLRFnu7OxedV5bNd9OD0Xi

Related commands

wechat-work-authentication corp-id

wechat-work-authentication authorize-field

Use wechat-work-authentication authorize-field to specify the name of the authorization policy group field.

Use undo wechat-work-authentication authorize-field to restore the default.

Syntax

wechat-work-authentication authorize-field authorize-field

undo wechat-work-authentication authorize-field

Default

No authorization policy group field name is specified for WeChat Work authentication.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

authorize-field: Specifies the name of the authorization policy group field, a case-insensitive string of 1 to 31 characters. Chinese characters are supported.

Usage guidelines

The SSL VPN gateway uses the specified field name to obtain the authorization policy group name (the organization information of users) from the response of the WeChat Work API server.

Assume that the name of the authorization policy group field is group. If the response of the WeChat Work API server contains the field group:ziliao, the SSL VPN gateway obtains the user’s authorization policy group name, ziliao. Then, the gateway will check whether a local policy group named ziliao exists:

·     If yes, the user is authorized to access the corresponding internal resources in this policy group.

·     If no, the user is authorized to access internal resources in the default policy group.

For the SSL VPN gateway to successfully resolve the authorization policy group name from the response, make sure you specify the correct authorization policy group field name in this command. You can obtain the authorization policy group field name from WeChat Work before executing this command.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the name of the authorization policy group field as group in SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] wechat-work-authentication authorize-field group

wechat-work-authentication corp-id

Use wechat-work-authentication corp-id to specify the company ID for WeChat Work authentication.

Use undo wechat-work-authentication corp-id to restore the default.

Syntax

wechat-work-authentication corp-id corp-id

undo wechat-work-authentication corp-id

Default

No company ID is specified for WeChat Work authentication.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

corp-id: Specifies the company ID, a case-insensitive string of 1 to 63 characters.

Usage guidelines

A company ID uniquely identifies a company on WeChat Work. The company ID and the secret key are used together to generate important credentials for the SSL VPN gateway to obtain user information from the WeChat Work API server.

To view the company ID on the WeChat Work management platform, go to My Company > Company Information.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the company ID as wxdd725338566d6ffe in SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] wechat-work-authentication corp-id wxdd725338566d6ffe

Related commands

wechat-work-authentication app-secret

wechat-work-authentication enable

Use wechat-work-authentication enable to enable WeChat Work authentication.

Use undo wechat-work-authentication enable to disable WeChat Work authentication.

Syntax

wechat-work-authentication enable

undo wechat-work-authentication enable

Default

WeChat Work authentication is disabled.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Usage guidelines

After WeChat Work authentication is enabled, the device obtains user information of a company from WeChat Work and uses the user information for authentication and authorization. If the authentication and authorization succeed, the users can access the internal resources. This feature is transparent to the users in the company.

Examples

# Enable WeChat Work authentication in SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpnc ontext ctx

[Sysname-sslvpn-context-ctx] wechat-work-authentication enable

wechat-work-authentication open-platform-url

Use wechat-work-authentication open-platform-url to specify the WeChat open platform URL.

Use undo wechat-work-authentication open-platform-url to restore the default.

Syntax

wechat-work-authentication open-platform-url { pre-defined | user-defined user-defined-url }

undo wechat-work-authentication open-platform-url

Default

No WeChat open platform URL is specified.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

pre-defined: Specifies the predefined WeChat open platform URL, https://open.weixin.qq.com.

user-defined user-defined-url: Specifies the WeChat open platform URL as needed, a case-insensitive string of 1 to 63 characters.

Usage guidelines

In general, after receiving a response from the internal server, the SSL VPN gateway will check whether the HTTP header contains the Location field. If the Location field exists, the SSL VPN gateway will rewrite the URL in the Location field and forward the response to the SSL VPN client. The subsequent requests of the SSL VPN client must access the redirected URL.

In particular cases, the response from the internal server to the SSL VPN gateway might require the user to send an authentication request to WeChat Work again. In this case, the SSL VPN gateway must not rewrite the WeChat Work server URL in the Location field so that the client can access the WeChat Work server to complete authentication and authorization. If the SSL VPN gateway rewrites the WeChat Work server URL, the WeChat Work server cannot receive the request from the client and WeChat Work authentication fails.

This command specifies the URL in the Location field that will not be rewritten by the SSL VPN gateway. For WeChat Work authentication to operate correctly, set the URL as the WeChat open platform URL.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the predefined URL https://open.weixin.qq.com as the WeChat open platform URL in SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] wechat-work-authentication open-platform url pre-defined

wechat-work-authentication timeout

Use wechat-work-authentication timeout to specify the WeChat Work authentication timeout.

Use undo wechat-work-authentication timeout to restore the default.

Syntax

wechat-work-authentication timeout seconds

undo wechat-work-authentication timeout

Default

The WeChat Work authentication timeout is 15 seconds.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

seconds: Specifies the WeChat Work authentication timeout, in the range of 5 to 50 seconds.

Usage guidelines

A WeChat Work authentication fails if the SSL VPN gateway does not receive the response from the WeChat Work API server within the timeout time after sending an HTTP request.

If the network delay is large, increase the timeout as a best practice to avoid misidentification of timeouts. If the network delay is small, reduce the timeout as a best practice for better identification of timeouts.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the WeChat Work authentication timeout as 20 seconds in SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] wechat-work-authentication timeout 20

wechat-work-authentication url

Use wechat-work-authentication url to specify the URL of the WeChat Work API server.

Use undo wechat-work-authentication url to restore the default.

Syntax

wechat-work-authentication url url

undo wechat-work-authentication url

Default

No WeChat Work API server URL is specified.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

url: Specifies the URL of the WeChat Work API server, a case-insensitive string of 1 to 255 characters.

Usage guidelines

To use WeChat Work authentication, you must execute this command to specify the actual URL of the WeChat Work API server. The SSL VPN gateway interacts with the specified WeChat Work API server to obtain user information upon receiving a packet redirected from the WeChat Work server. Then, the SSL VPN gateway uses the obtained information for user authentication and authorization.

The SSL VPN gateway requires domain name resolution to resolve the specified URL into the IP address of the WeChat Work API server. For more information about domain name resolution, see DNS configuration in Layer 3—IP Services Configuration Guide.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the URL of the WeChat Work API server as https://qyapi.weixin.qq.com in SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] wechat-work-authentication url https://qyapi.weixin.qq.com

wechat-work-authentication userid-field

Use wechat-work-authentication userid-field to specify the user ID field name used by the SSL VPN gateway to access the internal server.

Use undo wechat-work-authentication userid-field to restore the default.

Syntax

wechat-work-authentication userid-field userid-field

undo wechat-work-authentication userid-field

Default

No user ID field name is configured for the SSL VPN gateway to access the internal server.

Views

SSL VPN context view

Predefined user roles

network-admin

context-admin

Parameters

url: Specifies the user ID field name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

A user ID (user account) on WeChat Work uniquely identifies a user within a company. The SSL VPN gateway interacts with the WeChat Work API server to obtain user information, which contains the user ID of a user.

The SSL VPN gateway uses the specified user ID field name and the obtained user ID to construct the parameter to be carried in an access request sent to an internal server. For example, if you configure the user ID field name as login and the obtained user ID is zhangsan, the SSL VPN gateway will construct the parameter as login=zhangsan. When receiving the request from the SSL VPN gateway, the internal server abstracts the login field's value zhangsan as the user ID. To make sure the SSL VPN gateway can accurately encapsulate the parameter, you must obtain the user ID field name from the internal server in advance.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify the user ID field name as login in SSL VPN context ctx.

<Sysname> system-view

[Sysname] sslvpn context ctx

[Sysname-sslvpn-context-ctx] wechat-work-authentication url https://qyapi.weixin.qq.com

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网