Configure the Access Portal

To configure the Access Portal, you must:

You can add custom icons for web applications, Remote Desktop Protocol (RDP) hosts, and Secure Shell (SSH) hosts. We recommend that image files for icons have a maximum size of 64 x 64 pixels.

The Access Portal is not supported on Firebox T Series. The Access Portal is supported on FireboxV, FireboxCloud, and all other Fireboxes.

Enable the Access Portal

To enable the Access Portal, from Fireware Web UI or Policy Manager:

  1. Select Subscription Services > Access Portal.
  2. Select Enable Access Portal.

Add an Application Group

Add a Web Application

You can add external web applications to the Access Portal. For internal web applications, configure reverse proxy actions. For more information about reverse proxy actions, go to Reverse Proxy for the Access Portal.

You cannot configure the exact same URL for a web application and a reverse proxy action.

Add an RDP Host

The Access Portal supports the Any, NLA, TLS, and RDP security types for connections to RDP hosts. We recommend the default setting Any which works for most connections. When Any is selected, the Firebox negotiates the security protocol with the remote host.

If you change the security type to a setting other than Any, make sure the RDP host has the same security type configured.

For more information about Windows RDP settings, go to Security Settings for Windows RDP Hosts.

For information about macOS and iOS certificates, go to Certificate Requirements for macOS and iOS Devices.

Security Settings for Windows RDP Hosts

The guidelines in this section describe which Access Portal RDP security types are compatible with Remote Desktop and Security Layer settings on the Windows RDP host.

These guidelines assume the Windows operating system on the RDP host uses default Security Layer settings. The default Security Layer settings in Windows vary by operating system, and can only be changed through registry edits in some Windows operating systems. We do not support changes to Windows settings that require registry edits.

For all Windows operating systems:

  • We recommend that you select Trust Certificate in the Access Portal RDP settings.
  • If you do not select Trust Certificate, you must import the CA chain for the RDP host into the Firebox. For general certificate import instructions, go to Manage Device Certificates (Web UI) or Manage Device Certificates (WSM). When you import the CA chain, you must select the General certificate function.
  • If the option Allow connections only from computers running Remote Desktop with Network Level Authentication is selected in the Remote Settings in Windows, that host only allows connections that use NLA. In the Access Portal RDP settings, you must select the NLA security type.

Certificate Requirements for macOS and iOS Devices

To connect to an RDP host from a macOS or iOS device with Safari, you must import a certificate on the macOS or iOS device. For information about certificate requirements and the import process, go to Install a Certificate on a macOS or iOS Device for RDP or SSH.

Add an SSH Host

You can add an SSH host to the Access Portal from Fireware Web UI or Policy Manager.

In Fireware v12.11 and higher, when you use Access Portal SSH resources with SSH servers based on OpenSSH 7.6 and higher with older SSH-1 algorithms, you must use DSA keys. RSA is not supported.

To connect to an SSH host from a macOS or iOS device with Safari, you must import a certificate on the macOS or iOS device. For information about certificate requirements and the import process, go to Install a Certificate on a macOS or iOS Device for RDP or SSH.

Install a Certificate on a macOS or iOS Device for RDP or SSH

To connect to an RDP or SSH host from a macOS or iOS device with the Safari web browser, you must configure one of these certificates on the Firebox:

  • Trusted third-party web server certificate signed by a trusted CA
  • Custom web server certificate that specifies the domain name or IP address of the Access Portal

If you install a trusted third-party web server certificate on your Firebox, you do not have to install the certificate on your macOS or iOS device.

If you install a custom web server certificate on the Firebox, you must install the certificate on the macOS or iOS device. The RDP or SSH connection does not work if you only accept the certificate in the Safari web browser.

To install the certificate on a macOS device, go to Keychain for Mac: Add certificates to a keychain on the Apple website.

Configure the User Connection Settings

On the User Connection Settings tab, you can specify:

  • Users and groups that can connect to applications or application groups.
  • Authentication servers
  • Access Portal port (configuration port)
  • Timeout values

In Fireware v12.4 or higher, users only need to type their user name to log in with the default authentication server. To log in with a different authentication server, users must type the domain name and the user name in this format: <domain name>\<user name>.

You cannot use the AuthPoint authentication server with the Access Portal. In Fireware v12.9.4 or higher, if the AuthPoint authentication server is the default authentication server for Mobile VPN with SSL, the Access Portal uses the next authentication server in the list as the default authentication server for Access Portal authentication.

Timeout settings specify when the Firebox disconnects users from the Access Portal. The Session Timeout setting indicates the maximum amount of time a user can remain connected to the Access Portal. The Idle Timeout setting indicates the maximum amount of time a user can be idle while connected to the Access Portal.

To configure the SAML single sign-on settings, go to Configure SAML Single Sign-On.

Related Topics

About the Access Portal

Shared Settings and Policy

Customize the Access Portal Design

Customize Access Portal Page Elements with CSS

Firebox Access Portal Integration with AuthPoint