Create tunneled web forwards to allow SSL VPN users to access web-based internal applications through an SSL tunnel created by CudaLaunch. The client then connects to a dynamically generated port on the loopback interface (e.g., 127.0.0.1:7324). CudaLaunch forwards the web traffic through the SSL tunnel to the SSL VPN service and the web server behind it. To use tunneled web forwards you must have a Remote Access Premium subscription.
Before you begin
Enable the SSL VPN service and CudaLaunch. For more information, see How to Enable SSL VPN and CudaLaunch.
Configure a tunneled web forward
- Go to the VPN > SSL VPN page and click the Resources tab.
- In the Web Forwards section, click Add Tunneled Web Forward.
In the Add Web Forward window, set Enable to Yes.
- (optional) Click Browse to upload a PNG file for the web portal, less than 30 kB and not larger than 80x80 pixels.
- In the Name field, enter the visible name for the web forward. This is the name used in the SSL VPN portal for this web forward.
- Enter the IP address or hostname of the Web Server Host.
- Enter port the Web Server Host listens on.
- In the Client Loopback TCP Port field, enter the client loopback TCP port number for the tunnel to enable tunneling of application data to the user's localhost IP address 127.0.0.1:7000. To use a random port, enter
0
(default). - Select the type of the tunnel from the Protocol drop-down list.
- (optional) To restrict access to the web forward by user group, remove the * entry in the Allowed User Groups list. Enter the user groups that can access the web forward, and click + after each entry. If no groups are added, the web forward cannot be accessed. Use question marks (?) and asterisks (*) as wildcard characters.
- Click Save.