Host Check Configuration Example

This section describes a SCVPN host check configuration example.

A hillstone device works as the SCVPN server for an enterprise. It is required to meet the following requirements:

The topology is shown as below:

Take the following steps:

Step 1: Create local users.

  1. Select Objects > Local User from the menu bar.
  2. Select local from the Local server drop-down list. Click New > User. In the User Configuration dialog, configure the options as below:
  1. Click OK to save the settings and return to the Local User dialog.
  2. Repeat Step 2-3 to create the user named pc2 with the password xcabuv112 and pc3 with the password xacfomg763.
  1. Click OK to save the settings.

Step 2: Configure the roles and role-mapping rules.

  1. Select Objects > Role from the menu bar.
  2. Click New > Role. In the Role Configuration dialog, configure the options as below:
  3. Click OK to save the settings and return to the Role Configuration dialog.
  4. Repeat Step 2-3 to create the role named dl.
  5. Click New > Role Mapping. In the Role Mapping Configuration dialog, configure the options as below:
  6. Click OK to save the settings and return to the Role dialog. Click Close.
  7. Select Objects > AAA Server from the menu bar.
  8. In the AAA Server dialog, select local from the AAA server list, and click Edit.
  9. In the Local Server Configuration dialog, select rule1 from the Role mapping rule drop-down list.
  10. Click OK to save the settings.

Step 3: Configure the egress interface of SCVPN server.

  1. On the Navigation pane, click Configure > Network > Network to visit the Network page.
  2. Select ethernet0/1 from the interface list, and click Edit. On the General tab in the Interface Configuration dialog, configure the options as below:
  3. Click OK to save the changes.

Step 4: Configure the host check profiles.

  1. On the Navigation pane, click Configure > Network > SSL VPN to visit the SSL VPN page.
  2. On the Task tab in the right auxiliary pane, click Host Check to visit the Host Check page.
  3. Click New. In the Host Checking Configuration dialog, configure the options as below:
    Basic

    Advanced

  4. Click OK to save the settings and return to the SSL VPN page.
  5. Repeat Step 3-4 to create the profile named sw-security-check. The profile contents are:
    Basic

    Advanced

  6. Click OK to save settings.

Step 5: Configure the SCVPN address pool.

  1. On the Navigation pane, click Configure > Network > SSL VPN to visit the SSL VPN page.
  2. On the Task tab in the right auxiliary pane, click Address Pool to visit the Address pool page.
  3. Click New. On the Basic tab in the Address Pool Configuration dialog, configure the options as below:
  1. Click OK to save the settings.

Step 6: Create the tunnel interface (the IP address of the tunnel interface must be in the same network segment with the address pool).

  1. On the Navigation pane, click Configure > Network > Network to visit the Network page.
  2. Click New on the upper-left of the zone list. In the Zone Configuration dialog, configure the options as below:
  3. Click OK to save the settings and return to the Network page.
  4. Click New > Tunnel Interface on the upper-left of the interface list. On the General tab in the Interface Configuration dialog, configure the options as below:
  5. Click OK to save the settings.

Step 7: Configure SCVPN server.

  1. On the Navigation pane, click Configure > Network > SSL VPN to visit the SSL VPN page.
  2. Click New.
  3. In the Welcome page of the SSL VPN Configuration dialog, Type ssl1 into the SSL VPN name box.
  4. Click Next. In the User page, select local from the AAA server drop-down list, and then click Add.
  5. Click Next. In the Interface page, configure the options as below:
  6. Click Next. In the Policy/Route page, add the following routes (in the order of IP, netmask, metric):
  7. Click Advanced, and in the Host Security page, add the following two host check rules:
  8. Click OK to save the settings.

Step 8: Configure the policy rule from VPN to Any.

  1. Select Objects > Address Book from the menu bar.
  2. In the Address Book dialog, click New. In the Address Entry Configuration dialog, configure the options as below:
  3. Click OK to save the settings.
  4. Repeat Step 2-3 to create the address entry named dlnetwork. Configure the options as below:
  5. Repeat Step 2-3 to create the address entry named publicnetwork. Configure the options as below:
  6. Click Close.
  7. On the Navigation pane, click Configure > Security > Policy to visit the Policy page.
  8. Select VPN and Any from the Src zone and Dst zone drop-down list respectively. Select the filtered policy rule, and click Edit. In the Policy Configuration dialog, modify the options as below:
  9. Click OK to save the settings and return to the Policy page.
  10. Select VPN and trust from the Src zone and Dst zone drop-down list respectively. Select the filtered policy rule, and click Edit. In the Policy Configuration dialog, modify the options as below:
  11. Click OK to save the settings and return to the Policy page.
  12. Select VPN and trust from the Src zone and Dst zone drop-down list respectively. Select the filtered policy rule, and click Edit. In the Policy Configuration dialog, modify the options as below:
  13. Click OK to save the settings.

After finishing the above configurations, when the client connects the server, the server will check the host based on the configured host check profile, and assign the corresponding access right according to the check result. The following list shows the relationship between the host check rule and the access right:

User Host check rule Check result and access right
Successful Failed
pc1

Role: sw

Profile: sw-security-check

Guest role: dl

Periodic: 30 minutes

Permit to access resources in the software network segment, and the host check will performed every 30 minutes automatically. Permit to access resources in the download network segment, and the host check will be performed every 30 minutes automatically.
pc2

Role: Null (the access right of the default role dl will be assigned)

Profile: dl-security-check

Guest role: Null

Periodic: 50 minutes

Permit to access resources in the download network segment, and the host check will be performed every 50 minutes automatically. Disconnect.
pc3

Role: Null

Profile: dl-security-check

Guest role: Null

Periodic: 50 minutes

Permit to access resources in the public network segment, and the host check will be performed every 50 minutes automatically. Disconnect.