Hi,
I have this problem:
I would like to permit my VPN users to access to external IP by VPN Network.
For example:
My VPN Network is: 10.10.10.0/23
My External IP is: 192.192.192.x
The External IP is on AWS and have restrict IP inbound (only public IP of SSLVPN).
Now I created a user roles and set Web lik on 8080 port.
I created and associated a WSAM allowed servers
But when I connet to SSLVPN, and click on the link I receive this error:
Access to the Web site is blocked by your administrator. Please notify your system administrator. Made http request for GET / HTTP/1.1 to 192.192.192.x:8080
Thanks for the support
Marco
Solved! Go to Solution.
Hi Marco,
You're right, selecting Don't Rewrite (with redirect) will redirect the users to go the webpage directly which then should be tunneled by WSAM proxy and the VPN server should be able to send the traffic out using it's Internal port.
Does the redirected traffic is not being captured by WSAM?
NOTE: If you're using Windows 10 RS5 (1809 update), please use PSAM (Enable Pulse Secure Client option on the user role + WSAM >> Connect directly from Pulse Client / Logon through web browser to get the Pulse Client installed) and check the behavior.
If you're not planning on using WSAM to capture the 192.192.192.x:8080 traffic which I thought you did, then to fix the "Access blocked" issue, please allow the 192.192.192.x:8080 by adding an allow Web ACL (Users >> Resource policies >> Web >> Web ACL >> Under resources, enter http:// or https://<IP address>:<port> and save changes.
Thanks,
Ray.
Hi Ray,
thanks for your reply.
But if I select Don't Rewrite (with redirect) the IP ins't of SSLVPN and the page is not visible.
Thanks
Marco
Hi Marco,
Are you using also the external interface or just the internal interface?
The WSAM connections use as source interface the internal interface. You have to be sure that the internal interface can go to the AWS resource and also you have to be sure that the IP address of the internal interface (or the NAT used) is allow by the AWS resource
Hi Marco,
You're right, selecting Don't Rewrite (with redirect) will redirect the users to go the webpage directly which then should be tunneled by WSAM proxy and the VPN server should be able to send the traffic out using it's Internal port.
Does the redirected traffic is not being captured by WSAM?
NOTE: If you're using Windows 10 RS5 (1809 update), please use PSAM (Enable Pulse Secure Client option on the user role + WSAM >> Connect directly from Pulse Client / Logon through web browser to get the Pulse Client installed) and check the behavior.
If you're not planning on using WSAM to capture the 192.192.192.x:8080 traffic which I thought you did, then to fix the "Access blocked" issue, please allow the 192.192.192.x:8080 by adding an allow Web ACL (Users >> Resource policies >> Web >> Web ACL >> Under resources, enter http:// or https://<IP address>:<port> and save changes.
Thanks,
Ray.
Sorry I don't understand this:
You're right, selecting Don't Rewrite (with redirect) will redirect the users to go the webpage directly which then should be tunneled by WSAM proxy and the VPN server should be able to send the traffic out using it's Internal port.
With Don't Rewrite (with Redirect) the IP is the local Ip of the pc and not the SSLVPN IP correct?
I created a Web Access Policies and add the AWS IP, now (whitout Don't Rewrite) I can see the portal by SSLVPN IP but I have a view problem that all component isn't load correctly.
Hi Ray,
could you help me to configure this, please:
NOTE: If you're using Windows 10 RS5 (1809 update), please use PSAM (Enable Pulse Secure Client option on the user role + WSAM >> Connect directly from Pulse Client / Logon through web browser to get the Pulse Client installed) and check the behavior.
I need to allow web access to external IP passing by SSLVPN, because the external IP allow connection only from Public SSLVPN IP.
If you are looking to enable Pulse-based SAM, you do this by doing the following:
Users>User Roles>roleName>General
Options
click on Pulse Secure client
Users>User Roles>roleName>SAM
Add Server… under Options
Users>Resource Policies>SAM>Access Control
New Policy…
To use the above, users will need to do one of the following:
Start
next to the Pulse Secure client icon
OR (after Pulse is installed)
Connect
Can you clarify your comment on the external IP being allowed? Do you mean that your network range outbound from your firewall/gateway has been whitelisted and your PCS internal port goes out that same network OR do you mean that the whitelist has been enabled specifically for the external port of the PCS? If the latter, that will not work as the external port does not source traffic. All traffic will be sourced from the internal port (with egress through your network based on the routing).
Hi,
thank for your reply.
I tryed you solution, but I don't understand this step:
I created a WSAM destination (under SAM>Application) with IP and port, is it correct?
I need to enable VPN Tunneling under Users>USer Roles>My Role>General
The web application is on AWS, and its Inbound rules IP is allow only the external IP of the SSLVPN, I need to configure it to allow the user to access to link by SSLVPN.