In This Section: |
When you include Mobile Access in the Unified Policy, you configure all rules related to the Mobile Access portal, Capsule Workspace, and on-demand clients in the Access Control Policy.
In the Access Control Rule Base, you can configure rules that:
Mobile Access features such as Protection Levels, Secure Workspace, and Endpoint Compliance also apply.
Note that when you use the Unified Access Policy, some Mobile Access features and settings are still configured in the SmartDashboard > Mobile Access tab.
See the R80.10 Next Generation Security Gateway Guide for more about layers.
Application objects defined for Application Control, for example, are not supported in Mobile Access rules.
You must enable Identity Awareness on each gateway that is an installation target for rules with Access Roles.
Create Mobile Access rules in the Access Control Policy with these requirements:
Column |
Value |
Explanation |
---|---|---|
No. |
Make sure that the rule position is logical. |
The order of rules in the Rule Base is important. The first rule that matches the traffic is enforced. |
Name |
All |
We recommend that you use a descriptive name. |
Source |
Access Role |
Create an Access Role that includes the Users, User Groups, or Mobile/Remote Access Client that the rule applies to. See Access Roles for Remote Access. |
Destination |
The internal server on which the Mobile Access application is set. |
Mobile Access Applications are defined in the Services & Applications column. |
VPN |
Any or a Remote Access Community that includes the Mobile Access gateway |
When you enable the Mobile Access or IPsec Software Blade on a gateway, the gateway is automatically added to the default RemoteAccess VPN Community. By default the community also contains a user group that contains all users. If you remove the gateway from the VPN Community, you must select Any. |
Services & Applications |
Mobile Applications Do not include applications or service objects that are not specified as Mobile Access. |
To create a Mobile Application: Click > click > Mobile Applications > select an application type and define it. To select an existing Mobile Application: Click > *All > Mobile Applications and select one. Mobile Applications only show in the list if Mobile Access is enabled on the Layer |
Content |
Any |
Content Awareness is not relevant for Mobile Access rules. |
Action |
Accept or Drop |
Only Accept and Drop are supported. Reject is also supported but acts the same as Drop. You can also select Inline Layer to send all traffic that matches the rule to an Inline Layer under it. |
Track |
All log options |
Right-click in the cell and select More > Extended log |
Install On |
One or more gateways |
Each gateway must have Mobile Access and Identity Awareness enabled and have Unified Access Policy selected as the Policy Source. |
To use a Mobile Access application in the Unified Access Control Policy, you must define it as a Mobile Application from the SmartConsole or define it in the in SmartDashboard > Mobile Access tab.
Other application objects, such as URL Filtering applications, are not relevant for Mobile Access. For example: To authorize Facebook as a web application in Mobile Access, you must create a new Web Application and specify Facebook’s URL. You cannot use the URL Filtering Facebook application, because it is not for Mobile Access.
To create a Mobile Application object to use in the Access Control Policy:
For R80.x gateways, create Access Roles for Remote Access and VPN Clients to include them in rules in the Access Control Rule Base. This applies to Mobile Access and IPsec clients. When an Access Role for a client is in the Source column of a rule, the rule applies to traffic that originates from that client.
You can also use an Access Role in the Destination column.
You must enable Identity Awareness on each gateway that is an installation target for rules with Access Roles.
To create an Access Role for a new Remote Access or VPN client:
After you configure rules for Mobile Access in the Unified Access Control Policy, configure the gateway to use the Unified Access Policy.
To make an R80.x Mobile Access gateway use the Unified Access Control Policy:
To enable Mobile Access on an Ordered Layer:
The Layer Editor window opens and shows the General view.
To enable Mobile Access on an Inline Layer:
When you include Mobile Access in the Unified Access Control Policy, these are some factors that you need to be aware of:
We recommend that you make an Inline Layer for Mobile Access rules, to easily manage the Mobile Access policy.
To use an Inline Layer effectively, define a parent rule in the main layer. The parent rule matches all Mobile Access traffic and sends the traffic to the Inline Layer. It requires an Access Role that includes all Mobile Access client types or traffic in the Source column.
When a rule contains Inline Layer in the Action column, an Inline Layer is automatically created below it and it becomes a parent rule.
No |
Name |
Source |
Destination |
VPN |
Services & Applications |
Action |
Track |
1 |
Network rules |
My_network |
R80.10_GW |
Any |
Any |
Accept |
Log |
2 |
Mobile Access Inline Layer Entry Point |
All Mobile Access traffic |
Any |
Any |
Any |
Mobile Access Inline Layer |
Extended Log |
2.1 |
Capsule Workspace rule |
Capsule Workspace traffic |
Any |
Any |
Business Mail |
Accept |
Extended Log |
2.2 |
Special access rule |
Managers |
Any |
Any |
Internal App |
Accept |
Extended Log |
2.3 |
Mobile Access Inline Layer Cleanup rule |
Any |
Any |
Any |
Any |
Drop |
Extended Log |
3 |
Cleanup rule |
Any |
Any |
Any |
Any |
Drop |
Log |
To make a rule that sends all Mobile Access traffic to a Mobile Access Inline Layer:
To configure rules in the Inline Layer:
If you work with Ordered Layers, you can configure a Mobile Access Inline Layer in any Ordered Layer.
Make sure to create a bypass rule for Mobile Access traffic in all layers that come before the Mobile Access layer. For example, if your Mobile Access Inline Layer is in the third layer, you must create a bypass rule in the first and second Ordered Layers.
The bypass rule matches the Mobile Access traffic in the layer and allows the traffic. The traffic then moves to the next layer, until it gets to the Mobile Access Inline Layer.
To create a bypass rule, use the Access Role for all Mobile Access users in the Source column and Accept in the Action column.
If you do use Any to represent all Mobile Access applications, configured Mobile Access applications are authorized, but they do not show in the portal or Capsule Workspace. Users can enter the URL of the App in the Address field of the Mobile Access portal.
To change the behavior when Any is used to represent Mobile Access applications, see sk112576.
In the Unified Access Control Policy, put Mobile Access rules that authorize applications above rules that contain a related service. For example, put a rule to allow a web application above a rule that allows or blocks HTTP/HTTPS. If the HTTP/HTTPS rule is first, the user will not see the Mobile Access Web application in the portal or in Capsule Workspace and will not be able to access it.
For example, this Rule Base allows Outlook Web Access (OWA), a web-based Mobile Access application. It also allows HTTPS traffic:
Correct way to allow the HTTPS service and also Mobile Access HTTPS applications:
No |
Name |
Source |
Destination |
Services & Applications |
Action |
Track |
1 |
Network rule |
My_network |
GW_1 |
Any |
Accept |
Log |
2 |
Mobile Access Inline Layer |
All Mobile Access traffic |
Any |
Any |
Mobile Access Inline Layer |
Log |
2.1 |
Mobile Access applications |
All Mobile Access traffic |
Any |
Internal App OWA Business Mail |
Accept
|
Log |
2.2 |
Cleanup rule |
Any |
Any |
Any |
Drop |
Log |
3 |
Allow HTTPS |
Any |
Any |
https |
Accept |
Log |
4 |
Cleanup rule |
Any |
Any |
Any |
Drop |
None |
Rule 2.1, that allows access to Mobile Access applications, including Outlook Web Access (OWA) on HTTPS, is above rule 3, which allows all HTTPS traffic.
If you put rule 3 to allow HTTPS above the Mobile Access rules, the user will not see the OWA Web application in the portal or in Capsule Workspace and will not be able to access it. To authorize a Mobile Access application, you must use a Mobile Access application in the Services & Applications column.
You can use HTTPS in the parent rule of the Mobile Access Inline Layer, but specify the Mobile Access application inside the Inline Layer. That way, the HTTPS traffic for OWA, for example, will match on the HTTPS rule, and will also match on the OWA App inside the Inline Layer.
Native Applications
In this scenario with a Native application:
Then the parent rule of the Inline Layer must include one of these in the Services & Applications column: