Setting Up Access Control

Access control is the process by which user access to Internet and intranet services is regulated and monitored. Specifically, the Novell® BorderManager® 3.7 access control software allows or denies access requests made through the Novell IP Gateway, Proxy Services, or a Virtual Private Network (VPN) client.

When you enabled the Novell BorderManager 3.7 HTTP proxy for all private interfaces during the software installation, access control was enabled by default. All HTTP proxy traffic through the private interface is denied until you configure an access rule to specifically allow users to access the HTTP proxy.

When access control is enabled, the access control list (ACL)---comprising the access rules---also applies to the Novell IP Gateway, the application proxies, and VPN clients attempting to connect to a VPN server.

An access rule can be created for a Country (C), Organization (O), Organizational Unit (OU), or Server object. This chapter explains how to set up basic access control so users can use the Novell BorderManager 3.7 services you enabled.

This section contains the following sections:

NOTE:  This section describes the tasks required to set up an initial implementation of access control. For planning and conceptual information about access control, refer to the Novell BorderManager 3.7 Overview and Planning Guide, available in the online documentation. Make sure you understand this information before setting up and configuring access control.



  Previous Page: Completing Advanced Setup, Configuration, and Management Tasks  Next Page: Setting Up a URL-Based Rule