The USG firewall configures the maximum number of concurrent SSL VPNs

38

USG firewall configuration ssl vpn maximum number of concurrent users

V-gateway cur-max-user
Use the v-gateway cur-max-user command to modify the maximum number of concurrent users of the virtual gateway. By default, the maximum number of concurrent users is the number of concurrent users available for the system license.
Use the undo v-gateway cur-max-user command to delete the maximum number of concurrent users and restore the default value.
Command format
V-gateway v-gateway-name cur-max-user cur-max-user
Undo v-gateway v-gateway-name cur-max-user
Parameter Description
V-gateway-name virtual gateway name.
Cur-max-user cur-max-user The maximum number of concurrent users that a virtual gateway can connect to.
user's guidance
The number of concurrent users supported by the USG is controlled by the system license. The number of virtual gateway concurrent users created by each virtual gateway is limited by the total number of concurrent users.
The maximum number of concurrent users of the virtual gateway is less than the maximum number of virtual gateway users.
By default, the maximum number of concurrent users of a virtual gateway is as follows:
If the virtual gateway has set the number of concurrent users, then the number of concurrent users of the new virtual gateway is the number of concurrent users available for the system license.
If no virtual gateway has set the number of concurrent users, the number of concurrent users of the new virtual gateway is the number of concurrent users allowed by the system license.
Use examples
System-view
[Sysname] v-gateway abc cur-max-user 20 // modify the virtual gateway abc maximum number of concurrent users to 20.

Other related questions:
Maximum number of concurrent SSL VPN connections on the firewall
Configuring the maximum number of concurrent SSL VPN users on the USG v-gateway cur-max-user The v-gateway cur-max-user command modifies the maximum number of concurrent users supported by a virtual gateway. By default, the maximum number of concurrent users is the number of concurrent users available as specified by the system license. The undo v-gateway cur-max-user command restores the maximum number of concurrent users to the default value. Syntax v-gateway v-gateway-name cur-max-user cur-max-user undo v-gateway v-gateway-name cur-max-user Parameter Description v-gateway-name Virtual gateway name cur-max-user cur-max-user Maximum number of concurrent users supported by a virtual gateway Usage Guide The maximum number of concurrent users supported by the USG is controlled by the license. The license also limits the total number of concurrent users on virtual gateways of the USG. The maximum number of concurrent users on virtual gateways should be smaller than that of users on virtual gateways. By default, the maximum number of concurrent users on virtual gateways falls into the following situations: If a concurrent user limit is set for virtual gateways, the maximum number of concurrent users on the new virtual gateway is the number of remaining concurrent users of the system license. If no concurrent user limit is set for virtual gateways, the maximum number of concurrent users on the new virtual gateway is the number of concurrent users allowed by the system license. Example system-view [sysname] v-gateway abc cur-max-user 20 //Set the maximum number of concurrent users on virtual gateway abc to 20.

The USG firewall configures the SSL VPN session timeout
By default, the SSL session timeout period is 5 minutes. The timeout time configuration command is ssl timeout. system-view [sysname] v-gateway abc [sysname-abc] basic [sysname-abc-basic] ssl timeout 10

The USG firewall configures SSL VPN file shares
The USG firewall configures SSL VPN file shares The main function of file sharing is to share the resources of different system servers (such as Windows systems that support SMB protocol, Linux systems that support NFS protocol) in the form of web pages. Before the configuration to ensure that the license file has been loaded, the USG can access the internal network resources. Configuration steps: 1. In the USG to create a virtual gateway, external network users through this virtual gateway to access the enterprise network resources. 2. Configure the DNS server address and domain name of the internal network so that users can access the virtual gateway's service through the domain name. 3. Configure file sharing, add file type resources for SMB type and NFS type. 4. Configure the authentication and authorization function.

USG firewall configure SSL VPN network extension
USG Firewall Configure SSL VPN to configure network extensions Network expansion refers to the user on the local PC to install the USG network extension client, generate a virtual network card, the user through the virtual network card and enterprise intranet for SSL data communication. Before the configuration to ensure that the license file has been loaded, the USG can access the internal network resources. Configuration ideas: 1. In the USG to create a virtual gateway, external network users through this virtual gateway to access the enterprise network resources. The IP address of the virtual gateway is the public address of the egress. 2. Configure the DNS server address and domain name of the internal network so that users can access the virtual gateway's service through the domain name. 3. Configure the network extension function, assign IP addresses to the external network users and add the intranet resources that the external network users can access. 4. Configure the authentication mode as a certificate challenge (secondary authentication mode: VPNDB) and configure the authentication mode as VPNDB. 5. Add a VPNDB user. VPNDB user name that is the name of the client certificate, VPNDB password is the external network user login virtual gateway need to enter the password. 6. Configure the virtual gateway source IP policy. 7. Install the client certificate for the CA certificate on the PC side where you want to access the virtual gateway.

The USG firewall configures the SSL VPN port for forwarding
The USG firewall configures the SSL VPN port for forwarding The port forwarding service is a secure application that provides TCP-based applications and is a non-Web application. Port forwarding controls user access at the application level to control the availability of services for various applications. Before the configuration to ensure that the license file has been loaded, the USG can access the internal network resources. Configuration step: 1. In the USG to create a virtual gateway, external network users through this virtual gateway to access the enterprise network resources. 2. Configure the DNS server address and domain name of the internal network so that users can access the virtual gateway's service through the domain name. 3. Configure the port forwarding function. 4. Configure the server to add users who need access to the relevant groups. 5. Configure the authentication and authorization function on the firewall. 6. Configure Group Policy to allow group users to access the associated server. 7. Configure the user destination IP policy to restrict users from accessing other intranet resources.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top