Add the network that you want the remote user to be able to access.


  1. In the SSL VPN-Plus tab, select Private Networks from the left panel.
  2. Click the Add (Add icon) icon
  3. Type the private network IP address.
  4. Type the netmask of the private network.
  5. (Optional) Type a description for the network.
  6. Specify whether you want to send private network and internet traffic over the SSL VPN-Plus enabled NSX Edge or directly to the private server by bypassing the NSX Edge.
  7. If you selected Send traffic over the tunnel, select Enable TCP Optimization to optimize the internet speed.
    Conventional full-access SSL VPNs tunnel sends TCP/IP data in a second TCP/IP stack for encryption over the internet. This results in application layer data being encapsulated twice in two separate TCP streams. When packet loss occurs (which happens even under optimal internet conditions), a performance degradation effect called TCP-over-TCP meltdown occurs. In essence, two TCP instruments are correcting a single packet of IP data, undermining network throughput and causing connection timeouts. TCP Optimization eliminates this TCP-over-TCP problem, ensuring optimal performance.
  8. When optimization is enabled, specify the port numbers for which traffic should be optimized.
    Traffic for remaining ports for that specific network will not be optimized.
    Note: Traffic for all ports are optimized, if port numbers are not specified.

    When TCP traffic is optimized, the TCP connection is opened by the SSL VPN server on behalf of the client. Because the TCP connection is opened by the SSLVPN server, the first automatically generated rule is applied, which allows all connections opened from the Edge to get passed. Traffic that is not optimized will be evaluated by the regular Edge firewall rules. The default rule is allow any any.

  9. Specify whether you want to enable or disable the private network.
  10. Click OK.

What to do next

Add a corresponding firewall rule to allow the private network traffic.