EasyManua.ls Logo

Dell SMA 200 - Page 192

Dell SMA 200
514 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
192
Setting NetExtender Client Address Range and Route
To configure the NetExtender client address range and route on the SMA/SRA appliance:
1 Navigate to NetExtender > Client Addresses to set the NetExtender Client Address Range.
Client Addresses are assigned in the same subnet of the SMA/SRA X0 interface. Exclude the SMA/SRA
appliance X0 interface and the firewall DMZ interface IP address.
2 Navigate to NetExtender > Client Routes.
Click Add Client Route to select the correct Client Routes for the authenticated remote users accessing
the private networks by way of the SMA/SRA connection.
The client route corresponds with the subnet connected to the X0 (LAN) interface of the Dell SonicWALL
NSA, TZ, or SuperMassive 9000 series.
Creating a Portal Domain with RADIUS Authentication
To create a domain using RADIUS authentication on the SMA/SRA appliance:
1 Navigate to Portal > Domains and click Add Domain.
2Select Radius from the Authentication Type drop-down list.
3 Enter the Domain Name that users use in order to log in to the Secure Mobile Access portal.
Configuring a Policy on VASCO IdentiKey
To add a new policy in the VASCO Identikey Web Administration interface:
1 Log in to the Vasco Identikey Web Administration window.
2Click the Policies tab and select Create.
3 Fill in a policy name and choose the option most suitable in your situation. If you want the policy to
inherit a setting from another policy, choose the inherit option. If you want to copy an existing policy,
choose the copy option, and if you want to make a new policy, choose the create option.
Use the following settings for the policy:
Registering the SMA/SRA as a VASCO Client
To register the SMA/SRA appliance as a VASCO client:
1 In the Vasco Identikey Web Administration window, click the Clients Tab and choose Register.
2Select RADIUS Client for Client Type.
NOTE: There are policies available by default, and you can also create new policies to suit
your needs
NOTE: Configure the policy properties to use the appropriate back-end server. This can be
the same authentication service as previously used in the SMA/SRA appliance.
Table 27. Policy settings
Local Auth Default (DIGIPASS/Password)
Back-End Auth Default (None)
Dynamic User Registration Default (No)
Password Autolearn Default (No)
Stored Password Proxy Default (No)
Windows Group Check Default (No Check)

Table of Contents

Related product manuals