EasyManua.ls Logo

SonicWALL SMA - Planning Your VPN; Who Will Access Your VPN?

SonicWALL SMA
48 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SonicWallSMAConnectTunnel12.0DeploymentPlanningGuide
PlanningYourVPN
3
15
PlanningYourVPN
WhoWillAccessYourVPN?onpage15
WhichTypesofResourcesShouldUsersHaveAccessTo?onpage16
SecurityAdministrationonpage18
EndPointControlonpage22
PuttingItAllTogether:UsingRealmsandCommunitiesonpage23
AboutDesigningYourVPN
ToeffectivelydesignyourVPN,youmustidentifywhowilluseit,whattypesofresourcestomakeavailable,and
whichaccessmethodstoprovidetouserssotheycanreachyournetwork.
Topics:
WhoWillAccessYourVPN?onpage15
WhichTypesofResourcesShouldUsersHaveAccessTo?onpage16
HowWillUsersAccessYourResources?onpage16
WhoWillAccessYourVPN?
AkeyconsiderationinplanningyourVPNisidentifyingtheuserswhoneedtoaccessyournetworkresources.
YourusercommunitywillhaveamajorimpactonhowyoudesignandadministeryourVPN.
MostVPNusersgenerallyfallintooneoftwomajorcategories:
•Remoteemployees.Whenservingremoteand
mobileemployees,you’llprobablygivethemrelatively
openaccesstoenterpriseresources.Ofcourse,youcanalsodefineamoregranularaccesspolicyfor
specificresourcesthatcontainsensitiveinformation(suchasapayrollapplication).
EmployeecomputersystemsunderITcontrolprovidetheflexibilitytoinstallclientsoftware—suchasthe
ConnectTunnelclient—onthedesktop.
•Businesspartners.Suppliers,vendors,contractors,andotherpartnersgenerallyhaverestrictedaccessto
resourcesonyournetwork.Thisrequiresyoutoadministermoregranular resourcedefinitionsand
accesscontrolrulesthanthosetypicallyusedforaremoteaccessVPN.
Forexample,insteadofsimplydefininga
domainresourceandgrantingopenaccessprivileges,you’ll
oftenneedtodefinespecifichostresourcesandmanageamorecomplexaccesspolicy.Whendefininga
Webresourceyoumayalsowanttoobscureitsinternalhostnametomaintaintheprivacyofyour
network.
Becauseoftheadministrativeandsupportissues
associatedwithinstallingclientsoftwareoncomputers
outsidethecontrolofyourITorganization,aWebbasedaccessmethodisoftenbestforbusiness
partners.

Table of Contents

Related product manuals