SonicWallSMAConnectTunnel12.0DeploymentPlanningGuide
PlanningYourVPN
3
15
PlanningYourVPN
• WhoWillAccessYourVPN?onpage15
• WhichTypesofResourcesShouldUsersHaveAccessTo?onpage16
• SecurityAdministrationonpage18
• EndPointControlonpage22
• PuttingItAllTogether:UsingRealmsandCommunitiesonpage23
AboutDesigningYourVPN
ToeffectivelydesignyourVPN,youmustidentifywhowilluseit,whattypesofresourcestomakeavailable,and
whichaccessmethodstoprovidetouserssotheycanreachyournetwork.
Topics:
• WhoWillAccessYourVPN?onpage15
• WhichTypesofResourcesShouldUsersHaveAccessTo?onpage16
• HowWillUsersAccessYourResources?onpage16
WhoWillAccessYourVPN?
AkeyconsiderationinplanningyourVPNisidentifyingtheuserswhoneedtoaccessyournetworkresources.
YourusercommunitywillhaveamajorimpactonhowyoudesignandadministeryourVPN.
MostVPNusersgenerallyfallintooneoftwomajorcategories:
•Remoteemployees.Whenservingremoteand
mobileemployees,you’llprobablygivethemrelatively
openaccesstoenterpriseresources.Ofcourse,youcanalsodefineamoregranularaccesspolicyfor
specificresourcesthatcontainsensitiveinformation(suchasapayrollapplication).
EmployeecomputersystemsunderITcontrolprovidetheflexibilitytoinstallclientsoftware—suchasthe
ConnectTunnelclient—onthedesktop.
•Businesspartners.Suppliers,vendors,contractors,andotherpartnersgenerallyhaverestrictedaccessto
resourcesonyournetwork.Thisrequiresyoutoadministermoregranular resourcedefinitionsand
accesscontrolrulesthanthosetypicallyusedforaremoteaccessVPN.
Forexample,insteadofsimplydefininga
domainresourceandgrantingopenaccessprivileges,you’ll
oftenneedtodefinespecifichostresourcesandmanageamorecomplexaccesspolicy.Whendefininga
Webresourceyoumayalsowanttoobscureitsinternalhostnametomaintaintheprivacyofyour
network.
Becauseoftheadministrativeandsupportissues
associatedwithinstallingclientsoftwareoncomputers
outsidethecontrolofyourITorganization,aWeb‐basedaccessmethodisoftenbestforbusiness
partners.