SonicWallSMAConnectTunnel12.0DeploymentPlanningGuide
PlanningYourVPN
21
AccesscontrolrulesaredisplayedasanorderedlistinAMC.Whentheapplianceevaluatesaconnection
request,itbeginsatthetopofthelistandworksitswaydownuntilitfindsamatch.Whenitfindsamatch,the
actionrequiredbytherule—eitherPermitorDeny—is
appliedandnofurtherrulesareevaluated.
Accesstoaresourcecanbebasedonseveralcriteria.Mostrulescontrolaccessbasedonwhotheuseris—that
is,theuser’snameorgroupmembership—andthedestinationresource.(Ifyoudon’trestrictaccesstoa
particularuserordestinationresource,theword
Anyappearsintheaccesscontrollist.)
Inaddition,youcancontrolaccessbasedonseveralothercriteriasuchas:
•TheEPCzonefromwhichtheconnectionrequestoriginates.Supposeyouwanttorequireusers
accessingasensitivefinancialapplicationtorunabrowsercachecleaneraftereachsession.Ifso,
you
couldconfigurearulethatallowsaccessonlytosystemsinatrustedzonethatarerunningaparticular
program.
InAccessControlrules,accesstoRemoteofficedesktopsisrestrictedtousersintheRemotegroupwho
havedeviceprofilesthatplacethemintheTrustedlaptopzone.
•Theaddressfromwhichtheconnectionrequestoriginates.Youmightwanttocontrolaccesstoa
resourcebasedonthenamesofanysourcenetworksyouwantevaluatedintherule.
•Theaccessmethodusedtoreachtheresource.Youmightwanttoenablebroadaccesstoresources
withinaninternal
domainfromthenetworktunnelorproxyagents,butpreventbrowser‐basedaccessto
Webserverswithinthedomain.
•Thedayortimeoftherequest.Forexample,youmightgivebusinesspartnersaccesstoaparticular
applicationonweekdaysfromonly9:00A.M.to5:00P. M .
Aconnectionrequest
canbesummarizedasfollows:
1Auserisauthenticatedandinitiatesaconnection.
2Theapplianceanalyzestheconnectionrequesttoidentifyitsattributes(includinguserandgroup
information,thedestinationbeingrequested,thesourcenetworkfromwhichtherequestoriginates,and
thedayortimeoftherequest).
3Theappliancereadsthe
firstruleintheaccesscontrollistandcomparesittotherequestcriteria:
• Ifamatchisfound,theaction(PermitorDeny)specifiedintheruleisappliedandnofurtherrules
areevaluated.
• Ifnomatchisfound,theapplianceevaluatesthenextruleinthe
listtoseeifitmatchesthe
request.
4Iftheapplianceprocessesalloftheruleswithoutfindingamatch,animplicitDenyruleisapplied.
AccessControlforBi‐DirectionalConnections
VPNconnectionstypicallyinvolvewhatarecalledforwardconnections,whichareinitiatedbyausertoa
networkresource.However,ifyoudeploynetworktunnelclients(ConnectTunnelorOnDemandTunnel)toyour
users,bi‐directionalconnectionsareenabled.Examplesofbi‐directionalconnectionsincludeanFTPserverthat
downloadsfiles
tooruploadsfilesfromaVPNuser,andremoteHelpDeskapplications.
WithintheSecureMobileAccessVPN,bi‐directionalconnectionsincludethefollowing:
• ForwardconnectionsfromaVPNusertoanetworkresource.
• ReverseconnectionsfromanetworkresourcetoaVPNuser.Anexampleofareverse
connectionisan
SMSserverthatpushesasoftwareupdatetoauser’smachine.
• Cross‐connectionsreferspecificallytoVoIP(VoiceoverIP)ap plicationsthatenableoneVPNuserto
telephoneanother.Thiskindofconnectionrequiresapairofaccesscontrolrules:onefortheforward
connectionandone
forthereverseconnection.