EasyManua.ls Logo

SonicWALL SMA - Page 21

SonicWALL SMA
48 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SonicWallSMAConnectTunnel12.0DeploymentPlanningGuide
PlanningYourVPN
21
AccesscontrolrulesaredisplayedasanorderedlistinAMC.Whentheapplianceevaluatesaconnection
request,itbeginsatthetopofthelistandworksitswaydownuntilitfindsamatch.Whenitfindsamatch,the
actionrequiredbytherule—eitherPermitorDeny—is
appliedandnofurtherrulesareevaluated.
Accesstoaresourcecanbebasedonseveralcriteria.Mostrulescontrolaccessbasedonwhotheuseris—that
is,theusersnameorgroupmembership—andthedestinationresource.(Ifyoudon’trestrictaccesstoa
particularuserordestinationresource,theword
Anyappearsintheaccesscontrollist.)
Inaddition,youcancontrolaccessbasedonseveralothercriteriasuchas:
•TheEPCzonefromwhichtheconnectionrequestoriginates.Supposeyouwanttorequireusers
accessingasensitivefinancialapplicationtorunabrowsercachecleaneraftereachsession.Ifso,
you
couldconfigurearulethatallowsaccessonlytosystemsinatrustedzonethatarerunningaparticular
program.
InAccessControlrules,accesstoRemoteofficedesktopsisrestrictedtousersintheRemotegroupwho
havedeviceprofilesthatplacethemintheTrustedlaptopzone.
•Theaddressfromwhichtheconnectionrequestoriginates.Youmightwanttocontrolaccesstoa
resourcebasedonthenamesofanysourcenetworksyouwantevaluatedintherule.
•Theaccessmethodusedtoreachtheresource.Youmightwanttoenablebroadaccesstoresources
withinaninternal
domainfromthenetworktunnelorproxyagents,butpreventbrowserbasedaccessto
Webserverswithinthedomain.
•Thedayortimeoftherequest.Forexample,youmightgivebusinesspartnersaccesstoaparticular
applicationonweekdaysfromonly9:00A.M.to5:00P. M .
Aconnectionrequest
canbesummarizedasfollows:
1Auserisauthenticatedandinitiatesaconnection.
2Theapplianceanalyzestheconnectionrequesttoidentifyitsattributes(includinguserandgroup
information,thedestinationbeingrequested,thesourcenetworkfromwhichtherequestoriginates,and
thedayortimeoftherequest).
3Theappliancereadsthe
firstruleintheaccesscontrollistandcomparesittotherequestcriteria:
Ifamatchisfound,theaction(PermitorDeny)specifiedintheruleisappliedandnofurtherrules
areevaluated.
Ifnomatchisfound,theapplianceevaluatesthenextruleinthe
listtoseeifitmatchesthe
request.
4Iftheapplianceprocessesalloftheruleswithoutfindingamatch,animplicitDenyruleisapplied.
AccessControlforBiDirectionalConnections
VPNconnectionstypicallyinvolvewhatarecalledforwardconnections,whichareinitiatedbyausertoa
networkresource.However,ifyoudeploynetworktunnelclients(ConnectTunnelorOnDemandTunnel)toyour
users,bidirectionalconnectionsareenabled.ExamplesofbidirectionalconnectionsincludeanFTPserverthat
downloadsfiles
tooruploadsfilesfromaVPNuser,andremoteHelpDeskapplications.
WithintheSecureMobileAccessVPN,bidirectionalconnectionsincludethefollowing:
ForwardconnectionsfromaVPNusertoanetworkresource.
ReverseconnectionsfromanetworkresourcetoaVPNuser.Anexampleofareverse
connectionisan
SMSserverthatpushesasoftwareupdatetoausersmachine.
CrossconnectionsreferspecificallytoVoIP(VoiceoverIP)ap plicationsthatenableoneVPNuserto
telephoneanother.Thiskindofconnectionrequiresapairofaccesscontrolrules:onefortheforward
connectionandone
forthereverseconnection.

Table of Contents

Related product manuals