EasyManua.ls Logo

SonicWALL SMA - Access Policy; Communities; Sonicwall SMA Connect Tunnel 12.0 Deployment Planning Guide

SonicWALL SMA
48 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SonicWallSMAConnectTunnel12.0DeploymentPlanningGuide
AboutSonicWallSMAConnectTunnel
8
RSAAuthenticationManagerserverauthenticationusingtokenbasedusercredentials
RSAClearTrustwithcredentials
Localuserswithusername/password(usedprimari lyfortestingpu rposesandnotrecommendedina
productionenvironment)
Anauthenticationrealmiswhatuserslogintoontheappliancetogainaccesstoyourresources.Ifyour
organization
hasonlyoneauthenticationserver,youwouldcreateonerealmontheappliance.Ifyouhave
severalauthenticationservers,youcancreatearealmforeachofthem,orsetuppairsofserversforchained
authentication.Totakeamoregranularapproachtodeploymentand security,youcanfurther
subdividethe
userpopulationofarealmintocommunities.
Communities
Communitiesareacornerstoneoftheappliance’sapproachtodeploymentandsecurity.Theyareusedto
aggregateusersandgroupsforthepurposeofdeployingaccessagentsandcontrollingtheendpoint,andcan
alsobereferencedin accesscontrolrules.
Youcancreatecommunitiesforspecifictypesofusers,such
asremoteemployeesorbusinesspartners,ortake
amoregranularapproachandcreatecommunitiesofusersinaparticulardepartmentorlocation.
Forexample,employeeswhorequirebroadaccesstoresourcesandapplicationsonyournetworkcouldbe
assignedtoacommunitythatoffersthenetworktunnelclientas
anaccessmethod.Tomakesurethattheyare
usinglaptopsmanagedbyyourITdepartment,specifywhichEndPointControlzonesareavailabletousersin
thiscommunity.
Youmayhaveanothergroupofuserswhorequireonlylimitedaccesstoresourcesbecausethey’reloggingin
frompublickiosksor
othernonsecurelocations.Togivethesetwodifferentgroupsaccesstoyournetwork
resources,youcouldcreateseparatecommunities,eachconfiguredtodeploytheappropriateaccessagents,
and(inthecaseofuserswithnonsecuredevices)useEndPointControl(EPC)topreventsensitivedatafrom
beingleft
onadevice.
AccessPolicy
Anaccesspolicyisasetofrulesthatdefinestheapplicationsornetworkresourcesthatusersorgroupsare
givenaccesstothroughtheappliance.
Accesstoaresourcecanbebasedonseveralcriteria.Mostrulescontrolaccessbasedonwhotheuseris—that
is,theusersnameor
groupmembership—andthedestinationresource.Youcanuseothercriteriainaccess
controlrules,suchastheaccessmethodforaresource,theusersnetworkaddress,thezoneoftrust,orthe
dateandtimeoftheconnectionrequest.
Theappliancegivesyouwidelatitudeincreatingaccesscontrolrules,depending
onwhetheryourorganization’s
securitypolicyisrelativelypermissiveordemandsstringentcontrol.Forexample,ifyourVPNisaccessedonly
byhighlytrustedemployeeswhoareusingcomputersmanagedbyyourITdepartment,youcouldcreatean
openaccesspolicythatdefinesyourentirenetworkdomainasaresource
andgrantsbroadaccesstoyour
employees.
Conversely,ifyouareprovidingaccesstoadiversegroupofuserswithvaryingdeg reesofaccessprivileges,or
whoconnectfromlesssecuredevicessuchaspublickiosks,youmightuseanaccesspolicythatdefines
individualresourcesand establishesmoregranularaccess
requirements.
Asthenetworkchangesovertime,soshouldyouraccesscontrolrules.

Table of Contents

Related product manuals