SonicWallSMAConnectTunnel12.0DeploymentPlanningGuide
AboutSonicWallSMAConnectTunnel
8
• RSAAuthenticationManagerserverauthenticationusingtoken‐basedusercredentials
• RSAClearTrustwithcredentials
• Localuserswithusername/password(usedprimari lyfortestingpu rposesandnotrecommendedina
productionenvironment)
Anauthenticationrealmiswhatuserslogintoontheappliancetogainaccesstoyourresources.Ifyour
organization
hasonlyoneauthenticationserver,youwouldcreateonerealmontheappliance.Ifyouhave
severalauthenticationservers,youcancreatearealmforeachofthem,orsetuppairsofserversforchained
authentication.Totakeamoregranularapproachtodeploymentand security,youcanfurther
subdividethe
userpopulationofarealmintocommunities.
Communities
Communitiesareacornerstoneoftheappliance’sapproachtodeploymentandsecurity.Theyareusedto
aggregateusersandgroupsforthepurposeofdeployingaccessagentsandcontrollingtheendpoint,andcan
alsobereferencedin accesscontrolrules.
Youcancreatecommunitiesforspecifictypesofusers,such
asremoteemployeesorbusinesspartners,ortake
amoregranularapproachandcreatecommunitiesofusersinaparticulardepartmentorlocation.
Forexample,employeeswhorequirebroadaccesstoresourcesandapplicationsonyournetworkcouldbe
assignedtoacommunitythatoffersthenetworktunnelclientas
anaccessmethod.Tomakesurethattheyare
usinglaptopsmanagedbyyourITdepartment,specifywhichEndPointControlzonesareavailabletousersin
thiscommunity.
Youmayhaveanothergroupofuserswhorequireonlylimitedaccesstoresourcesbecausethey’reloggingin
frompublickiosksor
othernon‐securelocations.Togivethesetwodifferentgroupsaccesstoyournetwork
resources,youcouldcreateseparatecommunities,eachconfiguredtodeploytheappropriateaccessagents,
and(inthecaseofuserswithnon‐securedevices)useEndPointControl(EPC)topreventsensitivedatafrom
beingleft
onadevice.
AccessPolicy
Anaccesspolicyisasetofrulesthatdefinestheapplicationsornetworkresourcesthatusersorgroupsare
givenaccesstothroughtheappliance.
Accesstoaresourcecanbebasedonseveralcriteria.Mostrulescontrolaccessbasedonwhotheuseris—that
is,theuser’snameor
groupmembership—andthedestinationresource.Youcanuseothercriteriainaccess
controlrules,suchastheaccessmethodforaresource,theuser’snetworkaddress,thezoneoftrust,orthe
dateandtimeoftheconnectionrequest.
Theappliancegivesyouwidelatitudeincreatingaccesscontrolrules,depending
onwhetheryourorganization’s
securitypolicyisrelativelypermissiveordemandsstringentcontrol.Forexample,ifyourVPNisaccessedonly
byhighlytrustedemployeeswhoareusingcomputersmanagedbyyourITdepartment,youcouldcreatean
openaccesspolicythatdefinesyourentirenetworkdomainasaresource
andgrantsbroadaccesstoyour
employees.
Conversely,ifyouareprovidingaccesstoadiversegroupofuserswithvaryingdeg reesofaccessprivileges,or
whoconnectfromless‐securedevicessuchaspublickiosks,youmightuseanaccesspolicythatdefines
individualresourcesand establishesmoregranularaccess
requirements.
Asthenetworkchangesovertime,soshouldyouraccesscontrolrules.