EasyManua.ls Logo

SonicWALL SMA - End Point Control (EPC); SSL and Encryption

SonicWALL SMA
48 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SonicWallSMAConnectTunnel12.0DeploymentPlanningGuide
AboutSonicWallSMAConnectTunnel
9
EndPointControl(EPC)
TraditionalVPNsolutionstypicallyprovideaccessonlyfromtherelativesafetyofanITmanageddevice.Inthat
environment,themajorsecurityconcernisunauthorizednetworkaccess.BecauseanSSLVPNenablesaccess
fromanyWebenabledsystem,itmaybringtheadditionalriskofcomputersinuntrustedenvironments,suchas
akioskatanairportorhotel,oranemployeeownedcomputer.
Theappliance’sEPCconfigurationoptionsgiveyougranularcontroloverVPNaccessusingprofilesandzonesto
protectsensitivedataandensurethatyournetworkisnotcompromised:
Adeviceprofileisasetofattributesthatcharacterize
thedevicerequestingtheconnection,suchasa
Windowsdomainname,thepresenceofacertainsoftwareprogram,aregistryentry,orotherunique
characteristics.
AnapplicationaccesszoneisasetofattributesusedtoestablishatrustrelationshipwithaclientiOSor
Androiddevice.
AnEndPointControl
zoneclassifiesaconnectionrequestbasedonthepresenceorabsenceofadevice
profile.Thezoneinwhichadeviceisthenplacedcontrolstheprovisioningofdataprotection
componentsandcanbeusedtodeterminewhichresourcesareavailable.Adevicecanbeplacedina
Standardzone,
aQuarantinezone(withinstructionsoninstallingtherequiredsecurityprograms),orina
Denyzone,wheretheuserisdeniedaccesstothenetwork.
SSLandEncryption
TheSonicWallSMAapplianceencryptsinformationusingtheSecureSocketsLayer(SSL)protocol.SSLprotocolis
anauthenticationandencryptionprotocolthatusesakeyexchangemethodtoestablishasecureenvironment
inwhichalldataexchangedisencryptedtoprotectitfromeavesdroppingandalteration.
TheapplianceusesSSLce rtificates
tovalidatetheappliance’sidentitytoconnectingusers,andtoprovidea
publickeytosecureinformationthattheclientcomputersendstotheserver.Theappliancerequiresa
minimumoftwoSSLcertificates:
Theapplianceservicesuseacertificatetosecureusertraffic.
TheApplianceManagementConsole(AMC)uses
acertificatetosecuremanagementtraffic.
Therearetwotypesofcertificates:selfsignedand commercial.Withaselfsigned SSLcertificate,theappliance
identifiesitselfwithacertificatethathasnotbeensignedbyacommercialCA,andtheassociatedprivatekey
dataisencryptedusingapassword.AMC uses
aselfsignedcertificate.
Aselfsignedcertificatecanalsobeawi ldcardcertificate,allowingittobeusedbymultipleserverswhichshare
thesameIPaddressandcertificate,buthavedifferentFQDNs.Forexample,awildcardcertificatesuchas
*.company.comcouldbeusedforiPhoneaccessatand
forVPNaccessatvpn.company.com.
YoucanalsoconfigureanauthenticationservertotrustanintermediateCA.Forexample,youcouldcreatea
rootcertificatesigningauthorityonasystemthatisnotconnectedtothecorporatenetwork.Youcanthenissue
asetoftrustedintermediatesigningauthoritycertificatesto
bedeployedinvarioussectorsofthenetwork
(oftenbydepartmentororganizationalunit).
AlthoughaselfsignedSSLcertificateissecure,youmaywanttosecureusertr afficwithacertificatefroma
commercialcertificateauthority(CA)suchasVeriSign.
Whendecidingwhichtype ofcertificatetousefor
theservers,considerwhowi llbeconnectingtotheappliance
andhowtheywilluseresourcesonyournetwork:
IfbusinesspartnersareconnectingtoWebresourcesthroughtheappliance,theywilllikelywantsome
assuranceofyouridentitybeforeperformingatransactionorprovidingconfidentialinformation.Inthis
case,you
wouldprobablywanttoobtainacertificatefromacommercialCAfortheappliance.

Table of Contents

Related product manuals