
SonicWallSMAConnectTunnel12.0DeploymentPlanningGuide
Contents
0
3
AboutthisGuide....................................................................5
OrganizationofthisGuide..............................................................5
GuideConventions....................................................................5
AboutSonicWallSMAConnectTunnel..................................................6
AbouttheSMAAppliance...............................................................6
KeySSLVPNConceptsandSMAFeatures..................................................6
Resources........................................................................7
UsersandGroups..................................................................7
Authentication....................................................................7
Communities.....................................................................8
AccessPolicy......................................................................8
EndPointControl(EPC).............................................................9
SSLandEncryption.................................................................9
SingleSign‐On....................................................................10
SharingConfigurationData.........................................................10
Role‐basedAdministration.........................................................10
SystemMonitoringandLogging.....................................................10
SonicWallSMAComponents...........................................................11
ClientComponentsandAccessMethods..............................................11
WorkPlace.......................................................................11
PlanningYourVPN.................................................................15
AboutDesigningYourVPN.............................................................15
WhoWillAccessYourVPN?........................................................15
WhichTypesofResourcesShouldUsersHaveAccessTo?................................16
SecurityAdministration............................................................18
EndPointControl.....................................................................22
AdvancedEPC....................................................................23
PuttingItAllTogether:UsingRealmsandCommunities.....................................23
CommonVPNConfigurations.........................................................25
AbouttheConfigurations..............................................................25
DeploymentScenario:RemoteAccessforEmployeesandPartners............................25
EstablishinganAuthenticationRealm................................................26
IdentifyingUsers.................................................................30
AddingResources.................................................................31
CreatingZonesofTrust............................................................31
CustomizingWorkPlace................................................................33
CreatinganEmployeeCommunity...................................................35
CreatingaPartnerCommunity......................................................38
AccessControlLists...............................................................39
Testi n gtheDeploymentScenario........................................................40
OtherRemoteAccessVPNScenarios.....................................................40
Contents