SonicWALL SRA 1200 5U 01-SSC-6063 Manuale Utente

Codici prodotto
01-SSC-6063
Pagina di 4
SonicWALL Secure Remote Access Solutions
Technician
Customer
Unified Threat
Management
Scanning
Other 
Desktops
Other 
Servers
and 
Applications
Corporate LAN
Citrix 
XenApp and 
Microsoft 
Terminal Servers
1
3
3
2
SonicWALL
NSA or TZ
Firewall
Files and 
Applications
Intranet
Decrypted 
Traffic
User
Desktop
Remote User
Encrypted SSL Traffic
SonicWALL
SRA Appliance
SonicWALL SRA Appliance
Personalized
Web Portal
Internet
Internet
RSA*, 
Vasco*, 
Active 
Directory, 
RADIUS, 
LDAP 
or local 
database
Step 2:
When browser is 
opened, the user is 
redirected to the 
appliance and 
prompted for 
authentication.
LAN
Encrypted Traffic
Firewall
WLAN
DMZ/SSL VPN
Wireless User
AD Server
Workstations
SonicPoint-N
Wireless Authentication
The SonicWALL appliance 
can be configured to 
authenticate WLAN users, 
granting them access to 
internal resources while 
keeping the session 
secure. The benefit to 
this method of acccess 
is “clientless” access 
from the WLAN.
Step 1:
Wireless user 
obtains DHCP 
lease on the 
WLAN 
network.
Step 3:
Once authenticated, the user can open a 
NetExtender session which will create a 
“tunnel all” route from the client’s system 
to the appliance. The user will be given a 
NetExtender client subnet and can now 
access internal and external resources.
 
SonicWALL 
SRA Appliance
SonicWALL 
SRA Appliance
NetExtender Client 
running SonicWALL Agent
Location 1
Location 5
Location 2
Location 4
Location 3
Local Client
Hub/
Switch
SonicWALL CDP Appliance
Local Area Network
VPN
Router/
Modem
Internet
Internet
4
Technician
Customer
Unified Threat
Management
Scanning
Other 
Desktops
Other 
Servers
and 
Applications
Corporate LAN
Citrix 
XenApp and 
Microsoft 
Terminal Servers
1
3
3
2
SonicWALL
NSA or TZ
Firewall
Files and 
Applications
Intranet
Decrypted 
Traffic
User
Desktop
Remote User
Encrypted SSL Traffic
SonicWALL
SRA Appliance
SonicWALL SRA Appliance
Personalized
Web Portal
Internet
Internet
RSA*, 
Vasco*, 
Active 
Directory, 
RADIUS, 
LDAP 
or local 
database
Step 2:
When browser is 
opened, the user is 
redirected to the 
appliance and 
prompted for 
authentication.
LAN
Encrypted Traffic
Firewall
WLAN
DMZ/SSL VPN
Wireless User
AD Server
Workstations
SonicPoint-N
Wireless Authentication
The SonicWALL appliance 
can be configured to 
authenticate WLAN users, 
granting them access to 
internal resources while 
keeping the session 
secure. The benefit to 
this method of acccess 
is “clientless” access 
from the WLAN.
Step 1:
Wireless user 
obtains DHCP 
lease on the 
WLAN 
network.
Step 3:
Once authenticated, the user can open a 
NetExtender session which will create a 
“tunnel all” route from the client’s system 
to the appliance. The user will be given a 
NetExtender client subnet and can now 
access internal and external resources.
 
SonicWALL 
SRA Appliance
SonicWALL 
SRA Appliance
NetExtender Client 
running SonicWALL Agent
Location 1
Location 5
Location 2
Location 4
Location 3
Local Client
Hub/
Switch
SonicWALL CDP Appliance
Local Area Network
VPN
Router/
Modem
Internet
Internet
4
Technician
Customer
Unified Threat
Management
Scanning
Other 
Desktops
Other 
Servers
and 
Applications
Corporate LAN
Citrix 
XenApp and 
Microsoft 
Terminal Servers
1
3
3
2
SonicWALL
NSA or TZ
Firewall
Files and 
Applications
Intranet
Decrypted 
Traffic
User
Desktop
Remote User
Encrypted SSL Traffic
SonicWALL
SRA Appliance
SonicWALL SRA Appliance
Personalized
Web Portal
Internet
Internet
RSA, 
VASCO, 
Active 
Directory, 
RADIUS, 
LDAP 
or local 
database
Step 2:
When browser is 
opened, the user is 
redirected to the 
appliance and 
prompted for 
authentication.
LAN
Encrypted Traffic
Firewall
WLAN
DMZ/SSL VPN
Wireless User
AD Server
Workstations
SonicPoint-N
Wireless Authentication
The SonicWALL appliance 
can be configured to 
authenticate WLAN users, 
granting them access to 
internal resources while 
keeping the session 
secure. The benefit to 
this method of acccess 
is “clientless” access 
from the WLAN.
Step 1:
Wireless user 
obtains DHCP 
lease on the 
WLAN 
network.
Step 3:
Once authenticated, the user can open a 
NetExtender session which will create a 
“tunnel all” route from the client’s system 
to the appliance. The user will be given a 
NetExtender client subnet and can now 
access internal and external resources.
 
SonicWALL 
SRA Appliance
SonicWALL 
SRA Appliance
NetExtender Client 
running SonicWALL Agent
Location 1
Location 5
Location 2
Location 4
Location 3
Local Client
Hub/
Switch
SonicWALL CDP Appliance
Local Area Network
VPN
Router/
Modem
Internet
Internet
4
Remote Access Solution
With an increasingly mobile workforce and greater threats of 
unexpected disruptions, remote access has become a business 
necessity. A SonicWALL SRA appliance deployed in one-arm mode 
alongside a SonicWALL firewall or virtually any other third-party 
firewall enables remote users to access corporate network resources 
securely from anywhere outside the LAN.
Remote Support Solution
With more employees working remotely and customers dispersed 
globally, it is becoming increasingly important for organizations to 
provide remote support for off-site business devices such as laptops 
and home PCs. Ineffective support using expensive and cumbersome 
tools can undermine IT service level agreements and inhibit remote 
worker productivity. SonicWALL Virtual Assist is a remote support tool for 
distributed businesses and service providers that enables a technician to 
assume control of a customer’s Windows, Macintosh or Linux computer. 
Over a web browser, customers can give technicians instant permission to 
chat, transfer files, access and reboot their computer remotely to diagnose 
and fix problems.
Web Application Firewall and PCI Compliance
The SonicWALL Web Application Firewall Service offers businesses  a complete, affordable, 
well integrated compliance solution for web-based applications that is easy to manage and 
deploy. It supports OWASP Top Ten and PCI DSS compliance, providing protection against 
injection and cross-site scripting attacks (XSS), credit card and Social Security Number theft, 
cookie tampering and cross-site request forgery (CSRF). Dynamic signature updates and 
custom rules protect against known and unknown vulnerabilities. Web Application Firewall 
can detect sophisticated web-based attacks and protect web applications (including SSL 
VPN portals), deny access upon detecting web application malware, and redirect users to an 
explanatory error page. It provides an easy-to-deploy offering with advanced statistics and 
reporting options for meeting compliance mandates.
Clean VPN Remote Access Solution
More corporations, universities, hospitals and governmental 
organizations are implementing wireless networks and using SSL 
VPN as a secure and centralized access control solution. SonicWALL 
SSL VPNs integrate seamlessly with SonicWALL wireless access 
solutions. When deployed alongside a SonicWALL firewall (running 
Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, and 
Application Intelligence and Control), and several SonicPoints, a 
SonicWALL SSL VPN solution ensures that users get access from 
anywhere on campus and the wireless connections are encrypted 
via the SSL protocol. As an added bonus, remote workers away 
from campus can connect into the corporate network via an SSL 
VPN connection. IT maintains centralized, granular access control 
over who can access what resources using a single gateway.
Incoming HTTPS traffic is seamlessly forwarded by the SonicWALL NSA or TZ Series firewall  
to the SonicWALL SRA appliance, which decrypts and authenticates network traffic.
Users are authenticated using the onboard database or through third-party authentication methods 
such as RSA, VASCO, RADIUS, LDAP, Microsoft Active Directory or Windows NT Domain.
A personalized web portal provides access to only those resources that the user is authorized to view based  
on company policies.
To create a Clean VPN environment, traffic is passed through to the NSA or TZ Series firewall (running Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, and Application  
Intelligence and Control), where it is fully inspected for viruses, worms, Trojans, spyware and other sophisticated threats.
1
2
3
4