Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
81
Resource Type Support
The following table describes the types of applications or resources you can access for each method of
connecting to the SMA/SRA appliance.
Integration with Dell SonicWALL Products
The SMA/SRA appliance integrates with other Dell SonicWALL products, complementing the Dell SonicWALL NSA,
SuperMassive (9000 Series) and TZ Series product lines. Incoming HTTPS traffic is redirected by a Dell SonicWALL
firewall appliance to the SMA/SRA appliance. The SMA/SRA appliance then decrypts and passes the traffic back
to the firewall where it can be inspected on its way to internal network resources.
Typical Deployment
The SMA/SRA appliance is commonly deployed in tandem in one-armed mode over the DMZ or Opt interface on
an accompanying gateway appliance, for example, a Dell SonicWALL network security appliance, such as a NSA
4600.
This method of deployment offers additional layers of security control plus the ability to use Dell SonicWALL’s
Unified Threat Management (UTM) services, including Gateway Anti-Virus, Anti-Spyware, Content Filtering and
Intrusion Prevention, to scan all incoming and outgoing NetExtender traffic. Dell SonicWALL recommends one-
armed mode deployments over two-armed for the ease-of-deployment and for use in conjunction with UTM
GAV/IPS for clean VPN.
As shown in
, in one-armed mode the primary interface (X0) on the SMA/SRA appliance connects to an
available segment on the gateway device. The encrypted user session is passed through the gateway to the
SMA/SRA appliance (step 1). The SMA/SRA appliance decrypts the session and determines the requested
resource. The Secure Mobile Access session traffic then traverses the gateway appliance (step 2) to reach the
internal network resources. While traversing the gateway, security services, such as Intrusion Prevention,
Gateway Anti-Virus and Anti-Spyware inspection can be applied by appropriately equipped gateway appliances.
The internal network resource then returns the requested content to the SMA/SRA appliance through the
gateway (step 3) where it is encrypted and returned to the client.
Table 19. Supported application and resource types
Access Mechanism
Access Types
Standard Web browser
•
Files and file systems, including support for FTP and Windows Network
File Sharing
•
Web-based applications
•
Microsoft Outlook Web Access and other Web-enabled applications
•
HTTP and HTTPS intranets
NetExtender
•
Any TCP/IP based application including:
•
Email access through native clients residing on the user’s laptop
(Microsoft Outlook, Lotus Notes, and so on.)
•
Commercial and home-grown applications
•
Flexible network access as granted by the network administrator
Downloadable ActiveX or Java
Client
•
An application installed on desktop machines or hosted on an
application server, remote control of remote desktop or server
platforms
•
Terminal services, RDP, VNC, Telnet, SSH, and Citrix