
Scenario B: SRA on an Existing DMZ
SonicWALL UTM Appliance
X1 |
| E7500 |
|
OPT, X2, etc | X0 |
| |
|
|
| |
Router | Switch | Switch |
|
Remote Users | X0 |
| Network Nodes |
|
|
| |
|
| SRA 1200 |
|
| SRA Appliance |
|
|
WAN |
| DMZ | LAN |
Scenario C: SRA on the LAN |
|
| |
| Existing Gateway Device |
|
|
| or Switch / Hub |
|
|
|
| LAN Port |
|
Internet |
|
|
|
Router |
|
|
|
Remote Users |
| X0 |
|
|
|
| |
|
| SRA 1200 |
|
| SRA Appliance |
| |
WAN |
| LAN |
SonicWALL SRA 1200/4200 Deployment Scenarios
| Gateway | Deployment |
| Conditions or |
| Device | Scenario |
| Requirements |
|
|
|
| |
SonicOS Enhanced | SRA on a New DMZ | • | OPT or unused interface | |
3.1 or higher: |
| • | New DMZ configured for | |
• | TZ Series |
|
| NAT or Transparent Mode |
• | PRO Series |
|
|
|
• | NSA | SRA on Existing | • | No unused interfaces |
| (SonicOS | DMZ | • | One dedicated interface in |
| 5.0+) |
|
| use as an existing DMZ |
• | NSA Series |
|
| |
|
|
| ||
| (SonicOS | SRA on the LAN | • | No unused interfaces |
| 5.0+) |
| • | No dedicated interface for |
|
|
|
| a DMZ |
|
|
|
| |
SonicOS Standard | SRA on a New DMZ | • | Open OPT or X2 interface | |
3.1 or higher: |
| • | New DMZ configured for | |
• | TZ Series |
|
| either NAT or Transparent |
• | PRO Series |
|
| Mode |
|
|
| • | Provide SonicWALL deep |
|
|
|
| packet inspection security |
|
|
|
| services (optional) |
|
|
|
|
|
|
| SRA on Existing | • | OPT or X2 interface in use |
|
| DMZ |
| with an existing DMZ |
|
|
| • | Provide SonicWALL deep |
|
|
|
| packet inspection security |
|
|
|
| services (optional) |
|
|
|
| |
SonicOS Standard | SRA on the LAN | • | Not planning to use | |
3.1 or higher: |
|
| SonicWALL deep packet | |
• | TZ Series |
|
| inspection security |
• | PRO Series |
|
| services |
SonicWALLs with |
| • | Interoperability with a | |
|
| |||
legacy firmware |
|
| ||
|
|
| ||
Device |
|
|
|
Page 8 Selecting a Deployment Scenario