Using File Shares

Step 3 Click the New Bookmark tab in the portal page.

Step 4 The Add Bookmark screen displays. Enter a friendly name for the bookmark in the Bookmark Name field.

Step 5 Enter the IP address and file directory path to the File Share in the Name or IP Address field.

Note When using the Java applet, the Name or IP Address field must be to a file directory and end with a / or \ character.

Step 6 In the Service pull down menu, select the File Shares (CIFS) option.

Step 7 Check the Use File Shares Java Applet box to enable the File Shares Applet for this bookmark. Leaving this box unchecked means the portal will launch the original HTML browser when the bookmark is selected.

Step 8 Optionally, select Automatically log in to log in to this file share using either your SSL VPN credentials or by specifying custom credentials.

Step 9 Click Add.

Bookmark serve as useful shortcuts to quickly access different network locations. Bookmarks can also be set up from the File Shares Browser, either by clicking the Bookmark button, or using the bookmark option from the right-click menu.

SonicWALL SSL VPN 5.0 User Guide

99

Page 99
Image 99
SonicWALL SSL VPN 5.0 manual Click Add

SSL VPN 5.0 specifications

SonicWALL SSL VPN 5.0 is a powerful solution designed to provide secure remote access to organizations while ensuring robust security for their networks. This version builds upon previous iterations, incorporating advanced technologies and features that cater to both enterprise and small business needs.

One of the main features of SonicWALL SSL VPN 5.0 is its user-friendly web portal. The portal is accessible from any device with a web browser, allowing users to connect seamlessly to corporate resources without the need for client software installation. This flexibility is particularly beneficial for remote workers who may be using public or personal devices.

The SSL VPN 5.0 also supports multiple authentication methods, enhancing security while maintaining ease of access. It includes support for two-factor authentication (2FA), which adds an extra layer of protection during the login process. Administrators can configure various authentication schemes, including RSA SecurID, LDAP, RADIUS, and more, to meet organizational security policies.

Another notable characteristic of SonicWALL SSL VPN 5.0 is its scalable architecture. Organizations can easily expand their VPN capabilities as their workforce grows. The solution supports a large number of concurrent connections, ensuring that businesses can accommodate an increasing number of remote users without compromising performance.

SonicWALL SSL VPN 5.0 also emphasizes security features that protect both user data and the corporate network. It leverages strong encryption protocols, ensuring that all data transmitted between users and the network is secure from eavesdropping or interception. The solution employs SSL (Secure Sockets Layer) technology, which is widely recognized for its robust security measures.

In addition to security, SonicWALL SSL VPN 5.0 provides comprehensive access control options. Administrators can create policies that restrict user access based on roles or groups, making it easier to manage permissions and safeguard sensitive information. This granular control helps organizations enforce compliance with regulatory standards.

Moreover, the solution includes advanced logging and reporting capabilities that allow administrators to monitor user activity and access patterns. This insight not only aids in troubleshooting but also helps to identify potential security threats.

SonicWALL SSL VPN 5.0 stands out with its integration capabilities. It can work harmoniously with existing network infrastructures, including firewalls, to create a cohesive security strategy. By utilizing the SonicWALL global management system, IT teams can manage and monitor their VPN and other security solutions from a central location.

Combining ease of use, robust security, and comprehensive management capabilities, SonicWALL SSL VPN 5.0 is a compelling choice for organizations seeking to enable secure remote access while protecting their critical assets against emerging threats.