Welcome to SonicWall Cloud Secure Edge (CSE). The articles in this section provide the steps to prepare your environment and deploy Cloud Secure Edge.
Before proceeding, ensure that you have the following:
A private network or a private service that you’d like to be able to access remotely.
A computer on this network that can make outbound HTTPS (port 443) connections and outbound UDP connections to the CSE Global Edge Network (ports in the range of 21000 - 59999).
A back up of your Gen7 (or later version) firewall, if you have an existing firewall that you would like to use.
Register CSE activation keys in MySonicWall.
1.1 Do you have an existing identity provider for your end users?
If yes, then configure your IDP in Cloud Secure Edge:
If not, then use Cloud Secure Edge’s Local User Management to get started.
SonicWall Cloud Secure Edge offers two deployment models for access to your organization’s private resources: Self-hosted Private Edge and Global Edge. In most cases, your org will be provisioned so you can use one or both deployment models. Most of our customers will be using the Global Edge deployment model, and therefore deploying a Connector to connect their network.
2.1 Do you have a Gen 7 (or later version) firewall?
If yes, then install the Cloud Secure Edge Connector on your Gen 7 firewall.
If not, then install the Connector on Cloud Secure Edge infrastructure.
Below, we’ve outlined the most common use cases for Cloud Secure Edge.
3.1 Pick your path:
Set up Remote Access - Secure Private Access license required
Block Malicious Content -Secure Internet Access license required
Protect SaaS Apps - Secure Private Access license required
Check Devices Security Posture - Secure Private Access license required
Set up ZTNA - Secure Private Access Advanced license required
For a deeper understanding of Cloud Secure Edge licenses, see our licenses doc.
The Cloud Secure Edge admin console offers a one-time guided onboarding set-up for orgs that meet the following conditions:
If you want to set up a Service Tunnel (i.e., set up remote access) using CSE, this guided onboarding set up will help you accomplish that.
Note: If the admin directly exits the Guided Onboarding Set Up (i.e., clicks Exit at any given point), they will not be able to return to the Onboarding Set Up; if the admin indirectly exits the Guided Onboarding Set Up (i.e., closes their browser), the Onboarding Set Up will be available exactly where they left off.
Use Cloud Secure Edge to set up a remote access VPN for your organization
1.1 On the Publish a Service Tunnel doc, navigate from Steps to Publish a Service Tunnel > Step 1: Create a Tunnel Policy. Follow this step to create a Service Tunnel Policy in your org.
1.2 Is SCIM enabled in your org?
If yes, then directly assign your users to the Service Tunnel Policy.
If not, then instruct your end users to log into the CSE app and register their devices; Afterward, assign your end users to the Service Tunnel Policy.
2.2 Apply the Tunnel Policy (created above in Step 1.1) to the tunnel, so that your end users can access the Service Tunnel.
Use Cloud Secure Edge to block users in your org from encountering malicious internet content
1.1 Create an ITP policy.
1.2 Is SCIM enabled in your org?
If yes, then directly assign users to your ITP policy.
If not, then instruct end users to log into the CSE app and register their devices; Afterward, assign your end users to the policy.
2.1 On the Managing Internet Threat Protection Policies doc, navigate to the Exclude Users from ITP Policies section to learn how to exclude specific users in your org from the ITP policy.
Use Cloud Secure Edge provide protected access to your org's SaaS apps
1.1 On the Publish a Service Tunnel doc, navigate from Steps to Publish a Service Tunnel > Step 1: Create a Tunnel Policy to create an access policy. This access policy determines which of your end users can access your Service Tunnel.
1.2 Is SCIM enabled in your org?
If yes, then directly assign users to your Tunnel policy.
If not, then instruct end users to log into the CSE app and register their devices; Afterward, assign your end users to the Service Tunnel policy.
2.2 Configure a SaaS app (via allowing IPs) in your Service Tunnel configuration: On the Publish a Service Tunnel doc (linked above in Step 2.1), navigate to Network Settings and see Step 2.4 for how to configure a SaaS app.
Use Cloud Secure Edge to provide users in your org with granular access to protected services
1.1 On the Register a Hosted Website to Users doc, navigate to Steps to create a hosted website > Step 1: Create a policy for web access. Follow this step to create a web access policy.
1.2 Is SCIM enabled in your org?
If yes, then directly assign users to your access policy.
If not, then instruct end users to log into the CSE app and register their devices; Afterward, assign your end users to the policy.
2.1 On the Register a Hosted Website to Users doc, complete Step 2 and 3.
Use Cloud Secure Edge to provide users in your org with granular access to protected services
1.1 Follow the steps outlined on the Trust Profile doc to learn about how Trust Profiles function.
2.1 Use any implementation of a Trust Profile configuration (e.g., the Application Check Trust Factor) as a template for how to configure a Trust Profile to check your devices’ security posture.