Unlike traditional networking tools that require complex and often incompatible configurations (such as VPN profiles, segmentation rules, PAC files, etc. to route and inspect traffic), SonicWall only requires administrators to specify services and policies for their workforce. SonicWall then automatically selects the appropriate mechanism to securely connect a user to the resource they need to access and to enforce the requisite security policies.
Routing Framework
SonicWall Cloud Secure Edge routing framework is applied at different layers of the networking stack:
When Internet Threat Protection (ITP) is enabled, Cloud Secure Edge automatically updates the routing logic on a device to secure access to internet resources as well as private resources.
DNS determines how a domain name is resolved to an IP address, and is configured as follows:
Additional reading:
Cloud Secure Edge makes a decision about whether to route a packet over a tunnel or directly to the internet:
Additional reading:
The Edge comprises of identity-aware reverse proxies as well as a TLS-inspection forward proxies that enforce least-privilege-access.
Additional reading:
SonicWall Cloud Secure Edge issues short-lived cryptographic credentials - SAML and OIDC tokens, X.509 and SSH certificates - that can be used for application authentication.
Additional reading:
A few other scenarios that SonicWall supports that are not explicitly called out in the framework above are noted here:
Users without a CSE client cannot set up Service Tunnel-based connectivity. In this scenario, you can use CSE’s published services capability. Published services resolve via public DNS servers and are proxied through the Edge, which terminates TLS using trusted Let’s Encrypt certificates and enforces application-layer policies.
CSE can be used to enforce policies at a site level in addition to enforcing policies at the user & device level. A site is a single network location, with a fixed IP address, associated with the Connector component. The Connector forwards traffic to the Global Edge Network where site-based policies are enforced.
CSE can operate seamlessly atop an existing L3 VPN. Typically, traffic to published services flows over the public internet. However, you can configure private or public DNS so traffic will flow over your L3 VPN tunnel instead of the public internet.
CSE can operate seamlessly in secure networks that require all web traffic to be inspected by a web proxy. The desktop app and Access Tier both respect the OS’s http_connect proxy setting, and so can communicate with the Cloud Command Center.