Secure Mobile Access 12.4 Deployment Guide
- Secure Mobile Access
- About this Guide
- About SonicWall Secure Mobile Access
- Planning Your VPN
- Common VPN Configurations
- About the Configurations
- Deployment Scenario: Remote Access for Employees and Partners
- Customizing WorkPlace
- Testing the Deployment Scenario
- Other Remote Access VPN Scenarios
- Additional Partner VPN Scenarios
- End Point Control Scenarios
- Access Policy Scenarios
- Application-Specific Scenarios
- Authentication Scenarios
- Access Component Provisioning
- SonicWall Support
Access Control Lists
In general, access rules define which resources can be accessed by which users. They can be defined very broadly (all the users in Group X have access to any corporate resource), or very narrowly (the users in Group Y have Web-only access to a single resource).
In our example, we’ll keep it simple and give the Partners community access to the resource named VAR marketing collateral, and give Employees access to all of the resources. The appliance evaluates the rules in numbered order. If a match is found, the permit or deny action is applied and no further rules are evaluated.
Was This Article Helpful?
Help us to improve our support portal