- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Re: How to control traffic from remote offices
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How to control traffic from remote offices
Hi, I need some tips/recommendations how to control access from remote offices.
Today one main headquarter with all servers behind with two 3200.
20 small remote offices using 730 SMB firewalls with VPN to the 3200.
I want to control so only Windows AD joined computers have full access through the vpn tunnel.
All other devices should have limited access, for example printers, thin clients etc.
I can see 3 different approaches:
1. Control the vpn traffic in the 3200 firewall with user awareness.
2. Control the vpn traffic in the 730 firewalls (I think they also have user awareness with an Active Directory connection)
3. Setup 802.1x wired authentication in all remote switches and control the traffice with different vlans.
What would you do and why?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Maarten,
Ok so If I enable Identity Awareness on the 3200 firewall and configure Active Directory as an Identity source it can control the vpn traffic that is initiated from a domain-joined computer in the remote office?
I thought it only could control traffic initiated from behind the 3200 firewall.
If it is correct then it is a simple good solution.
Do I need Identity Agens on every remote computers or will it work with clientless Activie Directory queries?
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The VPN should not have the box 'allow all traffic' ticked (Wire Mode)
The 3200 needs to be looking at all traffic passing through it. When this is correctly set the 3200 will check all traffic and you should be ok.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just to expand on this then as you are looking at using Active Directory joined machines then after setting up the IA Collectors then make sure that in the Access Roles that you create that not only do you specify Users but also specify Machines.
The Default Machines setting is Any Machine. If want to enforce AD joined machines then make sure that use the
Specific machines/groups
rather then
Any Machine.
That way the machine must be part of the group(s) that add so would have to be AD joined.
So would be controlling to users over the VPN to specific resources and would have to be from specific machines.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks
But do I need to deploy the Identity Agent och every computer?
![](/skins/images/AB448BCC84439713A9D8F01A2EF46C82/responsive_peak/images/icon_anonymous_message.png)