![]() ![]() Note The most specific policy will take precedence over less specific policies. If you do not create policies for your SRA appliance, then all NetExtender users may be able to access all resources on your internal network(s).Īdditional allow and deny policies may be created by destination address or address range and by service type. This is the opposite of the default behavior of Dell SonicWALL Unified Threat Management (UTM) appliances, where all inbound traffic is denied by default. Note With group access policies, all traffic is allowed by default. IPv4 and IPv6 routes both follow these rules. User-level NX routes must always be pushed to the NX client, and global routes must still depend on the “Add Global NetExtender Client Routes” option as they did before. Group-level NetExtender routes should be assigned from both primary and additional groups if the user-level option to “Add Group NetExtender Client Routes” is enabled. The NetExtender client routes are passed to all NetExtender clients and are used to govern which private networks and resources remote user can access via the SRA connection. The NetExtender > Client Routes page allows the administrator to add and configure client routes. This section provides an overview of the NetExtender > Client Routes page and a description of the configuration tasks available on this page. ![]()
0 Comments
Leave a Reply. |