Dell SonicWall VPN serverA 'how to on installing a Dell
SonicWall VPN server implementing a HTTPS tunnel
Implementing SSL/TLS, HTTPS, and SSH is a matter of
configuring clients, servers, and network
infrastructure. Selectoneof thethreeprotocols and create a one
page plan for implementing it for a generic organization. For
example, you could choose installation of a Dell SonicWall
Virtual Private Network (VPN) server that implements an
HTTPS tunnel. Your plan would include general instructions for
installing the SonicWall security appliance, configuring it to
access authentication information from an existing LDAP
database (Windows Active Directory would work), defining
authorized users, and setting permissions to allow them to use
the VPN. Include a simple network diagram showing notional IP
addresses and port numbers (an HTTPS VPN would use TCP
port 443.) Please note the plan doesn't have to be a highly
detailed, step by step checklist. All I am looking for is a general
explanation of the work that needs to be done to implement the
protocol for a particular application.

Dell SonicWall VPN serverA how to on installing a Dell SonicWall .docx

  • 1.
    Dell SonicWall VPNserverA 'how to on installing a Dell SonicWall VPN server implementing a HTTPS tunnel Implementing SSL/TLS, HTTPS, and SSH is a matter of configuring clients, servers, and network infrastructure. Selectoneof thethreeprotocols and create a one page plan for implementing it for a generic organization. For example, you could choose installation of a Dell SonicWall Virtual Private Network (VPN) server that implements an HTTPS tunnel. Your plan would include general instructions for installing the SonicWall security appliance, configuring it to access authentication information from an existing LDAP database (Windows Active Directory would work), defining authorized users, and setting permissions to allow them to use the VPN. Include a simple network diagram showing notional IP addresses and port numbers (an HTTPS VPN would use TCP port 443.) Please note the plan doesn't have to be a highly detailed, step by step checklist. All I am looking for is a general explanation of the work that needs to be done to implement the protocol for a particular application.