Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

SonicWall authentication numbers

Posted on 2010-11-13
7
Medium Priority
?
992 Views
Last Modified: 2012-05-10
The SonicWall appliance NSA 2400 has an internal database of 250 users.  Now it also allows for LDAP authentication.  I would like to know, if I was using LDAP authentication for my users on the network and they all had bandwidth quota's, does the 2400's internal 250 user database play a role in how many users can store their quota data on the appliance?
0
Comment
Question by:hbcit
  • 4
  • 3
7 Comments
 
LVL 33

Expert Comment

by:digitap
ID: 34127617
can you ask your question in a different way "...does the 2400's internal 250 user database play a role in how many users can store their quota data on the appliance?"...I don't understand what you are asking?

what quota data are you referring to?
0
 

Author Comment

by:hbcit
ID: 34127700
Ok, I have broken down the question as much as possible.  I hope it is better understood.

1.  The 2400 has an internal database of 250 users.  Which I assume means 250 users can be created on the NSA 2400.
2.  The 2400 allows for bandwidth quota's to be setup per user.  A bandwidth quota would be for example 5GB of internet banwidth per user.  Once a user's banwidth is finished, there is a  consequence, eg, no more internet for that user.
3.  The 2400 allows users to access the internet with LDAP authentication.  So when they communicate through the 2400, it will ask them for a username and password from an LDAP server.

So, with a practical example.  I have 500 users and they all need LDAP authentication to access the web through the NSA 2400.  They all need to have internet bandwidth quotas associated with their usernames (which means their information must be stored on the NSA 2400), so I am concerned that the 2400 will be too small for my needs due to the internal database having a 250 max?
0
 
LVL 33

Accepted Solution

by:
digitap earned 2000 total points
ID: 34127953
ah...i understand.  you can create a sonicwall group and assign the ldap users to that group and assign your bandwidth accordingly.  if you have several ldap users that have different bandwidth needs, you can create different sonicwall groups to fill those needs.  i beleive you can also create AD groups, put those groups in the sonicwall groups, and add the users to the AD groups.  there are different ways to do this.  my primary point here is you don't have to have a one to one sonicwall user to AD user.  make sense?

also, thanks for the clarification.
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 

Author Comment

by:hbcit
ID: 34128014
Thanks, that is a relief.  I appreciate your response.
0
 
LVL 33

Expert Comment

by:digitap
ID: 34128076
sure...when i get back to my confuser, i'll dig up a KB for you.  what model of sonicwall do you have?  also, what is the version of firmware and is it standard or enhanaced?
0
 

Author Comment

by:hbcit
ID: 34128127
I am still considering the 2400 for purchase.  I have been reading up on it, and when I came to the internal database issue, I was thinking I would need to buy the 4500 instead due to it having more user support (1000).  As my needs for concurrent internet users is below 100, I didn't really wish to purchase the larger unit.  Thanks.
0
 
LVL 33

Expert Comment

by:digitap
ID: 34128305
i see...you don't have the sonicwall yet.  cool.  when you make your purchase post back here and i'll get you the KB.
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question