Solved

SonicWall authentication numbers

Posted on 2010-11-13
7
949 Views
Last Modified: 2012-05-10
The SonicWall appliance NSA 2400 has an internal database of 250 users.  Now it also allows for LDAP authentication.  I would like to know, if I was using LDAP authentication for my users on the network and they all had bandwidth quota's, does the 2400's internal 250 user database play a role in how many users can store their quota data on the appliance?
0
Comment
Question by:hbcit
  • 4
  • 3
7 Comments
 
LVL 33

Expert Comment

by:digitap
ID: 34127617
can you ask your question in a different way "...does the 2400's internal 250 user database play a role in how many users can store their quota data on the appliance?"...I don't understand what you are asking?

what quota data are you referring to?
0
 

Author Comment

by:hbcit
ID: 34127700
Ok, I have broken down the question as much as possible.  I hope it is better understood.

1.  The 2400 has an internal database of 250 users.  Which I assume means 250 users can be created on the NSA 2400.
2.  The 2400 allows for bandwidth quota's to be setup per user.  A bandwidth quota would be for example 5GB of internet banwidth per user.  Once a user's banwidth is finished, there is a  consequence, eg, no more internet for that user.
3.  The 2400 allows users to access the internet with LDAP authentication.  So when they communicate through the 2400, it will ask them for a username and password from an LDAP server.

So, with a practical example.  I have 500 users and they all need LDAP authentication to access the web through the NSA 2400.  They all need to have internet bandwidth quotas associated with their usernames (which means their information must be stored on the NSA 2400), so I am concerned that the 2400 will be too small for my needs due to the internal database having a 250 max?
0
 
LVL 33

Accepted Solution

by:
digitap earned 500 total points
ID: 34127953
ah...i understand.  you can create a sonicwall group and assign the ldap users to that group and assign your bandwidth accordingly.  if you have several ldap users that have different bandwidth needs, you can create different sonicwall groups to fill those needs.  i beleive you can also create AD groups, put those groups in the sonicwall groups, and add the users to the AD groups.  there are different ways to do this.  my primary point here is you don't have to have a one to one sonicwall user to AD user.  make sense?

also, thanks for the clarification.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:hbcit
ID: 34128014
Thanks, that is a relief.  I appreciate your response.
0
 
LVL 33

Expert Comment

by:digitap
ID: 34128076
sure...when i get back to my confuser, i'll dig up a KB for you.  what model of sonicwall do you have?  also, what is the version of firmware and is it standard or enhanaced?
0
 

Author Comment

by:hbcit
ID: 34128127
I am still considering the 2400 for purchase.  I have been reading up on it, and when I came to the internal database issue, I was thinking I would need to buy the 4500 instead due to it having more user support (1000).  As my needs for concurrent internet users is below 100, I didn't really wish to purchase the larger unit.  Thanks.
0
 
LVL 33

Expert Comment

by:digitap
ID: 34128305
i see...you don't have the sonicwall yet.  cool.  when you make your purchase post back here and i'll get you the KB.
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now