Solved

SonicWall authentication numbers

Posted on 2010-11-13
7
939 Views
Last Modified: 2012-05-10
The SonicWall appliance NSA 2400 has an internal database of 250 users.  Now it also allows for LDAP authentication.  I would like to know, if I was using LDAP authentication for my users on the network and they all had bandwidth quota's, does the 2400's internal 250 user database play a role in how many users can store their quota data on the appliance?
0
Comment
Question by:hbcit
  • 4
  • 3
7 Comments
 
LVL 33

Expert Comment

by:digitap
Comment Utility
can you ask your question in a different way "...does the 2400's internal 250 user database play a role in how many users can store their quota data on the appliance?"...I don't understand what you are asking?

what quota data are you referring to?
0
 

Author Comment

by:hbcit
Comment Utility
Ok, I have broken down the question as much as possible.  I hope it is better understood.

1.  The 2400 has an internal database of 250 users.  Which I assume means 250 users can be created on the NSA 2400.
2.  The 2400 allows for bandwidth quota's to be setup per user.  A bandwidth quota would be for example 5GB of internet banwidth per user.  Once a user's banwidth is finished, there is a  consequence, eg, no more internet for that user.
3.  The 2400 allows users to access the internet with LDAP authentication.  So when they communicate through the 2400, it will ask them for a username and password from an LDAP server.

So, with a practical example.  I have 500 users and they all need LDAP authentication to access the web through the NSA 2400.  They all need to have internet bandwidth quotas associated with their usernames (which means their information must be stored on the NSA 2400), so I am concerned that the 2400 will be too small for my needs due to the internal database having a 250 max?
0
 
LVL 33

Accepted Solution

by:
digitap earned 500 total points
Comment Utility
ah...i understand.  you can create a sonicwall group and assign the ldap users to that group and assign your bandwidth accordingly.  if you have several ldap users that have different bandwidth needs, you can create different sonicwall groups to fill those needs.  i beleive you can also create AD groups, put those groups in the sonicwall groups, and add the users to the AD groups.  there are different ways to do this.  my primary point here is you don't have to have a one to one sonicwall user to AD user.  make sense?

also, thanks for the clarification.
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 

Author Comment

by:hbcit
Comment Utility
Thanks, that is a relief.  I appreciate your response.
0
 
LVL 33

Expert Comment

by:digitap
Comment Utility
sure...when i get back to my confuser, i'll dig up a KB for you.  what model of sonicwall do you have?  also, what is the version of firmware and is it standard or enhanaced?
0
 

Author Comment

by:hbcit
Comment Utility
I am still considering the 2400 for purchase.  I have been reading up on it, and when I came to the internal database issue, I was thinking I would need to buy the 4500 instead due to it having more user support (1000).  As my needs for concurrent internet users is below 100, I didn't really wish to purchase the larger unit.  Thanks.
0
 
LVL 33

Expert Comment

by:digitap
Comment Utility
i see...you don't have the sonicwall yet.  cool.  when you make your purchase post back here and i'll get you the KB.
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now