Solved

Sonicwall - user objects - usage

Posted on 2016-09-30
2
25 Views
Last Modified: 2016-09-30
In Sonicwall there are four basic object classes -   address, service, schedule and user. I have found quite a bit of material on all but user.  Can someone provide me with examples of how the user object would be 'used'.

Thanks in advance.
0
Comment
Question by:lineonecorp
2 Comments
 
LVL 5

Accepted Solution

by:
JSpoor earned 500 total points
Comment Utility
The users is a local user database for user/group based policies.
Also you can connect with your AD and import AD groups for similar purpose, user / group based policies / access levels.

Also you can use local user database  to give Admin access and/or remote access (SSLVPn or IPsec VPN)


View example configurations and the SonicWALL webui and features on http://livedemo.sonicwall.com or http://ngfw-demo.com

Multiply the effectiveness of your APT Sandbox, stop unknown and zero-day attacks at the gateway. See a demo on http://apt-demo.com or http://atp.demo.com

You can also view the Next-Generation Firewalls via
http://next-generation-firewall.com or http://next-generation-firewall-demo.com
0
 

Author Comment

by:lineonecorp
Comment Utility
Thanks for the info.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

We sought a budget ($5,000) firewall solution that would provide all the performance we needed with no single point of failure.  Hosting a SAAS web application in our datacenter, it was critical that we find a way to keep connectivity up and inbound…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now