The final installation and deployment settings are done in AMC.
To configure the appliance in the AMC
Log in to AMC.
Register the appliance on MySonicWall and retrieve your license file.
When you register your appliance, you must enter both your serial number and your authentication code, which is the hardware identifier for the appliance you purchased:
When you receive your SMA appliance there is a single user license on it, valid for three days. To become familiar with the AMC and test it in your environment with additional users, request a lab license. After initial setup and testing, download your license file from MySonicWall and then import it to the appliance.
See Managing Licenses.
Define one or more authentication servers.
Authentication is used to verify the identity of users. When configuring an authentication server, you are prompted to specify a directory type (LDAP, Microsoft Active Directory, RADIUS, or local users) and a credential type (username/password, token, or digital certificate).
Configure a server certificate.
The appliance encrypts information using the Secure Sockets Layer (SSL) protocol. You can use Let's Encrypt certificate authority that is public, free, API-driven, and trusted by browsers/clients. You can create a selfsigned certificate using AMC for evaluation or testing purpose.
See Certificates.
Define application resources and groups.
Application resources include TCP/IP-based resources (such as client/server applications, file servers, or databases), Web-based resources (including Web applications or Web sites) that run over HTTP, and Windows network share resources (to be accessed in WorkPlace). Resource definitions can include variables, so that a single resource can, for example, derive its network name or address based on each user.
Define users and groups.
User and group definitions are used in access control rules to control access to application resources.
Define realms and communities.
Realms enable the appliance to directly integrate with authentication servers, eliminating the need to create and manage accounts for each user who needs access to your network. Communities aggregate users with similar access needs and End Point Control requirements.
Create access control rules.
Access control rules determine what resources are available to users and groups.
See Access Control Rules.
Configure shortcuts for WorkPlace.
To provide your users with easy access to a Web, file system, or graphical terminal resource from within WorkPlace, you may want to create shortcuts in WorkPlace.
(Optional) Configure the network tunnel service.
If you plan to deploy the network tunnel clients, you must configure the network tunnel service and allocate IP address pools for the clients.
(Optional) Enable and configure End Point Control.
End Point Control optionally deploys data protection components designed to safeguard sensitive data and ensure that your network is not compromised when accessed from PCs in untrusted environments. End Point Control is deployed through communities.
See End Point Control and Using End Point Control Restrictions in a Community.
Apply your changes.
To activate your configuration changes, you must apply them.
Test system accessibility.
Verify that the appliance can access your external user repositories, and ensure that the resources on your network are accessible.
See Troubleshooting.