![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/3/8b/38b30e37-c48b-4fe7-b5a5-5cca021753cb/38b30e37-c48b-4fe7-b5a5-5cca021753cb-bg9.png)
Page 8 Selecting a Deployment Scenario
Scenario B: SRA on an Existing DMZ
Scenario C: SRA on the LAN
SonicWALL SRA 1200/4200 Deployment Scenarios
DMZ
LANWAN
OPT, X2, etc
X1
X0
X0
Remote Users
Network Nodes
SonicWALL UTM Appliance
E7500
Network Security Appliance
SwitchSwitch
Router
1200
SRA
Secure Remote Access
X0X1
CONSOLE
PWRTEST ALARM
SRA Appliance
LAN
WAN
LAN Port
X0
Remote Users
Existing Gateway Device
or Switch / Hub
Internet
Router
1200
SRA
Secure Remote Access
X0X1
CONSOLE
PWRTEST ALARM
SRA Appliance
Gateway
Device
Deployment
Scenario
Conditions or
Requirements
SonicOS Enhanced
3.1 or higher:
• TZ Series
•PRO Series
• NSA E-Class
(SonicOS
5.0+)
•NSA Series
(SonicOS
5.0+)
SRA on a New DMZ • OPT or unused interface
• New DMZ configured for
NAT or Transparent Mode
SRA on Existing
DMZ
• No unused interfaces
• One dedicated interface in
use as an existing DMZ
SRA on the LAN • No unused interfaces
• No dedicated interface for
a DMZ
SonicOS Standard
3.1 or higher:
• TZ Series
• PRO Series
SRA on a New DMZ • Open OPT or X2 interface
• New DMZ configured for
either NAT or Transparent
Mode
• Provide SonicWALL deep
packet inspection security
services (optional)
SRA on Existing
DMZ
• OPT or X2 interface in use
with an existing DMZ
• Provide SonicWALL deep
packet inspection security
services (optional)
SonicOS Standard
3.1 or higher:
• TZ Series
•PRO Series
SonicWALLs with
legacy firmware
Third-Party Gateway
Device
SRA on the LAN • Not planning to use
SonicWALL deep packet
inspection security
services
• Interoperability with a
third-party gateway device