4.7.2.2. Deployment Steps

To ensure the proper functionality of the deployed use case, it is crucial to meticulously follow the steps outlined. Keep in mind that these steps may vary based on the specific requirements and needs of your case.

Below, you will find a breakdown of both mandatory and optional steps, with the understanding that their applicability depends on your unique circumstances.

Architecture

  • Architecture: This section outlines the nodes necessary for the functioning of the use case, providing essential information related to its architecture. You can find a detailed explanation of the deployment of each of the nodes in Deployment and basic configuration

Node Configuration

  • Node Configuration: This section details the steps necessary to configure the nodes that constitute the backend of the use case. These include ON Sensor, ON Core, and ON VPNGW.

Portal configuration

  • VPN Menu Configuration: This section is dedicated setting up and starting the VPN service by configuring the necessary flows in the Administration Portal.

  • General Menu Configuration: The second part of the Portal Configuration is dedicated to VPN configurations followed by the remaining 2SRA configurations that take place in the General menu.

Optional:

  • Wireguard VPN using SAML: The use of Wireguard as a VPN service allows us to use SAML as the authentication backend through the OpenNAC Enterprise captive portal. For this, it will be necessary to configure this section to deploy and configure the captive portal.

  • OTP Configuration: To enhance the security of the use case, you can add an extra layer of protection by using a One-Time Password (OTP) or Two-Factor Authentication (2FA) system. This system requires entering a unique password when connecting to the VPN.

End User Guide

  • End User Guide: This section provides all the necessary information for end users of the 2SRA module. It shows how to set up your environment to establish a secure VPN connection to the corporate network through the OpenNAC Agent using the 2FA.

Monitoring

  • Monitoring: This section shows how the data is being ingested and saved in the Operate view of the Administration Portal and in the ON Analytics section.

Troubleshooting