Skip to content

Architecture

Sites and WALLIX One PAM are connected together by establishing one or several tunnels. Tunnels must be considered for:

  • sites where targeted devices and applicattions are located
  • sites where local users and WALLIX One PAM administrators are located

IMPORTANT

The IPSec tunnel is initiated from the client’s network to WALLIX One PAM gateway, meaning no inbound connections or open ports are required on the client’s side.

NOTE

WALLIX One PAM does not require the installation of any on-premises connectors.

NOTE

The same tunnel can be used for local users' connection to WALLIX One PAM and for WALLIX One PAM bastion's connection to targeted devices.

Target access

High Level Architecture Scheme

WALLIX One PAM can be connected to multiple sites and covers different environnements (hardware, hypervisor, cloud).

NOTE

To access web applications from WALLIX One PAM, it is necessary to deploy an on-premises Remote Desktop Services (RDS) farm. Refer to WALLIX Bastion administration guide for further details.

User access

WALLIX One PAM enables access of local and remote users to targets. Solution administration is possible only for local users. For more details about access:

High Level Architecture Scheme

NOTE

With WALLIX One PAM Core, remote users cannot access targets from the web portal. Only local users can access targets from the customer premises.

Network flows

The following diagram represents the network flows between WALLIX One PAM and your infrastructure.

Network flows

NOTE

By default, WALLIX One PAM does not allow outbound traffic to the Internet. To integrate with third-party services hosted in the Internet, WALLIX One PAM operators need to explicitly authorize outgoing Internet traffic.

This table lists the different network flows:

SourceDestinationProtocolTransport protocol/Port
External UserWALLIX Access Manager*HTTPSTCP/443
User from company's networkWALLIX Bastion - GUIHTTPSTCP/443
User from company's networkWALLIX Bastion - RDP ProxyRDPTCP/3389
User from company's networkWALLIX Bastion - SSH ProxySSH/SFTPTCP/22
Administrator from company's networkWALLIX Bastion - GUIHTTPSTCP/443
Administrator from company's networkWALLIX Access Manager - GUI*HTTPSTCP/443
WALLIX BastionTarget SSHSSH/SFTPTCP/22
WALLIX BastionTarget RDP/RDSRDPTCP/3389
WALLIX BastionTarget VNCVNCTCP/5900
WALLIX BastionTargetTELNET/RLOGINTCP/25 TCP/513
WALLIX BastionPLCOT protocolsTCP/102, TCP/502, ...
WALLIX BastionLDAP serverLDAP, LDAPSTCP/389, TCP/636
WALLIX BastionDNS serverDNSUDP/53 TCP/53
WALLIX BastionSIEMSYSLOGUDP/514
WALLIX BastionMail serverSMTP, SMTPS, STARTTLSTCP/25, TCP/465, TCP/587
WALLIX BastionKerberosKERBEROSTCP/88, TCP/464
WALLIX BastionRadius or TACACSRADIUS, TACACS+TCP/1812, TCP/49

*Those flows don't exist for WALLIX One PAM Core.

NOTE

WALLIX One PAM does not enforce protocol filtering on outbound traffic over the IPSec tunnel. Clients are responsible for implementing any necessary filtering on their side of the tunnel to restrict outbound traffic to the protocols they use.