Skip to content

Architecture

Sites and WALLIX One PAM are connected together by establishing one or several tunnels. Tunnels must be considered for:

  • sites where targeted devices and applicattions are located
  • sites where local users and WALLIX One PAM administrators are located

IMPORTANT

The IPSec tunnel is initiated from the client’s network to WALLIX One PAM gateway, meaning no inbound connections or open ports are required on the client’s side.

NOTE

WALLIX One PAM does not require the installation of any on-premises connectors.

NOTE

The same tunnel can be used for local users' connection to WALLIX One PAM and for WALLIX One PAM bastion's connection to targeted devices.

Target access

High Level Architecture Scheme

WALLIX One PAM can be connected to multiple sites and covers different environnements (hardware, hypervisor, cloud).

NOTE

To access web applications from WALLIX One PAM, it is necessary to deploy an on-premises Remote Desktop Services (RDS) farm. Refer to WALLIX Bastion administration guide for further details.

User access

High Level Architecture Scheme

WALLIX One PAM enables access of local and remote users to targets. Solution administration is possible only for local users. For more details about access:

Network flows

The following diagram represents the network flows between WALLIX One PAM and your infrastructure.

Network flows

NOTE

Note that WALLIX One PAM does not allow outbound traffic to the Internet.

This table lists the different network flows:

SourceDestinationProtocolTransport protocol/Port
External UserWALLIX Access ManagerHTTPSTCP/443
User from company's networkWALLIX Bastion - GUIHTTPSTCP/443
User from company's networkWALLIX Bastion - RDP ProxyRDPTCP/3389
User from company's networkWALLIX Bastion - SSH ProxySSH/SFTPTCP/22
Administrator from company's networkWALLIX Bastion - GUIHTTPSTCP/443
Administrator from company's networkWALLIX Access Manager - GUIHTTPSTCP/443
WALLIX BastionTarget SSHSSH/SFTPTCP/22
WALLIX BastionTarget RDP/RDSRDPTCP/3389
WALLIX BastionTarget VNCVNCTCP/5900
WALLIX BastionTargetTELNET/RLOGINTCP/25 TCP/513
WALLIX BastionPLCOT protocolsTCP/102, TCP/502, ...
WALLIX BastionLDAP serverLDAP, LDAPSTCP/389, TCP/636
WALLIX BastionDNS serverDNSUDP/53 TCP/53
WALLIX BastionSIEMSYSLOGUDP/514
WALLIX BastionMail serverSMTP, SMTPS, STARTTLSTCP/25, TCP/465, TCP/587
WALLIX BastionKerberosKERBEROSTCP/88
WALLIX BastionRadius or TACACSRADIUS, TACACS+TCP/1812, TCP/49

NOTE

WALLIX One PAM does not enforce protocol filtering on outbound traffic over the IPSec tunnel. Clients are responsible for implementing any necessary filtering on their side of the tunnel to restrict outbound traffic to the protocols they use.