Configuring AppGate SDP Advanced Connector

Prev Next

In today’s distributed environments, organizations often need to securely connect remote networks or groups of under-protected devices—such as IoT sensors, cameras, or legacy systems to their protected resources.

Appgate SDP addresses this challenge with the Connector, a flexible solution designed to extend Zero Trust security to unmanaged or remote assets, whether in the cloud or at branch offices.

There are two deployment options of the connector:

· Connector (Express): Designed for simplicity, requiring minimal configuration to quickly connect users to local resources via Appgate SDP Gateways.

· Connector (Advanced): Offers granular control and advanced features for complex environments, supporting multiple resource groups, high availability (HA), and fine-tuned policy management.

This article is focusing on Advanced connector

  1. Deploying an Appgate Connector: Initial Appliance Installation and Seeding

The first step is to install or spin up a new appliance and seed it as a blank node. This process is identical to deploying any other Appgate SDP appliance, such as a Controller, Gateway, or LogServer.

A screenshot of a phone AI-generated content may be incorrect.

  1. Configuring the Built-in Identity Provider and IP Pools for Appgate Connectors

When deploying an Appgate Connector (either Advanced or Express), it’s important to understand how authentication and IP address assignment work for the Client instances running inside the Connector appliance.

Appgate SDP includes a built-in Identity Provider (IdP) specifically for Connectors. This IdP is used to authenticate the headless Client instances that are created for each resource group within the Connector appliance. Each resource group you configure in a Connector is essentially a separate Client, and each of these Clients requires its own unique IP address for secure tunnel communication.

A screenshot of a computer AI-generated content may be incorrect.

  1. Why this matter

  • Each resource group = one Client = one IP address:
    Every resource group you define in a Connector will consume one IP address from the assigned pool.

· Isolation and Routing:
These IP addresses are used for the virtual tunnel interfaces, ensuring proper isolation and routing between resource groups and protected resources.

· Scalability:
Planning your IP pools in advance ensures you can scale your deployment without running into address shortages.

  1. Step-by-Step: Configure an Appgate Connector and Resource Group

  2. Select the check box for the Connector function.

  3. In the Site section, select the appropriate site for the Connector from the Appliance Site drop-down list.

  4. In the Resource Group Configuration section, click Add New at the Advanced Connector field.
    Give your Connector a distinctive and descriptive Name.

  5. At Local Resources, click Add New.

  6. Enter the private IP Address or the subnet of the protected Resource(s).

  7. Enter the Netmask Length.

  8. Enter the NIC.

A screenshot of a computer AI-generated content may be incorrect.

A screenshot of a computer AI-generated content may be incorrect.

· NAT Options:

o Source NAT to Local Resources: Enable if you want traffic to local resources to appear as coming from the Connector’s tunnel IP.

o Source NAT from Local Resources: Enable if you want traffic from local resources to appear as coming from the Connector’s tunnel IP.

o Destination NAT to Local Resources: Enable if you need to translate destination addresses for incoming traffic.

· DHCP Relay (Optional): If you want local resources to get IPs from a remote DHCP server, configure DHCP relay.

  1. Create Policies and Entitlements

· Go to Policies and Entitlements.

· Create or assign policies that define what the resource group (Client) can access, and from where.

· Each resource group gets a unique policy assigned to its client instance.

· Ensure routing and access rights are set according to your security requirement

A screenshot of a computer AI-generated content may be incorrect.

  1. Finally Check if the connector resource group vyos_IOT in our example is connected in the active session

    • Verify connector health

      • On the appliance dashboard, ensure the Connector function shows as healthy.

A healthy status means the Client(s) (one per resource group) have successfully signed in and have entitlements assigned

A screenshot of a computer AI-generated content may be incorrect.