Detection Prevention Enable Stealth Mode By default, the SonicWALL responds to incoming connection requests as either “blocked” or “open”. If you enable Stealth Mode, your SonicWALL does not respond to blocked inbound connection requests. Stealth Mode makes your SonicWALL essentially invisible to hackers. Randomize IP ID Select Randomize IP ID to prevent hackers using various detection tools from detecting the presence of a SonicWALL appliance.
Firewall>Services Services are anything a server provides to other computers. A service can be as simple as the computer asking a server for the correct time (NTP) and the server returns a response. Other types of services provide access to different types of data. Web servers (HTTP) respond to requests from clients (browser software) for access to files and data. Services are used by the SonicWALL to configure network access rules for allowing or denying traffic to the network.
Page 24 SonicWALL SonicOS Standard Administrator’s Guide
9 VPN SonicWALL VPN provides an easy-to-setup, secure solution for connecting mobile users, telecommuters, remote offices and partners via the Internet. Mobile users, telecommuters, and other remote users with broadband (DSL or cable) or dialup Internet access can securely and easily access your network resources with the SonicWALL Global VPN Client or Global Security Client and SonicWALL GroupVPN on your SonicWALL.
VPN Policies All existing VPN policies are displayed in the VPN Policies table. Each entry displays the following information: • • • • • Name - user-defined name to identify the Security Association. Gateway - the IP address of the remote SonicWALL. If 0.0.0.0 is used, no Gateway is displayed. Destinations - the IP addresses of the destination networks. Crypto Suite - the type of encryption used Enable - selecting the check box enables the VPN Policy. Clearing the check box disables it.
1. Click the Notepad icon in the Group VPN entry. The VPN Policy window is displayed. General 2. In the General tab, IKE using Preshared Secret is the default setting for IPSec Keying Mode. A Shared Secret is automatically generated in the Shared Secret field, or you can generate your own shared secret. Shared Secrets must be minimum of four characters. Proposals 3. Click the Proposals tab to continue the configuration process.
Leave the default setting, 28800, in the Life Time (secs) field. This setting forces the tunnel to renegotiate and exchange keys every 8 hours. Advanced 4. Click the Advanced tab. Select any of the following settings you want to apply to your GroupVPN policy. • • Enable Windows Networking (NetBIOS) broadcast - to allow access to remote network resources by browsing the Windows® Network Neighborhood.
• Require Authentication of VPN Clients via XAUTH - requires that all inbound traffic on this SA is from an authenticated user. Unauthenticated traffic is not allowed on the VPN tunnel. Client 5. Click the Client tab. Select any of the following settings you want to apply to your GroupVPN policy. • • • • • Cache XAUTH User Name and Password - allows the Global VPN Client to cache the user name and password. Select from Single Session (default), Never, or Always.
Configuring GroupVPN with IKE using 3rd Party Certificates To configure your GroupVPN policy with IKE using 3rd Party Certificates, follow these steps: Alert! Before configuring GroupVPN with IKE using 3rd Party Certificates, your certificates must be installed on the SonicWALL. 1. In the VPN>Settings page click the Notepad icon under Configure. The VPN Policy window is displayed. General 2. In the Security Policy section, select IKE using 3rd Party Certificates from the IPSec Keying Mode menu.
Apply NAT and Firewall Rules - This feature allows a remote site’s LAN subnet to be hidden from the corporate site, and is most useful when a remote office’s network traffic is initiated to the corporate office. The IPSec tunnel is located between the SonicWALL WAN interface and the LAN segment of the corporation.
This Gateway Only - Allows a single connection to be enabled at a time. Traffic that matches the destination networks as specified in the policy of this gateway is sent through the VPN tunnel. All other traffic is blocked. If this option is selected along with Set Default Route as this Gateway, then the Internet traffic is also sent through the VPN tunnel. If this option is selected without selecting Set Default Route as this Gateway, then the Internet traffic is blocked.
The file can be saved to a floppy disk or sent electronically to remote users to configure their Global VPN Clients. Site to Site VPN Configurations When designing VPN connections, be sure to document all pertinent IP Addressing information and create a network diagram to use as a reference. A sample planning sheet is provided on the next page. The SonicWALL must have a routable WAN IP Address whether it is dynamic or static. Be sure that the networks behind the SonicWALLs are unique.
VPN Planning Sheet for Site-to-Site VPN Policies You need the information below before you begin configuring Site-to-Site VPN Policies. Site A Workstation LAN IP Address: ___.___.___.___ Subnet Mask: ___.___.___.___ Default Gateway: ___.___.___.___ SonicWALL LAN IP Address: ___.___.___.___ WAN IP Address: ___.___.___.___ Subnet Mask: ___.___.___.___ Default Gateway: ___.___.___.___ Router Internet Gateway WAN IP Address: ___.___.___.___ Subnet Mask: ___.___.___.___ DNS Server #1: ___.___.___.
Configuring Site to Site VPN Policies Using the VPN Policy Wizard The VPN Policy Wizard quickly and easily walks you through the steps of configuring a VPN security policy between two SonicWALL appliances. The VPN Policy Wizard allows you to create a Typical VPN connection. Using this option, the wizard creates a VPN policy based on IKE using Preshared Secret.
Note: You can add additional networks by editing the VPN policy after it is created in the VPN Policy Wizard. 5. Select IKE using Preshared Secret as the IPSec Keying Mode. Click Next. 6. Enter a shared secret in the Shared Secret field. Use a combination of letters and numbers to create a unique secret. Click Next. 7. Select from the DH Group menu. Diffie-Hellman (DH) key exchange (a key agreement protocol) is used during phase 1 of the authentication process to establish pre-shared keys.
Note: You can add additional networks by editing the VPN policy after it is created in the VPN Policy Wizard. 5. Select Manual Key from the IPSec Keying Modes list. Click Next. 6. Define an Incoming SPI and an Outgoing SPI. The SPIs are hexadecimal (0123456789abcedf) and can range from 3 to 8 characters in length. Or use the default values. Alert! Each Security Association must have unique SPIs; no two Security Associations can share the same SPIs.
Select an encryption method from the Encryption list for the VPN tunnel. If network speed is preferred, then select DES. If network security is preferred, select 3DES. To compromise between network speed and network security, select DES. Select an authentication method from the Authentication list. SHA1 is preferred for network security. Leave the default value of 28800 (8 hours) as the Life Time (seconds) for the VPN Policy. Click Next. 8. ESP is selected by default from the Protocol menu.
1. In the VPN>Settings page, click Add. The VPN Policy window is displayed. 2. In the General tab, IKE using Preshared Secret is selected by default from the IPSec Keying Mode menu. Tip! Use the VPN worksheet in this chapter to record your settings. These settings are necessary to configure the remote SonicWALL and create a successful VPN connection. 3. Enter a name for the VPN Policy in the Name field. 4.
8. Click the Proposals tab 9. In the IKE (Phase 1) Proposal section, the default settings offer a secure connection configuration, however, the settings can be modified to reflect your preferences. In addition to 3DES, AES-128, AES-192, and AES-256 can be selected for encryption methods. 10. In the Ipsec (Phase 2) Proposal section, the default settings offer a secure connection configuration, however, the settings can be modified to reflect your preferences.
• Enable Windows Networking (NetBIOS) broadcast - to allow access to remote network resources by browsing the Windows® Network Neighborhood. • Apply NAT and Firewall Rules - This feature allows a remote site’s LAN subnet to be hidden from the corporate site, and is most useful when a remote office’s network traffic is initiated to the corporate office. The IPSec tunnel is located between the SonicWALL WAN interface and the LAN segment of the corporation.
Tip! Use the VPN worksheet at the beginning of this chapter to record your settings. These settings are necessary to configure the remote SonicWALL and create a successful VPN connection. 3. In the Security Policy section, enter a name for the VPN Policy in the Name field. 4. Enter the IP address or gateway name of the REMOTE SonicWALL in the IPSec Gateway Name or Address field. 5.
11. Click on the Advanced tab. Select the optional configuration settings you want to apply to your VPN policy from the Advanced Settings section. • • • • • Require authentication of local users - requires all outbound VPN traffic from this SA is from an authenticated source. Require authentication of remote users - requires all inbound VPN traffic for this SA is from an authenticated user.
• Default LAN Gateway - used at a central site in conjunction with a remote site using the Use this VPN Tunnel as the default route for all internet traffic. Default LAN Gateway allows the network administrator to specify the IP address of the default LAN route for incoming IPSec packets for this VPN Policy. Incoming packets are decoded by the SonicWALL and compared to static routes configured in the SonicWALL.
11. In the Ipsec (Phase 2) Proposal section, select the following settings: Select ESP from the Protocol menu. Select 3DES from the Encryption menu. Select SHA1 from the Authentication menu. Select Enable Perfect Forward Secrecy if you want an additional Diffie-Hellman key exchange as an added layer of security, then select Group 2 from the DH Group menu. Enter a maximum time in seconds allowed before forcing the policy to renegotiate and exchange keys in the Life Time field.
13. Click OK. Your new VPN policy is displayed in the VPN Policies table. VPN>Advanced The VPN>Advanced page includes optional settings that affect all VPN policies. Advanced VPN Settings • • • Disable all VPN Windows Networking (NetBIOS) Broadcasts - Computers running Microsoft Windows® communicate with one another through NetBIOS broadcast packets. Disable this setting access remote network resources by browsing the Windows® Network Neighborhood.
Selecting Enable NAT Traversal allows VPN tunnels to support this protocol, and log messages are generated by the SonicWALL when a IPSec Security Gateway is detected behind a NAT/NAPT device.
If VPN Single-Armed Mode (stand-alone VPN gateway) is enabled, a warning message appears as follows: Click OK to enable the SonicWALL in VPN Single Armed Mode. Configuring a SonicWALL for VPN Single Armed Mode You have the following information to configure the IP addresses on the firewalls: Remote SonicWALL Corporate SonicWALL WAN IP Address: 66.120.118.11 WAN IP Address:66.120.118.25 Subnet Mask: 255.255.255.0 Subnet Mask: 255.255.255.0 LAN IP Address 192.168.1.1 LAN IP Address: 192.168.3.
• Now that all SonicWALLs are configured, network traffic on the corporate SonicWALL destined for the remote office is routed to the VPN SonicWALL, encrypted, and sent to the remote SonicWALL. VPN User Authentication Settings • • Allow these services to bypass user authentication on SAs - this feature allows VPN users without authentication to access the specified services. To add a service, select the service from the menu and click Add.
VPN>DHCP over VPN DHCP over VPN allows a Host (DHCP Client) behind a SonicWALL obtain an IP address lease from a DHCP server at the other end of a VPN tunnel. In some network deployments, it is desirable to have all VPN networks on one logical IP subnet, and create the appearance of all VPN networks residing in one IP subnet address space. This facilitates IP address administration for the networks using VPN tunnels.
Configuring the Central Gateway for DHCP Over VPN To configure DHCP over VPN for the Central Gateway, use the following steps: 1. Log into the Management interface, click DHCP, and then DHCP over VPN. 2. Select Central Gateway from the DHCP Relay Mode menu. 3. Click Configure. The DHCP over VPN Configuration window is displayed. 4. Select Use Internal DHCP Server to enable the Global VPN Client or a remote firewall or both to use an internal DHCP server to obtain IP addressing information. 5.
8. Enter the IP address of a relay server in the Relay IP Address (Optional) field. To edit an entry in the IP Address table, click Edit. To delete a DHCP Server, highlight the entry in the IP Address table, and click Delete. Click Delete All to delete all entries. Configuring DHCP over VPN Remote Gateway 1. Select Remote Gateway from the DHCP Relay Mode menu. 2. Click Configure. The DHCP over VPN Configuration window is displayed. 3.
example of a static device is a printer as it cannot obtain an IP lease dynamically. If you do not have Block traffic through tunnel when IP spoof detected enabled, it is not necessary to enter the Ethernet address of a device. 9. You must exclude the Static IP addresses from the pool of available IP addresses on the DHCP server so that the DHCP server does not assign these addresses to DHCP clients. You should also exclude the IP address used as the Relay IP Address.
endpoints of a VPN tunnel to provide additional security, and you can implement it with IPSec to provide a secure, encrypted VPN solution. General Note: You must enable Group VPN before configuring the SonicWALL L2TP feature. Also, the encryption method and shared secret must match the L2TP client settings. To enable L2TP Server functionality on the SonicWALL, select Enable L2TP Server. Then click Configure to display the L2TP Server Configuration window.
4. Enter the IP address of your first WINS server in the WINS Server 1 field. 5. If you have a second WINS server, enter the IP address in the WINS Server 2 field. IP Address Settings 6. Select IP address provided by RADIUS Server if a RADIUS Server provides IP addressing information to the L2TP clients. 7. If the L2TP Server provides IP addresses, select Use the Local L2TP IP pool. Enter the range of private IP addresses in the Start IP and End IP fields.
To implement the use of certificates for VPN SAs, you must locate a source for a valid CA certificate from a third party CA service. Once you have a valid CA certificate, you can import it into the SonicWALL to validate your Local Certificates. You import the valid CA certificate into the SonicWALL using the VPN>CA Certificates page. Once you import the valid CA certificate, you can use it to validate your local certificates you add in the VPN>Local Certificates page.
• • • • Expiration On Alternate Subject Name Alternate Subject Name Type Status Delete This Certificate To delete the certificate, click Delete This Certificate. You can delete a certificate if it has expired or if you decide not to use third party certificates for VPN authentication. Generating a Certificate Signing Request To generate a local certificate for use with a VPN policy, follow these steps: Tip! You should create a Certificate Policy to be used in conjunction with local certificates.
VPN>CA Certificates Importing CA Certificates into the SonicWALL After your CA service has validated your CA Certificate, you can import it into the SonicWALL and use it to validate Local Certificates for VPN Security Associations. To import your CA Certificate into the SonicWALL, follow these steps: 1. Select Add New CA Certificate. 2. Click Browse, and locate the PKCS#7 (*.p7b) or DER (*.der) or *.cer encoded file sent by the CA service. 3. Click Open to set the directory path to the certificate 4.
Certificate Revocation List (CRL) A Certificate Revocation List (CRL) is a way to check the validity of an existing certificate. A certificate may be invalid for several reasons: • It is no longer needed. • A certificate was stolen or compromised. • A new certificate was issued that takes precedence over the old certificate. If a certificate is invalid, the CA may publish the certificate on a Certificate Revocation List at a given interval, or on an online server in a X.
Page 60 SonicWALL SonicOS Standard Administrator’s Guide
10 Users The SonicWALL provides a mechanism for user level authentication that gives users access to the LAN from remote locations on the Internet as well as a means to bypass content filtering. Also, you can permit only authenticated users to access VPN tunnels and send data across the encrypted connection. User level authentication can performed using a local user database, RADIUS, or a combination of the two applications. The local database on the SonicWALL can support up to 1,000 users.
Users>Settings On this page, you can configure the authentication method required, global user settings, and an acceptable user policy that is displayed to users when logging onto your network. The SonicWALL supports user level authentication using the local SonicWALL database, a RADIUS server, or a combination of the two authentication methods.
field, then click Add. To add an IP address range, enter the range starting IP address in the first field and the ending IP address in the next field (up to the last three numbers of the IP address. Acceptable Use Policy An acceptable use policy (AUP) is a policy users must agree to follow in order to access a network or the Internet.
10. If there is a secondary RADIUS server, type the appropriate information in the Secondary Server section. 11. Click the RADIUS Users tab. 12. Select the default privileges for all RADIUS users in this section. Access to the Internet (when access is restricted) - If you have selected Allow only authenticated users to access the Internet, you can allow individual users to access the Internet.
16. Click OK. Once the SonicWALL has been configured, a VPN Security Association requiring RADIUS authentication prompts incoming VPN clients to type a User Name and Password into a dialogue box. Users>Local Users Add local users to the SonicWALL internal database. Click Add User to display the Add User configuration window. Follow the steps below to add users locally. Settings 1. Create a user name and type it in the User Name field. 2. Create a password for the user and type it in the Password field.
Access from L2TP VPN client - Enable this feature to allow the user to send information using a L2TP VPN Client with authentication enforcement. Limited Management Capabilities - Enabling this feature allows the user to have limited local management access to the SonicWALL Management Interface. This access is limited to the following pages: General (Status, Network, Time); Log (View Log, Log Settings, Log Reports); Diagnostics (All tools except Tech Support Report). 5. Click OK.
11 Security Services Security Services allows you to manage SonicWALL Security Services and Upgrades for your SonicWALL. SonicWALL, Inc. offers a variety of subscription-based Security Services and Upgrades to enhance the functionality of your SonicWALL. You can activate and manage Security Services directly from the SonicWALL Management Interface or from https://www.mySonicWALL.com.
Security Services>Summary The Security Services>Summary page lists the available SonicWALL security services and upgrades available for your SonicWALL and provides access to mySonicWALL.com to activate services. Security Services Summary A list of currently available services through mySonicWALL.com is displayed in the Security Services Summary table. Subscribed services are displayed with Licensed in the Status column.
If Your SonicWALL is Not Registered If your SonicWALL is not registered, the Security Services>Summary page does not include the Services Summary table. Your SonicWALL must be registered to display the Services Summary table. You can register your SonicWALL via the Management Interface on the System>Status page. You must have a mySonicWALL.com account to register your SonicWALL via the Management Interface. You can create a mySonicWALL.
Government/Education Edition run on SonicOS Standard 2.1 (or higher) as well as SonicOS Enhanced 2.0 (or higher). Security Services>Content Filter The Security Services>Content Filter page allows you to configure the SonicWALL Restrict Web Features and Trusted Domains settings, which are included with SonicOS. You can activate and configure SonicWALL Content Filtering Service as well as two third-party Content Filtering products from the Security Services>Content Filter page.
Activating SonicWALL CFS If you have an Activation Key for your SonicWALL CFS subscription, follow these steps to activate SonicWALL CFS: Alert! You must have a mySonicWALL.com account and your SonicWALL must be registered to activate SonicWALL Network Anti-Virus. 1. Click the SonicWALL Content Filtering Subscription link on the Security Services>Content Filtering page. The mySonicWALL.com Login page is displayed. 2. Enter your mySonicWALL.
Restrict Web Features are included with SonicOS. Select any of the following applications to block: • ActiveX - ActiveX is a programming language that embeds scripts in Web pages. Malicious programmers can use ActiveX to delete files or compromise security. Select the ActiveX check box to block ActiveX controls. • Java - Java is used to download and run small programs, called applets, on Web sites. It is safer than ActiveX since it has built-in security mechanisms.
Message to Display when Blocking You can enter your customized text to display to the user when access to a blocked site is attempted. The default message is This site is blocked by the SonicWALL Content Filter Service. Any message, including embedded HTML, up to 255 characters long, can be entered in this field. Configuring SonicWALL Filter Properties You can customize SonicWALL filter features included with SonicOS from the SonicWALL Filter Properties window.
Alert! Do not include the prefix “http://” in either the Allowed Domains or Forbidden Domains the fields. All subdomains are affected. For example, entering “yahoo.com” applies to “mail.yahoo.com” and “my.yahoo.com”. To remove a trusted or forbidden domain, select it from the appropriate list, and click Delete. Once the domain has been deleted, the Status bar displays Ready. Enable Keyword Blocking To enable blocking using Keywords, select Enable Keyword Blocking.
• From - When selected, Content Filtering is enforced during the time and days specified. Enter the time period, in 24-hour format, and select the starting and ending day of the week that Content Filtering is enforced. Consent The Consent tab allows you to enforce content filtering on designated computers and provide optional filtering on other computers. Consent can be configured to require the user to agree to the terms outlined in an Acceptable Use Policy window before Web browsing is allowed.
• • • Consent Page URL (optional filtering) - When a user opens a Web browser on a computer requiring consent, they are shown a consent page and given the option to access the Internet with or without content filtering. This page must reside on a Web server and be accessible as a URL by users on the network. It can contain the text from, or links to an Acceptable Use Policy (AUP).
firewalls constantly monitors the version of the virus definition file and automatically triggers download and installation of new virus definition files to each user’s computer. In addition, the SonicWALL restricts each user’s access to the Internet until they are protected, therefore acting as an enforcer of the company’s virus protection policy.
Network Anti-Virus E-Mail Filter The E-Mail Filter allows the administrator to selectively delete or disable inbound e-mail attachments as they pass through the SonicWALL. This feature provides control over executable files and scripts, and applications sent as e-mail attachments. Note: E-Mail Filter is included with Network Anti-Virus.
• • • • • • • from emerging threats and lowering total cost of ownership. Updates to the signature database are dynamic for SonicWALL firewalls under an active subscription. Scalable - SonicWALL IPS is a scalable solution for SonicWALL TZ 170 and PRO Series Appliances that secures small, medium and large networks with complete protection from application exploits, worms and malicious traffic.
1. Pattern Definition Language Interpreter uses signatures that can be written to detect and prevent against known and unknown protocols, applications and exploits. 2. TCP packets arriving out-of-order are reassembled by the Deep Packet Inspection framework. 3. Deep Packet Inspection engine preprocessing involves normalization of the packet’s payload. For example, a HTTP request may be URL encoded and thus the request is URL decoded in order to perform correct pattern matching on the payload. 4.
SonicWALL IPS Activation If you do not have SonicWALL IPS activated on your SonicWALL, you must purchase SonicWALL IPS from a SonicWALL reseller or through your mySonicWALL.com account (limited to customers in the USA and Canada).
Activating the SonicWALL IPS FREE TRIAL To try a FREE TRIAL of SonicWALL IPS, follow these steps: 1. Click the FREE TRIAL link. The mySonicWALL.com Login page is displayed. 2. Enter your mySonicWALL.com account username and password in the User Name and Password fields, then click Submit. The System>Licenses page is displayed. If your SonicWALL is already connected to your mySonicWALL.com account, the System>Licenses page appears after you click the FREE TRIAL link. 3.
12 Log The SonicWALL Internet security appliance provides logging, alerting, and reporting features, which can be viewed in the Log section of the SonicWALL Web Management Interface. Log>View The SonicWALL maintains an Event log which displays potential security threats. This log can be viewed with a browser using the SonicWALL Web Management Interface, or it can be automatically sent to an email address for convenience and archiving. The log is displayed in a table and can be sorted by column.
SonicWALL Log Messages Each log entry contains the date and time of the event and a brief message describing the event. It is also possible to copy the log entries from the management interface and paste into a report. • Dropped TCP, UDP, or ICMP packets When IP packets are blocked by the SonicWALL, dropped TCP, UDP and ICMP messages are displayed. The messages include the source and destination IP addresses of the packet. The TCP or UDP port number or the ICMP code follows the IP address.
Log>Categories You can define which log messages appear in the SonicWALL Event Log. Log Categories All Log Categories are enabled by default except Network Debug. • Log all Categories Select Log all Categories to begin logging all event categories. • System Maintenance Logs general system activity, such as system activations. • System Errors Logs problems with DNS, or e-mail. • Blocked Web Sites Logs Web sites or newsgroups blocked by the Content Filter List or by customized filtering.
• Dropped UDP Logs blocked incoming UDP packets. • Dropped ICMP Logs blocked incoming ICMP packets. • Network Debug Logs NetBIOS broadcasts, ARP resolution problems, and NAT resolution problems. Also, detailed messages for VPN connections are displayed to assist the network administrator with troubleshooting problems with active VPN tunnels. Network Debug information is intended for experienced network administrators. • Denied LAN IP Logs all LAN IP addresses denied by the SonicWALL.
Log>Automation Click Log, and then Automation to begin configuring the SonicWALL to send log files using e-mail and configuring syslog servers on your network. E-mail 1. Mail Server - to e-mail log or alert messages, enter the name or IP address of your mail server in the Mail Server field. If this field is left blank, log and alert messages are not e-mailed. 2. Send Log To - enter your full e-mail address in the Send log to field to receive the event log via email.
To add syslog servers to the SonicWALL, click Add. The Add Syslog Server window is displayed. 1. Enter the Syslog server name or IP address in the Name or IP Address field. Messages from the SonicWALL are then sent to the servers. Up to three Syslog Server IP addresses can be added. 2. If your syslog is not using the default port of 514, enter the port number in the Port Number field. 3. Click OK.
Data Collection The Reports page includes the following functions and commands: • Start Data Collection Click Start Data Collection to begin log analysis. When log analysis is enabled, the button label changes to Stop Data Collection. • Reset Data Click Reset Data to clear the report statistics and begin a new sample period. The sample period is also reset when data collection is stopped or started, and when the SonicWALL is restarted. View Data Select the desired report from the Report to view menu.
Log>ViewPoint SonicWALL ViewPoint SonicWALL ViewPoint is a software solution that creates dynamic, Web-based reports of network activity. ViewPoint generates both real-time and historical reports to provide a complete view of all activity through your SonicWALL Internet Security Appliance. With SonicWALL ViewPoint, you are able to monitor network access, enhance network security and anticipate future bandwidth needs. Tip! • Displays bandwidth use by IP address and service.
13 Appendices Appendix A - SonicWALL Support Solutions SonicWALL’s powerful security solutions give unprecedented protection from the risks of Internet attacks. SonicWALL’s comprehensive support services protect your network security investment and offer the support you need - when you need it. Note: For more information on SonicWALL Support Solutions, please visit .
Appendix B- Configuring the Management Station TCP/IP Settings The following steps describe how to configure the Management Station TCP/IP settings in order to initially contact the SonicWALL. It is assumed that the Management Station can access the Internet through an existing connection. The SonicWALL is pre-configured with the IP address 192.168.168.168.
Windows NT 1.From the Start list, highlight Settings and then select Control Panel. 2.Double-click the Network icon in the Control Panel window. 3.Double-click TCP/IP in the TCP/IP Properties window. 4.Select Specify an IP Address. 5.Type "192.168.168.200" in the IP Address field. 6.Type "255.255.255.0" in the Subnet Mask field. 7.Click DNS at the top of the window. 8.Type the DNS IP address in the Preferred DNS Server field.
Windows 2000 1.In Windows 2000, click Start, then Settings. 2.Click Network and Dial-up Connections. Double-click the network connection name to open the Status window. 3.Click Status to open the Properties window. 4.Double-click Internet Protocol (TCP/IP) to open the TCP/IP properties window. 5.Select Use the following IP address and enter 192.168.168.200 in the IP address field. 6.Type 255.255.255.0 in the Subnet mask field. 7.Type the DNS IP address in the Preferred DNS Server field.
Windows XP 1.Open the Local Area Connection Properties window. 2.Double-click Internet Protocol (TCP/IP) to open the Internet Protocol (TCP/IP) Properties window. 3.Select Use the following IP address and type 192.168.168.200 in the IP address field. 4.Type 255.255.255.0 in the Subnet Mask field. 5.Type the DNS IP address in the Preferred DNS Server field. If you have more than one address, type the second one in the Alternate DNS server field. 6.Click OK for the settings to take effect on the computer.
Page 96 SonicWALL SonicOS Standard Administrator’s Guide
Index Tech Support Report 43 Trace Route 44 Discards 110 Bad WEP Key 110 No Buffer 110 Distributed Enforcement Architecture (DEA) DTIM Interval 121 Dynamic Ports 22 Dynamic Signature Updates 78 A Access Point Status 109 Access Rules 11 Adding Rules 19 Examples 20 Restore Defaults 12 Rule Wizard 13 General Rule 15 Public Server Rule 14 Account Lifetime 106 ACL 109 Activating IPS FREE TRIAL 82 Administration 32 Firewall Name 32 GMS 35 Login Security 33 Management Protocol 34 Name and Password 33 SNMP 34 Alp
M MAC Address 109 MAC Address List 122 MAC Filter List 121 MAC Filtering 107 Management by Risk Category 79 Management Interface 1 Accessing 1 Applying Changes 2 Getting Help 2 Logging Out 2 Management Station Configuration Message In 110 Message In Bad 110 Multicast Frames 109 Multicast Octets 109 Multiple Retry Frames 109 mySonicWALL.
W Local Certificates 56 Planning Sheet 34 Single-Armed Mode 47 Site-to-Site VPN 33 SonicWALL 3rd Party Certificate Support 55 User Authentication 49 VPN Policy Window 38 VPN Policy Wizard 35 X.
Page 100 SonicWALL SonicOS Enhanced Administrator’s Guide
SonicWALL,Inc. 1143 Borregas Avenue Sunnyvale,CA 94089-1306 T: 408.745.9600 F: 408.745.9300 www.sonicwall.com © 2002 SonicWALL, Inc. SonicWALL is a registered trademark of SonicWALL, Inc. Other product and company names mentioned herein may be trademarks and/ or registered trademarks of their respective companies. Specifications and descriptions subject to change with out notice.