Home
SonicWALL E-Class Network Security Appliance E5500 - Security Appliance - 8 Ports
Contents
1. Internet Management Station Connecting the LAN Port 1 Connect one end of the provided ethernet cable to the computer you are using to manage the SonicWALL NSA E5500 2 Connect the other end of the cable to the X0 port on your SonicWALL NSA E5500 The Link LED above the X0 LAN port will light up in green or amber depending on the link throughput speed indicating an active connection Amber indicates 1 Gbps Green indicates 100 Mbps Unlit while the right activity LED is illuminated indicates 10 Mbps Applying Power 1 Plug the power cord into an appropriate power outlet 2 Turn on the power switch on the rear of the appliance next to the power cords To power source eS The Power LEDs on the front panel light up blue when you plug in the SonicWALL NSA E5500 The Alarm LED may light up and the Test LED will light up and may blink while the appliance performs a series of diagnostic tests When the Power LEDs are lit and the Test LED is no longer lit the SonicWALL NSA E5500 is ready for configuration This typically occurs within a few minutes of applying power to the appliance Alert When disconnecting power be sure to remove both power cords from the unit Note f the Test or Alarm LEDs remain lit after the SonicWALL NSA E5500 has booted restart the appliance by cycling power SonicWALL NSA E5500 Getting Started Guide Page 25 Accessing the Management Interface Th
2. Note Ifyou are not using one of the network configurations above refer to the SonicOS Enhanced Administrator s Guide You can locate this guide on your SonicWALL Resource CD SonicWALL NSA E5500 Getting Started Guide Page 5 The Front Panel SONICWALL gt Network Security Appliance Feature Description LCD Screen Displays the front panel bezel interface which can be used to display status information make certain configuration changes restart the appliance or boot the appliance in SafeMode Control Buttons Used to navigate the front panel bezel interface Console Port Used to access the SonicOS Command Line Interface CLI via the DB9 gt RJ45 cable USB Ports 2 Future extension Reset Button Press and hold the button for a few seconds to manually reset the appliance LED from left to right Power LED Indicates the SonicWALL NSA E5500 is powered on Test LED Flickering Indicates the appliance is initializing Steady blinking Indicates the appliance is in SafeMode Solid Indicates that the appliance is in test mode Alarm LED Indicates an alarm condition HD LED Future extension HA Port High Availability port gt Ppp p gt b s X0 X7 Copper Gigabit Ethernet ports Bypass Status LED Future extension Please check Release Notes for future availability Page 6 The Front Panel PP b gt The Back Panel Icon Feature Description Expansion Bay Future expansion Fans 2 The So
3. Setup Tool u ne WEB BASED SUPPORT User Forum Submit an electronic request for support Please log in to our Customer Support Portal using Knowledge Portal 3 your mySonicWALL com username and password If you are not a registered user click here Note Your SonicWALL product s must be registered to use SonicWALL Support Services OPEN A SUPPORT CASE Web RESELLER SUPPORT Telephone zma Submit an electronic request for reseller support TELEPHONE SUPPORT REFERENCE LIBRARY Page 64 Customer Support Support Services SonicWALL support services are designed not only to keep your security infrastructure current but also to react swiftly to any problem that may occur However that s not enough to keep your network safe these days So our support services also include crucial updates and upgrades the finest technical support access to extensive electronic tools and timely hardware replacement For further information visit http www sonicwall com us support 3870 html SEARCH SITEMAP NORTH AMERICA WORLDWIDE SONICWALL gt PRODUCTS amp SOLUTIONS COMPANY GO BACK TO SUPPORT CUSTOMER SERVICES SUPPORT SUPPORT SonicWALL support services are designed not only to keep your security RESOURCES infrastructure current but also to react swiftly to any problem that may occur However that s not enough to keep your network safe these days So our support SELF SERVE HELP
4. The fields you enter values into are combined into a search string with a logical AND Select the Group Filters box next to any two or more criteria to combine them with a logical OR Using Log gt View The SonicWALL security appliance maintains an Event log for tracking potential security threats You can view the log in the Log gt View page or it can be automatically sent to an email address for convenience and archiving The log is displayed in a table and can be sorted by column You can filter the results to display only event logs matching certain criteria You can filter by Priority Category Source IP or Interface and Destination IP or Interface The fields you enter values into are combined into a search string with a logical AND Select the Group Filters box next to any two or more criteria to combine them with a logical OR Lo q View Clear Log E Mail Log Log View Settings Filter Value Group F Priority All v F Category All Categories v d Source IP Interface All Interfaces F Destination IP Interface All Interfaces F Filter Logic Priority amp amp Category amp amp Source amp amp Destination Apply Filters Reset Filters Ex Loa View Items perpage 50 items 1 t050 of 871 Time Priority Category Message Source Destination Notes 08 09 2007 Network Web management 69 111 163 28 204 180 153 42 anes Notice TCP HT 05 52 29 880 Access request allowe
5. Network Anti Virus E IZ 180 constantly updates 166 r Network Anti Virus related topics by ddames Yesterday 10 22 AM Bd IZ 190 Wireless WAN 1Z190 routing config 35 r 3G Capability on the new TZ 190 by medial gmbh Today 03 28 AM Bd f Misc EEE PENRE EEEE Upgrading TZ170 Config Ha er gig OPICE Sones TEAME 10 Soe by darrellshandrow Today 12 39 PM bd SonicWALL SSL VPN SSL VPN Topics i SSL VPN 4000 Domain not showing in drop 19 SSL VPN 4000 related topics by michaelkerley07 24 2007 03 14 PM bd SSL VPN 2000 E AD Groups not working 372 r SSL VPN 2000 related topics by shepherd Today 11 41 AM Bd SSL VPN 200 java nio bufferunderflowexcept 329 Fr SSL VPN 200 related topics by Bonaire2006 Today 06 48 AM j Training SonicWALL offers an extensive sales and technical training curriculum for Network Administrators Security Experts and SonicWALL Medallion Partners who need to enhance their knowledge and maximize their investment in SonicWALL Products and Security Applications SonicWALL Training provides the following resources for its customers e E Training e Instructor Led Training e Custom Training e Technical Certification e Authorized Training Partners For further information visit http www sonicwall com us support training html Training amp Certification SonicWALL Training offers a comprehensive curriculum designed to help you maximize your Internet security investment Fr
6. C L2 Bridge Mode Configuring L2 Bridge Mode page 39 SonicWALL NSA E5500 Getting Started Guide Page 31 Configuring a State Sync Pair in NAT Route Mode This section provides instructions for configuring a pair of SonicWALL NSA E5500 appliances for high availability HA This section is relevant to administrators following deployment scenario B This section contains the following sub sections e Initial High Availability Setup page 32 e Configuring High Availability page 33 e Configuring Advanced HA Settings page 33 e Synchronize Settings page 35 e Adjusting High Availability Settings page 36 e Synchronizing Firmware page 36 e HA License Configuration Overview page 37 e Associating Pre Registered Appliances page 38 SonicWALL ___ HA Failover Pair Local Network Page 32 Configuring a State Sync Pair in NAT Route Mode Initial High Availability Setup Before you begin the configuration of HA on the Primary SonicWALL security appliance perform the following setup On the bottom panel of the Backup SonicWALL security appliance locate the serial number and write the number down You need to enter this number in the High Availability gt Settings page Verify that the Primary SonicWALL and Backup SonicWALL security appliances are registered running the same SonicOS Enhanced versions Make sure the Primary SonicWALL and Backup SonicWALL security appliances LAN WAN and other i
7. MY NL NO PL SE SG SI SK US Regulatory Information for Korea C2 All products with country code blank and A are made in the USA All products with country code B are made in China All products with country code C or D are made in Taiwan R O C All certificates held by NetSonic Inc Ministry of Information and Telecommunication Certification Number Copyright Notice 2007 SonicWALL Inc All rights reserved Under the copyright laws this manual or the software described within cannot be copied in whole or part without the written consent of the manufacturer except in the normal use of the software to make a backup copy The same proprietary and copyright notices must be affixed to any permitted copies as were affixed to the original This exception does not allow copies to be made for others whether or not sold but all of the material purchased with all backup copies can be sold given or loaned to another person Under the law copying includes translating into another language or format Specifications and descriptions subject to change without notice Trademarks SOnicWALL is a registered trademark of SonicWALL Inc Microsoft Windows 98 Windows Vista Windows 2000 Windows XP Windows Server 2003 Internet Explorer and Active Directory are trademarks or registered trademarks of Microsoft Corporation Netscape is a registered trademark of Netscape Communication
8. PRODUCT REFERENCE GUIDES LIBRARY e Guides for e Guides for e Guides for e Guides for e Guides for e Guides for e Guides for e Guides for e Guides for Date 1 07 17 20 07 13 20 SEARCH SITE MAP NORTH AMERICA WORLDWIDE e Recently Published UTM Firewall VPN Products Secure Remote Access Products Email Security Products Content Security Mgmt Products Backup amp Recovery Products Management amp Reporting Products Security Services SonicOS Support Services RECENTLY PUBLISHED Description 07 SonicWALL CDP 3 07 SonicWALL CDP 3 0 Site to Site Feature Module 3 06 30 2007 SonicOS Enhanced 4 0 Virtual Access Points Feature Module 06 30 2007 SonicOS Enhanced 4 0 Application Firewall Feature Module Date 06 5 06 30 2007 SonicOS Enhanced 4 0 Packet Capture Feature Module Guides for UTM FIREWALL VPN Products Description 1 03 30 2007 Hardware Failover License Synchronization 2005 SonicWALL PRO 5060 Getting Started Guide 3 08 11 2005 SonicWALL PRO 4100 Getting Started Guide 06 27 2005 SonicWALL PRO 4060 Getting Started Guide 5 06 27 2005 SonicWALL PRO 3060 Getting Started Guide 2005 SonicWALL PRO 2040 Getting Started Guide 5 06 27 20 Rack Mounting Instructions In this Section This section provides illustrated rack mounting instructions for the SonicWALL NSA E5500 e Rack Mounting Instructions page 70 SonicWALL NSA E5500 Getting Started Guide Page 69
9. 08 17 2007 14 44 08 000 Update Last Checked 08 17 2007 22 01 17 736 IPS Service Expiration Date 08 22 2007 Note Enable the Intrusion Prevention Service per zone from the Network gt Zones page IPS Global Settings CI Enable IPS Signature Groups Preven t All Detect All Log Redundancy Filter sect High Priority Attacks g F 0 Medium Priority Attacks g F 0 Low Priority Attacks U F 60 Configure IPS Settings Reset IPS Settings amp Policies Page 50 Enabling Security Services in SonicOS N In the Signature Groups table select the Prevent All and Detect All checkbox for each attack priority that you want to prevent Selecting the Prevent All and Detect All check boxes for High Priority Attacks and Medium Priority Attacks protects your network against the most dangerous and disruptive attacks To log all detected attacks leave the Log Redundancy Filter field set to zero To enforce a delay between log entries for detections of the same attack enter the number of seconds to delay Click Configure IPS Settings to enable IP packet reassembly before inspection and create a SonicWALL IPS exclusion list In the IPS Config View window select Enable IPS Exclusion List and then click Add to define a range of IP addresses whose traffic will be excluded from SonicWALL IPS scanning When finished in the Add IPS Range dialog box click OK In the IPS Config View window click OK In the Secur
10. Up or Down button is pressed while in Screen Saver mode the appliance will display the adjacent status entry To exit Screen Saver mode press the Right button SonicWALL NSA E5500 Getting Started Guide Page 11 Front Bezel Configuration Example f Press Right LAN IP Configuration ES The SonicWALL NSA E5500 is assigned the default LAN IP of 5 Press Down until X1 IP is selected four times 192 168 168 168 Complete the following steps to change it to 192 168 168 10 6 Press Right to configure X1 IP 4 IP M92 168 168 168 1 Press Right to exit screen saver mode if not at the root Ber 7 Edit X1 IP l l a Press Right ten times to select the tenth digit 2 Press Down to select the Configuration entry Alp Status gt 192 168 168 068 Wonfiguration 3 Press Right to enter Configuration Mode b Press UP or Down until the cursor displays 0 4 Input PIN 76642 by default SONIC on a phone keypad c Press Right once to select the next digit Enter PIN d Press UP or Down until the cursor displays 1 N e Press Right once to select the next digit 5 f Press Up or Down until the cursor displays 0 a Press Up or Down until the cursor displays 7 i JP press Right 192 168 168 018 b Press Up or Down until the cursor displays 6 i u press Right g Press Right to finish editing the X1 IP c Press Up or Down until the cursor displays 6 h Press Right again to confirm changes press Right d Press Up or Down until the
11. Verwenden Sie f r eine sichere Montage vier passende Be festigungsschrauben und ziehen Sie diese mit der Hand an e W hlen Sie f r die Montage einen Ort der keinem direkten Sonnenlicht ausgesetzt ist und sich nicht in der N he von W rmequellen befindet Die Umgebungstemperatur darf nicht mehr als 40 C betragen e Achten Sie darauf das sich die Netzwerkkabel nicht in der un mittelbaren N he von Stromleitungen Leuchtstoffr hren und St rquellen wie Funksendern oder Breitbandverst rkern be finden e Das beigef gte Netzkabel ist nur f r den Gebrauch in Nor damerikas Vorgesehen F r Kunden in der Europa schen Un ion EU ist ein Netzkabel nicht im Lieferumfang enthalten Stellen Sie sicher dass das Ger t vor Wasser und hoher Luft feuchtigkeit gesch tzt ist e Stellen Sie sicher dass die Luft um das Ger t herum zirkuli eren kann und die Luftungsschlitze an der Seite des Gehaus es frei sind Hier ist ein Beluftungsabstand von mindestens 26 mm einzuhalten Bringen Sie die SonicWALL waagerecht im Rack an um m gliche Gefahren durch ungleiche mechanische Belastung zu vermeiden e Prufen Sie den Anschluss des Ger ts an die Stromver sorgung damit der Uberstromschutz sowie die elektrische Leitung nicht von einer eventuellen Uberlastung der Stromver sorgung beeinflusst werden Prufen Sie dabei sorgfaltig die Angaben auf dem Aufkleber des Gerats Vergewissern Sie sich dass das Ger t sicher im Rack befes tig
12. access rule enabled in the SonicWALL security appliance Originating Zone Destination Zone Action LAN WLAN Allow DMZ or OPT Allow wa WAN and DMZ or OPT Deny Page 42 Creating Network Access Rules To create an access rule 1 On the Firewall gt Access Rules page in the matrix view click the arrow connecting the two zones that need a rule 2 On the Access Rules page click Add Access Rules WAN gt LAN Items 1__ to 3 of 3 Gele View Style OAl Rules Matrix Drop down Boxes C Priority Source Destination Service Action Users Comment Enable Configure De All X1 192 168 169 1 i Fj Any Management Server Allow Al ul 2 x Services F2 2 L any x r ar Allow Al ul A Xx Services s 13 tll Any Any Any Deny Al ul 2 X Add Restore Defaults The access rules are sorted from the most specific at the top to the least specific at the bottom of the table At the bottom of the table is the Any rule 3 Inthe Add Rule page in the General tab select Allow Deny Discard from the Action list to permit or block IP traffic General Advanced Qos Settings O S Action Allow Deny Discard From Zone To Zone Service Select a service j Source Select a network Destination Select a network Users Allowed All Schedule Always on Comment Enable Logging O Allow Fragmented Packets Ready OK Cancel Help
13. connection SonicWALL NSA E5500 Getting Started Guide Page 59 Using the Active Connections Monitor The Active Connections Monitor displays real time exportable plain text or CSV filterable views of all connections to and through the SonicWALL security appliance This tool is available on the Systems gt Diagnostics page Diagnostic Tools Diagnostic Tool Active Connections Monitor v Active Connections Monitor Settings Filter Value Group Filters Source IP CO Destination IP F Destination Port Fi Protocol All Protoc ols O Src Interface All Interfaces oO Dst Interface All Interfaces Fi Filter Logic Source IP amp amp Destination IP amp amp Destination Port amp amp Protocol amp amp Src Interface amp amp Dst Interface Apply Filters Reset Filters Export Results Take a deeper look Source IP Source Port Destination IP Destination Port Protocol Src Interface Dst Interface Tx Bytes Rx Bytes 1 69 111 163 28 35744 204 180 153 42 443 TCP XL X1 4630 229733 2 69 111 163 28 35741 204 180 153 42 443 TOP X1 x1 955 2775 Page 60 Troubleshooting Diagnostic Tools Flush active connections with the click of a button You can filter the results to display only connections matching certain criteria You can filter by Source IP Destination IP Destination Port Protocol Src Interface and Dst Interface Enter your filter criteria in the Active Connections Monitor Settings table
14. for all wireless connections through the WLAN zone that are part of a Site to Site VPN e If you wish to run WPA or WPA2 in addition to WiFiSec you can select Trust WPA WPA2 traffic as WiFiSec to accept WPA and WPA2 as allowable alternatives to IPsec e Under SonicPoint Settings select the SonicPoint Provisioning Profile you want to apply to all SonicPoints connected to this zone Whenever a SonicPoint connects to this zone it will automatically be provisioned by the settings in the SonicPoint Provisioning Profile unless you have individually configured it with different settings Optionally configure the settings on the Guest Services tab For information about configuring Guest Services see the SonicOS Enhanced Administrator s Guide When finished click OK Page 56 Deploying SonicPoints for Wireless Access Assigning an Interface to the Wireless Zone Once the wireless zone is configured you can assign an interface to it This is the interface where you will connect the SonicPoint 1 On the Network gt Interfaces page click the Configure icon in the row for the interface that you want to use for example X3 The interface must be unassigned In the Edit Interface dialog box on the General tab select WLAN or the zone that you created from the Zone drop down list Additional fields are displayed Enter the IP address and subnet mask of the Zone in the IP Address and Subnet Mask fields In the SonicPoint L
15. learning path Certified SonicWALL Global Manager CSGM Certified SonicWALL Security Administrator CSSA SonicWALL NSA E5500 Getting Started Guide Page 67 Related Documentation See the following related documents for more information e SonicOS Enhanced 5 0 Administrator s Guide e SonicOS Enhanced 5 0 Release Notes e SonicOS Enhanced 5 0 Feature Modules e Application Firewall e Dashboard e HA License Sync e Multiple Admin e NAT Load Balancing e Packet Capture e RF Management e Single Sign On e SSL Control e Virtual Access Points e SonicWALL GVC 4 0 Administrator s Guide e SonicWALL ViewPoint 4 1 Administrator s Guide e SonicWALL GAV 2 1 Administrator s Guide e SonicWALL IPS 2 0 Administrator s Guide e SonicWALL Anti Spyware Administrator s Guide e SonicWALL CFS Administrator s Guide For further information visit http www sonicwall com us support 289 html Page 68 Related Documentation SONICWALL PRODUCTS amp SOLUTIONS GO BACK TO SUPPORT RESOURCES SELF SERVE HELP Downloads Firmware Setup Tool Signatures User Forums Knowledge Portal OPEN A SUPPORT CASE Web Telephone Partner REFERENCE LIBRARY Product Guides Tech Notes FAQs Release Notes OTHER SERVICES Support Services e Support amp Consulting Services Dynamic Support Reference Guide Training amp Certification Consulting Services
16. on the appropriate product in the network diagram Hote Some demosites prompt you for a username and password Enter demo as the username and password as the password to login T3 Feed 45Mbps Internet Installed at This Site gt nannan A SonicOS Standard LAN Email Security Appliance SSL VPH 2000 load balanced pair Firmware 2 1 0 1 Other Components Microsoft Windows 2003 SP2 Active Directory Server Microsoft Exchange 2003 Server Fedora Core 4 Citrix Advanced Server 4 0 Knowledge Portal The Knowledge Portal is a resource which allows users to search for SonicWALL documents based on the following types of search tools e Browse e Search for keywords e Full text search For further information visit http www sonicwall com us support html SONICWALL KNOWLEDGE PORTAL gt Tips on Using the Knowledge Portal Search Browse To Browse for documents select a Category You will then have the option to browse by Subcategory as well Press Enter to display all documents associated with a selected Category or Subcategory Search by Keywords Enter one or more keywords in the Keywords search box to search for documents by the keywords that have been assigned to them Separate multiple keywords with a space ex vpn authentication Full text Search Or enter a search word or phrase in the Query search box to search all document text Browse by Cat
17. radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user is required to correct the interference at his own expense Complies with EN 55022 Class A and CISPR22 Class A Caution Modifying this equipment or using this equipment for purposes not shown in this manual without the written consent of SonicWALL Inc could void the user s authority to operate this equipment BMSI Statement ESHAK a F RAE e AEE P RA RRA K AGH VCCI Statement CORBI IFAABRRMHRECT ORBtRERR CHATS CEAD SRO TCEPHVET OMG AAPBOIECHR ZRT SLEDFRRENSCEPHVET VCCI A Canadian Radio Frequency Emissions Statement This Class A digital apparatus complies with Canadian ICES 003 Cet appareil num rique de la classe A est conforme a toutes la norme NMB 003 du Canada Page 78 Safety and Regulatory Information CISPR 22 EN 55022 Class A Warning This is a class A product In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures Declaration of Conformity Application of council Directive 89 336 EEC EMC and 72 23 EEC LVD Standards to which conformity is declared EN 55022 1998 A2 Class A EN 55024 1998 A2 EN 61000 3 2 2000 A2 EN 61000 3 3 1995 A1 EN 60950 1 2001 A11 National Deviations AR AT AU BE BR CA CH CN CZ DE DK FI FR GB GR HU IL IN IT JP KE KR
18. services also include crucial updates and upgrades the finest technical support Downloads u access to extensive electronic tools and timely hardware replacement e Setup Tool ie iia DYNAMIC SUPPORT User Forum Designed for customers who need continued protection through on going firmware updates Knowledge Portal and advanced technical support SonicWALL Dynamic Support is available during normal business hours or 24x7 depending on your needs OPEN A SUPPORT CASE Web SONICWALL DYNAMIC SUPPORT 24X7 Telephone Customers with mission critical network requirements cannot afford downtime Available in Partner one two and three year agreements SonicWALL Dynamic Support 24x7 is an around the clock support service that includes SonicWALL Live Product Demos Get an interactive insight into SonicWALL security products and services with the following series of multimedia product demos e Unified Threat Management Platform e Secure Cellular Wireless e Continuous Data Protection e SSL VPN Secure Remote Access e Content Filtering e Secure Wireless Solutions e Email Security e GMS and ViewPoint For further information visit http www sonicwall com us products resources 2198 html SONICWALL LIVE DEMOSITE Welcome to the SonicWALL Live Demosite Hover over each product in the network illustration below to learn more about the individual product installations To launch a SonicWALL product demo simply click
19. the operation of the 802 11a radio bands The e SonicPoint has two separate radios built in Therefore it can send and receive on both the 802 11a and 802 11g bands at the same time 5 The settings in the 802 11a Radio and 802 11a Advanced tabs are similar to the settings in the 802 11g Radio and 802 11g Advanced tabs 6 When finished click OK Configuring a Wireless Zone You can configure a wireless zone on the Network gt Zones page Typically you will configure the WLAN zone for use with SonicPoints 1 On the Network gt Zones page in the WLAN row click the icon in the Configure column Note 2 Inthe Edit Zone dialog box on the General tab the Allow Interface Trust setting automates the creation of Access Rules to allow traffic to flow between the interfaces of a zone instance For example if the WLAN Zone has both the X2 and X3 interfaces assigned to it checking Allow Interface Trust on the WLAN Zone creates the necessary Access Rules to allow hosts on these interfaces to communicate with each other 3 Select the checkboxes for the security services to enable on this zone Typically you would enable Gateway Anti Virus IPS and Anti Spyware If you are running SonicWALL Client Anti Virus select Enable Client AV Enforcement Service In the Wireless Settings section select Only allow traffic generated by a SonicPoint to allow only traffic from SonicWALL SonicPoints to enter the WLAN Zone interface This allo
20. the same object for instance you can specify that an internal server use one IP address when accessing Telnet servers and to use a totally different IP address for all other protocols Because the NAT engine in SonicOS Enhanced supports inbound port forwarding it is possible to hide multiple internal servers off the WAN IP address of the SonicWALL security appliance The more granular the NAT Policy the more precedence it takes Before configuring NAT Policies you must create all Address Objects associated with the policy For instance if you are creating a One to One NAT policy first create Address Objects for your public and private IP addresses Address Objects are one of four object classes Address User Service and Schedule in SonicOS Enhanced These Address Objects allow for entities to be defined one time and to be re used in multiple referential instances throughout the SonicOS interface For example take an internal Web server with an IP address of 67 115 118 80 Rather than repeatedly typing in the IP address when constructing Access Rules or NAT Policies Address Objects allow you to create a single entity called My Web Server as a Host Address Object with an IP address of 67 115 118 80 This Address Object My Web Server can then be easily and efficiently selected from a drop down menu in any configuration screen that employs Address Objects as a defining criterion Since there are multiple types of net
21. the settings for the capture Once the configuration is complete click Start to begin capturing packets The settings available in the five main areas of configuration are summarized below e General number of bytes to capture wrap capture buffer e Capture Filter interfaces packet types source destination e Display Filter interfaces packet types source destination e Logging automatic transfer of buffer to FTP server e Advanced generated packets GMS syslog management Using Ping Ping is available on the System gt Diagnostics page Refresh Tech Support Report CI VPN Keys ARP Cache DHCP Bindings IKE Info Download Report Diagnostic Tools Diagnostic Tool Ping a z Active Connections Monitor Ping Multi Core Monitor Core Monitor Ping host or IP addre Link Monitor Go DNS Name Lookup Find Network Path g Core 0 Process Monitor Real time Black List Lookup Namena Mama Nanalitian The Ping test bounces a packet off a machine on the Internet and returns it to the sender This test shows if the SonicWALL security appliance is able to contact the remote host If users on the LAN are having problems accessing services on the Internet try pinging the DNS server or another machine at the ISP location If the test is unsuccessful try pinging devices outside the ISP If you can ping devices outside of the ISP then the problem lies with the ISP
22. time The following products and services are available for the SonicWALL NSA E5500 e Service Bundles e Client Server Anti Virus Suite e Comprehensive Gateway Security Suite e Gateway Services e Gateway AV e Anti Spyware e Intrusion Prevention Service e Content Filtering Standard Edition e Content Filtering Premium Edition e VPN Policy Upgrade for site to site VPN e Stateful High Availability HA Upgrade e Application Firewall Page 16 Registering and Licensing Your Appliance on Mysonicwall com Desktop and Server Software e Enforced Client Anti Virus and Anti Spyware e Global VPN Client e Global VPN Client Enterprise e Global Security Client e ViewPoint Support Services e Dynamic Support 24x7 e Software and Firmware Updates Consulting Services e Implementation Service e GMS Preventive Maintenance Service To manage your licenses perform the following tasks 1 In the mysonicwall com Service Management Associated Products page check the Applicable Services table for services that your SonicWALL appliance is already licensed for Your initial purchase may have included security services or other software bundled with the appliance These licenses are enabled on mysonicwall com when the SonicWALL appliance is delivered to you If you purchased a service subscription or upgrade from a sales representative separately you will have an Activation Key for the product This key is emailed to you after
23. to mysonicwall com 8 Click Register 2 Inthe left navigation bar click My Products 3 On the My Products page under Registered Products scroll down to find the appliance that you want to use as the parent or primary unit Click the product name or If You Are Following Proceed to Section serial number Scenario 4 On the Service Management Associated Products page B NAT with State Sync Pair Additional Deployment Configuration scroll down to the Associated Products section 5 Under Associated Products click HA Secondary Page 38 Configuring a State Sync Pair in NAT Route Mode Configuring L2 Bridge Mode This section provides instructions to configure the SonicWALL NSA E5500 appliance in tandem with an existing Internet gateway device This section is relevant to users following deployment scenario C This section contains the following sub sections e Connection Overview page 39 e Configuring the Primary Bridge Interface page 39 e Configuring the Secondary Bridge Interface page 40 Connection Overview Connect the X1 port on your SonicWALL NSA E5500 to the LAN port on your existing Internet gateway device Then connect the XO port on your SonicWALL to your LAN Network Gateway SonicWALL NSA E Class LAN Internet or LAN Segment 2 Network Resources Configuring the Primary Bridge Interface The primary bridge interface is your existing Internet gateway device The only step involv
24. would like for the access rule to timeout after a different period of UDP inactivity set the amount of time in minutes in the UDP Connection Inactivity Timeout minutes field The default value is 30 minutes e Specify the number of connections allowed as a percent of maximum number of connections allowed by the SonicWALL security appliance in the Number of connections allowed of maximum connections field e Select Create a reflexive rule if you want to create a matching access rule to this one in the opposite direction from your destination zone or address object to your source zone or address object Page 44 Creating a NAT Policy 5 Click on the QoS tab if you want to apply DSCP or 802 1p Quality of Service coloring marking to traffic governed by this rule See the SonicOS Enhanced Administrator s Guide for more information on managing QoS marking in access rules 6 Click OK to add the rule Creating a NAT Policy The Network Address Translation NAT engine in SonicOS Enhanced allows users to define granular NAT policies for their incoming and outgoing traffic By default the SonicWALL security appliance has a preconfigured NAT policy to allow all systems connected to the LAN interface to perform Many to One NAT using the IP address of the WAN interface and a policy to not perform NAT when traffic crosses between the other interfaces You can create multiple NAT policies on a SonicWALL running SonicOS Enhanced for
25. ALL NSA E5500 Pre Configuration Tasks In this Section This section provides pre configuration information Review this section before setting up your SonicWALL NSA E5500 e Check Package Contents page 4 e Obtain Configuration Information page 5 e The Front Panel page 6 e The Back Panel page 7 e Front Bezel Control Features page 8 e Front Bezel Configuration Example page 12 SonicWALL NSA E5500 Getting Started Guide Page 3 Check Package Contents Before setting up your SonicWALL NSA E5500 verify that your package contains the following parts SonicWALL NSA E5500 Release Notes amp DB9 gt RJ45 CLI Cable Global Support Services Guide Standard Power Cord SonicWALL Resource CD Rack Kit Thank You Card Ethernet Cable Getting Started Guide Red Crossover Cable SONICWALL gt Any Items Missing If any items are missing from your package please contact SonicWALL support A listing of the most current support options is available online at lt http www sonicwall com us support html gt The included power cord is intended for use in North America only For European Union EU customers a power cord is not included Page 4 Check Package Contents SONICWALL gt Obtain Conf
26. In large or complex networks a larger value may improve network stability during a failover Click the Include Certificates Keys checkbox to have the appliances synchronize all certificates and keys Page 34 Configuring a State Sync Pair in NAT Route Mode 10 11 Click Synchronize Settings to synchronize the settings between the Primary and Backup appliances Click Synchronize Firmware if you previously uploaded new firmware to your Primary unit while the Secondary unit was Offline and it is now online and ready to upgrade to the new firmware Synchronize Firmware is typically used after taking your Secondary appliance offline while you test a new firmware version on the Primary unit before upgrading both units to it Click Apply to retain the settings on this screen Synchronize Settings Once you have configured the HA setting on the Primary SonicWALL security appliance click the Synchronize Settings button You should see a HA Peer Firewall has been updated message at the bottom of the management interface page Also note that the management interface displays Logged Into Primary SonicWALL Status green ball Active in the upper right hand corner By default the Include Certificate Keys setting is enabled This specifies that Certificates CRLs and associated settings such as CRL auto import URLs and OCSP settings are synchronized between the Primary and Backup units When Local Certificates are copied to the Backup
27. Menu Upon booting the LCD display will initially show the Main Menu The menu is made up of four options Status Configure Festart Safe Mode Contains basic status values including system resources connections and port configuration values Allows configuration of basic system values including XO LAN and X1 WAN port configuration Requires system pin for access default 76642 Provides the ability to restart the appliance Requires system pin for access Provides the ability to restart and boot the appliance into SafeMode Requires system pin for access Use the Up and Down button to select the menu you wish to enter and click the Right button to enter it Status The Status menu allows you to view specific aspects of the appliance Once selected the LCD displays the Status List This list is navigated using the Up and Down buttons Status options available include e Appliance serial number e Firmware ROM versions e Appliance name e Date and Time e Uptime e CPU statistical readings e Current number of connections e Interface X0 X1 network settings e Interface X0 X1 data transfer statistics The X1 DNS1 3 entries will only be displayed ifthey have been set from the Configure menu Iftheir value is still 0 0 0 0 default value they will not appear in the Status List SonicWALL NSA E5500 Getting Started Guide Page 9 Configure The Configure Menu allows you to configure specific asp
28. Rack Mounting Instructions Assemble the Slide Rail he U Z 4 O 4 N z U U N lt r U N LL M4 SCREW 8 WASHERS 8 Page 70 Rack Mounting Instructions Assemble the Slide Rail Fasten two sided screws to the rail 0 0 S o LI x os ne mW Wa SonicWALL NSA E5500 Getting Started Guide Page 71 Assemble Inner Rail to Chassis Fasten 6 screws to attach the inner channel onto the chassis M4 SCREW 6 Page 72 Rack Mounting Instructions Insert Chassis to Frame cm Soe O 4 S C g9 la U T C S o oO u Push hook down to separate SonicWALL NSA E5500 Getting Started Guide Page 73 Page 74 Rack Mounting Instructions Product Safety and Regulatory Information In this Section This section provides regulatory along with trademark and copyright information Safety and Regulatory Information page 76 Safety and Regulatory Information in German page 77 FCC Part 15 Class A Notice page 78 Canadian Radio Frequency Emissions Statement page 78 CISPR 22 EN 55022 Class A page 78 Regulatory Information for Korea page 78 Copyright Notice page 79 Trademarks page 79 SonicWALL NSA E5500 Getting Started Guide Page 75 Safety and Regulatory Information Regulatory Model Type Product Name 1RK12 050 E5500 Rack Mounting the SonicWALL The above Sonic
29. Select the from and to zones from the From Zone and To Zone menus Select the service or group of services affected by the access rule from the Service list If the service is not listed you must define the service in the Add Service window Select Create New Service or Create New Group to display the Add Service window or Add Service Group window Select the source of the traffic affected by the access rule from the Source list Selecting Create New Network displays the Add Address Object window Select the destination of the traffic affected by the access rule from the Destination list Selecting Create New Network displays the Add Address Object window From the Users Allowed menu add the user or user group affected by the access rule Select a schedule from the Schedule menu The default schedule is Always on Enter any comments to help identify the access rule in the Comments field SonicWALL NSA E5500 Getting Started Guide Page 43 A Click on the Advanced tab General Advanced Qos Advanced Settings TCP Connection Inactivity Timeout minutes 5 UDP Connection Inactivity Timeout seconds 30 Number of connections allowed of maximum connections 100 CI Create a reflexive rule e If you would like for the access rule to timeout after a different period of TCP inactivity set the amount of time in minutes in the TCP Connection Inactivity Timeout minutes field The default value is 60 minutes e If you
30. WALL appliances are designed to be mounted in a standard 19 inch rack mount cabinet The following conditions are required for proper installation Use the mounting hardware recommended by the rack manu facturer and ensure that the rack is adequate for the applica tion Four mounting screws compatible with the rack design must be used and hand tightened to ensure secure installation Choose a mounting location where all four mounting holes line up with those of the mounting bars of the 19 inch rack mount cabinet Mount in a location away from direct sunlight and sources of heat A maximum ambient temperature of 104 F 40 C is recommended Route cables away from power lines fluorescent lighting fix tures and sources of noise such as radios transmitters and broadband amplifiers The included power cord is intended for use in North America only For European Union EU customers a power cord is not included Ensure that no water or excessive moisture can enter the unit Allow unrestricted airflow around the unit and through the vents on the side of the unit A minimum of 1 inch 25 44mm clearance is recommended Mount the SonicWALL appliances evenly in the rack in order to prevent a hazardous condition caused by uneven mechan ical loading Consideration must be given to the connection of the equip ment to the supply circuit The effect of overloading the circuits Page 76 Safety and Regulatory Information has minimal i
31. WALL is under a heavy load SonicWALL NSA E5500 Getting Started Guide Page 33 Set the Probe Level for the interval in seconds between communication with upstream or downstream systems SonicWALL recommends that you set the interval for at least 5 seconds You can set the Probe IP Address es on the High Availability gt Monitoring screen Typically SonicWALL recommends leaving the Failover Trigger Level missed heart beats Election Delay Time seconds and Dynamic Route Hold Down Time fields to their default settings These fields can be tuned later as necessary for your specific network environment The Failover Trigger Level sets the number of heartbeats that can be missed before failing over The Election Delay Time is the number of seconds allowed for internal processing between the two units in the HA pair before one of them takes the primary role The Dynamic Route Hold Down Time setting is used when a failover occurs on a HA pair that is using either RIP or OSPF dynamic routing When a failover occurs Dynamic Route Hold Down Time is the number of seconds the newly active appliance keeps the dynamic routes it had previously learned in its route table During this time the newly active appliance relearns the dynamic routes in the network When the Dynamic Route Hold Down Time duration expires it deletes the old routes and implements the new routes it has learned from RIP or OSPF The default value is 45 seconds
32. ance and use your current configuration settings upon startup Saal Tip The appliance must be properly registered before it can be upgraded Refer to Registering and Licensing Your Appliance on Mysonicwall com page 15 for more information 1 Download the SonicOS Enhanced firmware image file from mysonicwall com and save it to a location on your local computer 2 Onthe System gt Settings page click Upload New Firmware 3 Browse to the location where you saved the SonicOS Enhanced firmware image file select the file and click the Upload button 4 On the System gt Settings page click the Boot icon in the row for Uploaded Firmware 5 Inthe confirmation dialog box click OK The SonicWALL restarts and then displays the login page 6 Enter your user name and password Your new SonicOS Enhanced image version information is listed on the System gt Settings page Page 30 Initial Setup Upgrading the Firmware with Factory Defaults Perform the following steps to upload new firmware to your SonicWALL appliance and start it up using the default configuration 1 Download the SonicOS Enhanced firmware image file from mysonicwall com and save it to a location on your local computer 2 On the System gt Settings page click Create Backup Click Upload New Firmware 4 Browse to the location where you saved the SonicOS Enhanced firmware image file select the file and click the Upload button 5 Onthe System gt Se
33. at can share the Security Services licenses with your primary SonicWALL Note Your SonicWALL NSA E5500 does not need to be powered on during account creation or during the mysonicwall com registration and licensing process Page 14 Before You Register Note After registering a new SonicWALL appliance on mysonicwall com you must also register the appliance from the SonicOS management interface This allows the unit to synchronize with the SonicWALL License Server and to share licenses with the associated appliance if any See Accessing the Management Interface page 26 If you already have a mysonicwall com account go to Registering and Licensing Your Appliance on Mysonicwall com page 15 to register your appliance on mysonicwall com Creating a Mysonicwall com Account To create a mysonicwall com account perform the following steps 1 In your browser navigate to www mysonicwall com 2 Inthe login screen click If you are not a registered user Click here SONICWALL MySonicWALL LOGIN SONICWALL PRODUCTS an APPLICATIONS if MARKETS SUPPORT HOW TO BUY CHANNEL PARTNERS COMPANY FAQ KNOWLEDGE PORTAL Forgot Password Click her SonicALERT you are not a registered user Click here 3 Complete the Registration form and then click Register gt 5 Inthe screen confirming that your account was created click Continue Verify that the information is correct and then click Submit Reg
34. ated in the port of the security appliance e Some browsers may not launch the Setup Wizard automatically In this case e Log into SonicWALL NSA E5500 using admin as the user name and password as the password e Click the Wizards button on the System gt Status page e Select Setup Wizard and click Next to launch the Setup Wizard e Some pop up blockers may prevent the launch of the Setup Wizard You can temporarily disable your pop up blocker or add the management IP address of your SonicWALL 192 168 168 168 by default to your pop up blocker s allow list Connecting to Your Network SonicWALL NSA E5500 Internet 2 LAN Zone WLAN Zone The SonicWALL NSA E5500 ships with the internal DHCP server active on the LAN port However if a DHCP server is already active on your LAN the SonicWALL will disable its own DHCP server to prevent conflicts As shown in the illustration on this page ports X1 and XO are preconfigured as WAN and LAN respectively The remaining ports X2 X7 can be configured to meet the needs of your network In the graphical example on this page the zones are X1 WAN X0 LAN X2 WLAN X7 DMZ Refer to the SonicOS Enhanced Administrator s Guide for advanced configuration deployments Testing Your Connection 1 After you exit the Setup Wizard the login page reappears Log back into the Management Interface and verify your IP and WAN connection Ping a site outsid
35. ck Stop The SonicOS user interface provides three windows to display different views of the captured packets e Captured Packets e Packet Detail e Hex Dump Captured Packets I Items 1 to 50 of 115 CERE Time Ingress Egress Source IP Destination IP Tu a ISrc Status 1 cite x1 i _ _ 0x26 _ DROPPED 60 60 2 08 09 2007 04 38 51 864 X 1 204 180 153 24 204 180 153 1 ARP Request DROPPED 60 60 3 08 09 2007 04 38 53 192 X1 0x26 DROPPED 60 60 4 08 09 2007 04 38 53 368 Xi 192 168 100 99 192 168 100 1 ARP Request DROPPED 60 60 5 08 09 2007 04 38 53 592 X 204 180 153 108 204 180 153 109 ARP Request _ DROPPED 60 60 6 08 09 2007 04 38 54 368 Xi 192 168 100 99 192 168 100 1 ARP Request DROPPED 60 60 7 08 09 2007 04 38 54 592 X 204 180 153 108 204 180 153 109 ARP Request DROPPED 60 60 8 08 09 2007 04 38 55 192 X 1 _ _ 0x26 DROPPED 60 60 v Time Ingress Egress SourceIP Destination IP Ether Type Packet Type Ports Src Dst Status Length Actual Packet Detail Ethernet Header Ether Type 0x26 0x26 Src 00 03 e3 dc b8 a4 Dst 01 80 c2 00 00 00 Ethernet Type Unknown Value 0 DROPPED Module Name fwCore Drop String Unknown Ether type Line 1376 Function inputHook 1 1 Hex Dump 0180c200 00000003 e3dcb8a4 00264242 03000000 00008000 amp BB es eee Click the Configure button to customize
36. confirm The SonicWALL security appliance changes to SafeMode The Test light starts blinking when the SonicWALL security appliance has rebooted into SafeMode Point the Web browser on your computer to 192 168 168 168 The SafeMode management interface displays If you have made any configuration changes to the security appliance select the Create Backup On Next Boot checkbox to make a backup copy of your current settings Your settings will be saved when the appliance restarts Click Upload New Firmware and then browse to the location where you saved the SonicOS Enhanced firmware image select the file and click the Upload button D en If You Are Following Scenario Select the boot icon in the row for one of the following e Uploaded Firmware New Use this option to restart the appliance with your current configuration settings e Uploaded Firmware with Factory Defaults New Use this option to restart the appliance with default configuration settings In the confirmation dialog box click OK to proceed After successfully booting the firmware the login screen is displayed If you booted with factory default settings enter the default user name and password admin password to access the SonicWALL management interface Proceed to Section A NAT Route Mode Additional Deployment Configuration Gateway page 41 B NAT with State Sync Pair Configuring a State Sync Pair in NAT Route Mode page 32
37. cursor displays 4 press Right e Press Up or Down until the cursor displays 2 press Right Enter PIM aa Sa Ba Ee E Page 12 Front Bezel Configuration Example Registering Your Appliance on Mysonicwall com amp In this Section This section provides instructions for registering your SonicWALL NSA E5500 e Before You Register page 14 e Creating a Mysonicwall com Account page 15 e Registering and Licensing Your Appliance on Mysonicwall com page 15 e Registering a Second Appliance as a Backup page 18 Note Registration is an important part of the setup process and is necessary in order to receive the benefits of SonicWALL security services firmware updates and technical support SonicWALL NSA E5500 Getting Started Guide Page 13 Before You Register You need a mysonicwall com account to register the SonicWALL NSA E5500 You can create a new mysonicwall com account on www mysonicwall com or directly from the SonicWALL management interface This section describes how to create an account by using the Web site You can use mysonicwall com to register your SonicWALL appliance and activate or purchase licenses for Security Services ViewPoint Reporting and other services support or software before you even connect your device This allows you to prepare for your deployment before making any changes to your existing network For a High Availability configuration you must use mysonicwall com to associate a backup unit th
38. cwall com 2 Copy the new SonicOS Enhanced image file to a convenient location on your management station Saving a Backup Copy of Your Preferences Before beginning the update process make a system backup of your SonicWALL security appliance configuration settings The backup feature saves a copy of the current configuration settings on your SonicWALL security appliance protecting all your existing settings in the event that it becomes necessary to return to a previous configuration state In addition to using the backup feature to save your current configuration state to the SonicWALL security appliance you can export the configuration preferences file to a directory on your local management station This file serves as an external backup of the configuration preferences and can be imported back into the SonicWALL security appliance Perform the following procedures to save a backup of your configuration settings and export them to a file on your local management station 1 On the System gt Settings page click Create Backup Your configuration preferences are saved The System Backup entry is displayed in the Firmware Management table 2 To export your settings to a local file click Export Settings A popup window displays the name of the saved file SonicWALL NSA E5500 Getting Started Guide Page 29 Upgrading the Firmware with Current Settings Perform the following steps to upload new firmware to your SonicWALL appli
39. d 35661 X1 admin 443 X1 a 08 09 2007 Notice Network UDP packet 204 180 153 100 239 255 255 250 UDP Po 95 52 19 000 Access dropped 33111 X1 1900 1900 SonicWALL NSA E5500 Getting Started Guide Page 61 Deployment Configuration Reference Checklist Use this checklist to find more information about various deployment tasks within the SonicOS Enhanced Administrator s Guide For this Task Inspecting the rule base for inbound and outbound rules See this Chapter Configuring Access Rules Setting logging levels Configuring Log Categories Logging Level section Configuring threat prevention on all used zones Configuring Zones Enabling SonicWALL Security Services on Zones section Configuring Web filtering protection Configuring SonicWALL Content Filtering Service Changing administrator login Configuring Administration Settings Administrator Name amp Password section Setting administrator email Configuring Log Automation Email Log Automation section Disabling HTTP and ping access Configuring Interfaces Configuring Advanced Settings for the Interfaces section Disabling or enabling DHCP Setting Up the DHCP Server Configuring user management Managing Users and Authentication Settings Configuring VPN policies Configuring VPN Policies Securing Wireless Access Managing SonicPoints Page 62 Deployment Configurat
40. dividual data packets that traverse your SonicWALL firewall appliance The captured packets contain both data and addressing information The System gt Packet Capture page provides a way to configure the capture criteria display settings and file export settings and displays the captured packets Packet Capture Refresh Packet Capture Trace off Buffer size 8000 KB 115 Packets captured Buffer is 0 full O MB of Buffer lost in Fr logging off FTP Server Pass Failure count 0 0 FTP Thread is Idle Buffer status OK n Current Buffer Statistics 87 Dropped 0 Forwarded 14 Consumed 14 Generated 0 Unknowns n n n Current Configurations Filters d General 1 Logging 3 I Configure Start Stop Reset Refresh Export as M S r n P m P Captured Packets z Items 1 to 50 of 115 a A Time Ingress Egress Source IP Destination IP aoe Status een 08 09 2007 HN _ a gt es 04 38 51 208 X1 i 0x26 DROPPED 60 60 08 09 2007 2 ZEN x 204 180 153 24 204 180 153 1 ARP R t DROPPED 60 60 04 38 51 864 anes 50 OOAD xi gt 0x26 5 DROPPED 60 60 04 38 53 192 The Packet Capture screen has buttons for starting and stopping a packet capture If you simply click Start without any configuration the SonicWALL appliance will capture all packets except those for internal communication and will stop when the buffer is full or when you cli
41. e computer you use to manage the SonicWALL NSA E5500 must be set up to accept a dynamic IP address or have an unused IP address on the 192 168 168 x 24 subnet such as 192 168 168 20 To access the SonicOS Enhanced Web based management interface 1 Start your Web browser Note Disable pop up blocking software or add the management IP address http 192 168 168 168 to your pop up blocker s allow list 2 Enter http 192 168 168 168 the default LAN management IP address in the Location or Address field 3 The SonicWALL Setup Wizard launches and guides you through the configuration and setup of your SonicWALL NSA E5500 The Setup Wizard launches upon initial loading of the SonicWALL NSA E5500 management interface 4 Follow the on screen prompts to complete the Setup Wizard Depending on the changes made during your setup configuration the SonicWALL may restart Page 26 Initial Setup Using the Setup Wizard If you cannot connect to the SonicWALL NSA E5500 or the Setup Wizard does not display verify the following configurations e Did you correctly enter the SonicWALL NSA E5500 management IP address in your Web browser e Are the Local Area Connection settings on your computer set to use DHCP or set to a static IP address on the 192 168 168 x 24 subnet e Do you have the Ethernet cable connected to your computer and to the X0 LAN port on your SonicWALL e Is the connector clip on your network cable properly se
42. e of your local network such as lt http www sonicwall com gt Open another Web browser and navigate to lt http www sonicwall com gt If you can view the SonicWALL home page you have configured your SonicWALL NSA E5500 correctly If you cannot view the SonicWALL home page renew your management station DHCP address If you still cannot view a Web page try one of these solutions e Restart your Management Station to accept new network settings from the DHCP server in the SonicWALL security appliance e Restart your Internet Router to communicate with the DHCP Client in the SonicWALL security appliance SonicWALL NSA E5500 Getting Started Guide Page 27 Activating Licenses in SonicOS Manual upgrade using the license keyset is useful when your appliance is not connected to the Internet The license keyset After completing the registration process in SonicOS you must includes all license keys for services or software enabled on perform the following tasks to activate your licenses and enable mysonicwall com It is available on mysonicwall com at the top your licensed services from within the SonicOS user interface of the Service Management page for your SonicWALL appliance e Activate licenses e Enable security services To activate licenses in SonicOS e Apply services to network zones 1 Navigate to the System gt Licenses page This section describes how to activate your licenses For 2 peter Ae Security Services Onl
43. ects of the appliance Once selected the LCD will display a PIN request Note The Default PIN is 76642 This number spells SONIC on a phone keypad The PIN number can be changed from the System gt Administration page All numbers are inputted using the 4 buttons Select the individual digit field using the Left and Right button and select the desired number using the Up and Down Button Digits increase incrementally from 0 to 9 Press the Right button to confirm your PIN and enter the Configuration Menu The appliance allows the user to navigate in and out of the Configuration Menu without having to re enter the PIN However once the appliance enters Screen Saver Mode whether from the 6 second time out or from pressing the Left button from the Main Menu the PIN number must be re entered again to access the Configuration Menu Page 10 Front Bezel Control Features After entering a new value for a setting in the configuration menu you are asked if you want to commit changes Using the 4 way D pad press the Right button for yes or the Left button for no Commit Changes No Tes gt If you choose yes the screen notifies you that the settings are updated Settings Updated Configuration Options This option allows you to configure network port settings for the appliance Once selected the LCD displays a list of configurable options Status options available include e XQ IP and subnet e xX1 Mode e xX1 IP and s
44. ed in setting up your primary bridge interface is to ensure that the WAN interface is configured for a static IP address You will need this static IP address when configuring the secondary bridge Note The Primary Bridge Interface must have a Static IP assignment SonicWALL NSA E5500 Getting Started Guide Page 39 Configuring the Secondary Bridge Interface Complete the following steps to configure the SonicWALL appliance Navigate to the Network gt Interfaces page from the 1 2 navigation panel Click the Configure icon in the right column of the XO LAN interface SONICWALL Network Security Appliance General Advanced VLAN Filtering Interface X0 Settings Zone IP Assignment Bridged to Comment Management User Login Layer 2 Bridged Mode x1 E Block all non IPv4 traffic J C Never route traffic on this bridge pair Default LAN HTTP HTTPS Ping O snmp M SSH O HTTP O HTTPS Add rule to enable redirect from HTTP to HTTPS In the IP Assignment drop down select Layer 2 Bridged Mode In the Bridged to drop down select the X1 interface Configure management options HTTP HTTPS Ping SNMP SSH User logins or HTTP redirects Page 40 Configuring L2 Bridge Mode Note Do not enable Never route traffic on the bridge pair unless your network topology requires that all packets entering the L2 Bridge remain on the L2 Bridge segments You may o
45. ed in the Parent Product section as well as a Status value of 0 in the Associated Products Child Product Type section 7 Although the Stateful High Availability Upgrade and all the Security Services licenses can be shared with the HA Primary unit you must purchase a separate ViewPoint license for the backup unit This will ensure that you do not miss any reporting data in the event of a failover You must also purchase a seperate support license for the backup unit Under DESKTOP amp SERVER SOFTWARE click Buy Now for ViewPoint Follow the instructions to complete the purchase To return to the Service Management Associated Products page click the serial number link for this appliance Congratulations Your SonicWALL NSA E5500 or E5500 HA Pair is now registered and licensed on mysonicwall com To complete the registration process in SonicOS and for more information see e Accessing the Management Interface page 26 e Activating Licenses in SonicOS page 28 e Enabling Security Services in SonicOS page 48 e Applying Security Services to Network Zones page 52 Deployment Scenarios In this Section This section provides detailed overviews of advanced deployment scenarios as well as configuration instructions for connecting your SonicWALL NSA E5500 e Selecting a Deployment Scenario page 20 e Scenario A NAT Route Mode Gateway page 21 e Scenario B State Sync Pair in NAT Route Mode page 22 e Scenario C L2 Br
46. egory None Keyword Search Search Results 100 Sort Results by Occurrences Usage SonicOS Network Security Zone Defined 7 7105 This document defines a network security zone as configured on SonicWALL firewall UTM appliances running SonicOS Enhanced firmware 2 Wireless Prompt for WGS authentication after successful connection with WiFiSec SonicOS Enhanced 8 1 06 Covers issue when successfully connection to GVC you are still prompted for authentication through WGS 3 SonicOS Secure Wireless Bridging Between TZ170s running SonicOS Standard PDF HTML 4 11 06 Covers the implementation of Secure Wireless Bridging between two TZ 170W products running SonicOS Standard Excerpted from SonicOS Standard 3 1 Admin Guide 4 SonicOS Recover or Reset the Administrator Password on Appliances Running Firmware 6 x SonicOS Enhanced or SonicOS Standard 6 15 07 This document covers resetting the administrator password on SonicWALL firewall UTM appliances running SonicOS Enhanced SonicOS Standard or Firmware 6 x SonicWALL NSA E5500 Getting Started Guide Page 65 User Forums The SonicWALL User Forums is a resource that provides users the ability to communicate and discuss a variety of security and appliance subject matters In this forum the following categories are available for users e Content Security Manager topics e Continuous Data Protection topics e Email Security related topics e Firewall related
47. er If you are using the Monitor Interfaces feature experiment with disconnecting each monitored link to ensure correct configuration SonicWALL NSA E5500 Getting Started Guide Page 35 Adjusting High Availability Settings On the High Availability gt Settings page there are four user configurable timers that can be adjusted to suit your network s needs e Heartbeat Interval seconds This timer is the length of time between status checks By default this timer is set to 5 seconds using a longer interval will result in the SonicWALL taking more time to detect when if failures have occurred e Failover Trigger Level missed heart beats This timer is the number of heartbeats the SonicWALL will miss before failing over By default this time is set to 5 missed heart beats This timer is linked to the Heartbeat Interval timer for example if you set the Heartbeat Interval to 10 seconds and the Failover Trigger Level timer to 5 it will be 50 seconds before the SonicWALL fails over e Probe Interval This timer controls the path monitoring speed Path monitoring sends pings to specified IP addresses to monitor that the network critical path is still reachable The default is 20 seconds and the allowed range is from 5 to 255 seconds e Election Delay Time This timer can be used to specify an amount of time the SonicWALL will wait to consider an interface up and stable and is useful when dealing with switch ports tha
48. estrict Transfer of password protected Zip files Disables the transfer of password protected ZIP files over any enabled protocol This option only functions on protocols that are enabled for inspection e Restrict Transfer of MS Office type files containing macros VBA 5 and above Disables the transfers of any MS Office 97 and above files that contain VBA macros e Restrict Transfer of packed executable files UPX FSG etc Disables the transfer of packed executable files Packers are utilities which compress and sometimes encrypt executables Although there are legitimate applications for these they are also sometimes used with the intent of obfuscation so as to make the executables less detectable by anti virus applications The packer adds a header that expands the file in memory and then executes that file SonicWALL Gateway Anti Virus currently recognizes the most common packed formats UPX FSG PKLite32 Petite and ASPack Additional formats are dynamically added along with SonicWALL GAV signature updates Click Configure Gateway AV Settings The Gateway AV Settings window allows you to configure clientless notification alerts and create a SonicWALL GAV exclusion list Gateway AV Settings C Disable SMTP Responses Disable detection of EICAR test virus Enable HTTP Byte Range requests with Gateway AV C Enable FTP REST requests with Gateway AVY Do not scan parts of files with high compression ratios HTTP Clientles
49. i irus Status Signature Database Downloaded Signature Database Timestamp UTC 08 17 2007 13 55 33 000 Update Last Checked 08 17 2007 22 01 17 736 Gateway Anti Virus Expiration Date 08 22 2007 Note Enable the Gateway Anti Virus per zone From the Network gt Zones page Gateway Anti Virus Global Settings CI Enable Gateway Anti Virus Protocols HTTP FTP IMAP SMTP POP3 CIFS Netbios TCP Stream Enable Inbound Inspection Fj o Enable Outbound Inspection o Protocol Settings Settings Settings Settings Settings Settings Settings Configure Gateway AY Settings Reset Gateway AV Settings Select the Enable Inbound Inspection checkboxes for the protocols to inspect By default SonicWALL GAV inspects all inbound HTTP FTP IMAP SMTP and POPS3 traffic Generic TCP Stream can optionally be enabled to inspect all other TCP based traffic such as non standard ports of operation for SMTP and POP3 and IM and P2P protocols The Enable Outbound Inspection feature is available for SMTP traffic such as for a mail server that might be hosted on the DMZ Enabling outbound inspection for SMTP scans mail that is delivered to the internally hosted SMTP server for viruses For each protocol you can restrict the transfer of files with specific attributes by clicking on the Settings button under the protocol In the Settings dialog box you can configure the following e R
50. iance as a Backup To ensure that your network stays protected if your SonicWALL appliance has an unexpected failure you can associate a second SonicWALL with the first in a high availability HA pair You can associate the two appliances as part of the registration process on mysonicwall com The second SonicWALL will automatically share the Security Services licenses of the primary appliance To register a second appliance and associate it with the primary perform the following steps 1 Login to your mysonicwall com account 2 On the main page in the Register A Product field type the appliance serial number and then click Next 3 On the My Products page under Add New Product type the friendly name for the appliance select the Product Group if any type the authentication code into the appropriate text boxes and then click Register 4 On the Product Survey page fill in the requested information and then click Continue The Create Association Page is displayed 5 On the Create Association Page click the radio button to select the primary unit for this association and then click Continue The screen only displays units that are not already associated with other appliances Page 18 Registering a Second Appliance as a Backup 6 On the Service Management Associated Products page scroll down to the Associated Products section to verify that your product registered successfully You should see the HA Primary unit list
51. idge Mode page 23 e Initial Setup page 24 e Configuring a State Sync Pair in NAT Route Mode page 32 e Configuring L2 Bridge Mode page 39 Ti Before completing this section fill out the information in Obtain Configuration Information page 5 and Obtain Internet Service Provider ISP Information page 5 You will need to enter this information during the Setup Wizard g SonicWALL NSA E5500 Getting Started Guide Page 19 Selecting a Deployment Scenario Before continuing select a deployment scenario that best fits your network scheme Reference the table below and the diagrams on the following pages for help in choosing a scenario Current Gateway Configuration New Gateway Configuration Use Scenario No gateway appliance Single SonicWALL NSA as a primary gateway A NAT Route Mode Gateway Pair of SonicWALL NSA appliances for high B NAT with State Sync Pair availability Existing Internet gateway appliance SonicWALL NSA as replacement for an existing A NAT Route Mode Gateway gateway appliance SonicWALL NSA in addition to an existing C L2 Bridge Mode gateway appliance Existing SonicWALL gateway appliance SonicWALL NSA in addition to an existing B NAT with State Sync Pair SonicWALL gateway appliance SonicWALL z 5 Internet or HA Failover Pair ove ee LAN Segment 2 DMZ Zone Local Network LAN Zone Scenario A NAT Route Mode Gateway page 21 Scenario B State Sy
52. ie N X A f tr amp 4 a NSA E5500 Getting Started Guide SonicWALL Ec Ass SSS SONICWALL gt PROTECTION AT THE SPEED OF BUSINESS SonicWALL NSA E5500 Getting Started Guide This Getting Started Guide provides instructions for basic installation and configuration of the SonicWALL Network Security Appliance NSA E5500 running SonicOS Enhanced After you complete this guide computers on your Local Area Network LAN will have secure Internet access Document Contents This document contains the following sections Gy Pre Configuration Tasks page 3 Registering Your Appliance on Mysonicwall com page 13 o Deployment Scenarios page 19 Additional Deployment Configuration page 41 Support and Training Options page 63 Q Rack Mounting Instructions page 69 G Product Safety and Regulatory Information page 75 SONICWALL gt SonicWALL NSA E5500 Getting Started Guide Page 1 SonicWALL NSA E5500 Front SONICWALL Network Security Appliance Form Factor Dimensions Back Weight x WEEE Weight 1U rack mountable 17x 16 75 x 1 75 in 43 18 x 42 54 x 4 44 cm 17 30 Ibs 7 9 kg 17 30 Ibs 7 9 kg Note Always observe proper safety and regulatory guidelines when removing administrator serviceable parts from the SonicWALL NSA E5500 Proper guidelines can be found in the Safety and Regulatory Information section on page 76 of this guide Page 2 SonicW
53. iguration Information Please record and keep for future reference the following setup information Registration Information Serial Number Record the serial number found on the bottom panel of your SonicWALL appliance Authentication Code Record the authentication code found on the bottom panel of your SonicWALL appliance Networking Information LAN IP Address Select a static IP address for your SonicWALL appliance that is within the range of your local subnet If you are unsure you can use the default IP address 192 168 168 168 Subnet Mask Record the subnet mask for the local subnet where you are installing your SonicWALL appliance Ethernet WAN IP Address Select a static IP address for your Ethernet WAN This setting only applies if you are already using an ISP that assigns a Static IP address Administrator Information Admin Name Select an administrator account name default is admin Admin Password Select an administrator password default is password Obtain Internet Service Provider ISP Information Record the following information about your current Internet service If You connect using Please record DHCP No information is usually required Some providers may require a Host name Static IP IP Address Subnet Mask Default Gateway Primary DNS DNS 2 optional DNS 3 optional
54. imit field select the maximum number of SonicPoints allowed on this interface If you want to enable remote management of the SonicWALL security appliance from this interface select the supported management protocol s HTTP HTTPS SSH Ping SNMP and or SSH If you want to allow selected users with limited management rights to log in to the security appliance select HTTP and or HTTPS in User Login Click OK Connecting the SonicPoint When a SonicPoint unit is first connected and powered up it will have a factory default configuration IP Address 192 168 1 20 username admin password password Upon initializing it will attempt to find a SonicOS device with which to peer If it is unable to find a peer SonicOS device it will enter into a stand alone mode of operation with a separate stand alone configuration allowing it to operate as a standard Access Point If the SonicPoint locates a peer SonicOS device via the SonicWALL Discovery Protocol an encrypted exchange between the two units will occur and the profile assigned to the relevant Wireless Zone will be used to automatically configure provision the newly added SonicPoint unit As part of the provisioning process SonicOS will assign the discovered SonicPoint device a unique name and it will record its MAC address and the interface and Zone on which it was discovered It can also automatically assign the SonicPoint an IP address if so configured so that the SonicPo
55. ine do one of the instructions on how to enable security services and apply m l ER e Enter your mysonicwall com credentials then click the services to network zones see the following sections Saat Synchronize button to synchronize licenses with e Enabling Security Services in SonicOS page 48 mi Sonia walicom Applying Security Services to Network Zones page 52 e Paste the license keyset into the Manual Upgrade Keyset field To activate licensed services in SonicOS you can enter the 3 Click Submit license keyset manually or you can synchronize all licenses at once with mysonicwall com The Setup Wizard automatically synchronizes all licenses with mysonicwall com if the appliance has Internet access during initial setup If initial setup is already complete you can synchronize licenses from the System gt Licenses page Page 28 Initial Setup Upgrading Firmware on Your SonicWALL The following procedures are for upgrading an existing SonicOS Enhanced image to a newer version e Obtaining the Latest Firmware page 29 e Saving a Backup Copy of Your Preferences page 29 e Upgrading the Firmware with Current Settings page 30 e Upgrading the Firmware with Factory Defaults page 30 e Using SafeMode to Upgrade Firmware page 30 Obtaining the Latest Firmware 1 To obtain anew SonicOS Enhanced firmware image file for your SonicWALL security appliance connect to your mysonicwall com account at http www mysoni
56. int can communicate with an authentication server for WPA EAP support SonicOS will then use the profile associated with the relevant Zone to configure the 2 4GHz and 5GHz radio settings To connect the SonicPoint 1 Using a Cat 5 Ethernet cable connect the SonicPoint to the interface that you configured and connect the SonicPoint to a power source 2 Inthe SonicOS user interface on the SonicPoint gt SonicPoints page click the Synchronize SonicPoints button The SonicWALL appliance downloads a SonicPoint image from the SonicWALL back end server 3 Follow the instructions in the SonicPoint wizard Be sure to select the same authentication type and enter the same keys or password that you configured in SonicOS For more information about wireless configuration see the SonicOS Enhanced Administrator s Guide SonicWALL NSA E5500 Getting Started Guide Page 57 Troubleshooting Diagnostic Tools SonicOS provides a number of diagnostic tools to help you maintain your network and troubleshoot problems Several tools can be accessed on the System gt Diagnostics page and others are available on other screens This section contains the following subsections e Using Packet Capture page 58 e Using Ping page 59 e Using the Active Connections Monitor page 60 e Using Log gt View page 61 Page 58 Troubleshooting Diagnostic Tools Using Packet Capture Packet Capture allows you to capture and examine the contents of in
57. ion Reference Checklist Support and Training Options In this Section This section provides overviews of customer support and training options for the SonicWALL NSA E5500 e Customer Support page 64 e Support Services page 64 e SonicWALL Live Product Demos page 65 e Knowledge Portal page 65 e User Forums page 66 e Training page 67 e Related Documentation page 68 SonicWALL NSA E5500 Getting Started Guide Page 63 Customer Support SonicWALL offers Web based and telephone support to customers who have a valid Warranty or who purchased a Support Contract Please review our Warranty Support Policy for product coverage SonicWALL also offers a full range of consulting services to meet your needs from our innovative implementation services to traditional statement of work based services For further information visit http www sonicwall com us support contact html SEARCH SITE MAP NORTH AMERICA WORLDWIDE SONICWALL PRODUCTS amp SOLUTIONS GO BACK TO CONTACT CUSTOMER SUPPORT SUPPORT SUPPORT SonicWALL offers Web based and telephone support to customers with a valid RESOURCES Warranty or purchased Support Agreement Please review our Warranty Support Sa Policy for product coverage SonicWALL also offers a full range of consulting services RER to meet your needs from our innovative implementation and interoperability services u we to traditional statement of work based services
58. istering and Licensing Your Appliance on Mysonicwall com This section contains the following subsections e Product Registration page 15 e Licensing Security Services and Software page 16 e Registering a Second Appliance as a Backup page 18 e Congratulations page 18 Product Registration You must register your SonicWALL security appliance on mysonicwall com to enable full functionality 1 Login to your mysonicwall com account If you do not have an account you can create one at www mysonicwall com See Creating a Mysonicwall com Account page 15 2 Onthe main page in the Register A Product field type the appliance serial number and then click Next 3 On the My Products page under Add New Product type the friendly name for the appliance select the Product Group if any type the authentication code into the appropriate text boxes and then click Register 4 On the Product Survey page fill in the requested information and then click Continue SonicWALL NSA E5500 Getting Started Guide Page 15 Licensing Security Services and Software The Service Management Associated Products page in mysonicwall com lists security services support options and software such as ViewPoint that you can purchase or try with a free trial For details click the Info button Your current licenses are indicated in the Status column with either a license key or an expiration date You can purchase additional services now or at a later
59. ity Services gt Intrusion Prevention page click Accept Enabling Anti Spyware To enable Anti Spyware in SonicOS 1 2 Select the Enable Anti Spyware checkbox Anti Spyware Accept Cancel Anti Spyware Status Anti Spyware Status Signature Database Downloaded Signature Database Timestamp UTC 08 15 2007 15 52 26 000 Update Last Checked 08 17 2007 22 01 17 736 Anti Spyware Expiration Date 08 22 2007 Note Enable the Anti Spyware per zone from the Network gt Zones page Anti Spyware Global Settings CI Enable Anti Spyware Signature Groups Prevent All Detect All High Danger Level Spyware oO oO 0 Medium Danger Level Spyware Fi F 0 Low Danger Level Spyware U F 0 Configure Anti Spyware Settings Reset Anti Spyware Settings amp Policies Protocols HTTP FTP IMAP SMTP POP3 Enable Inbound Inspection Enable Inspection of Outbound Spyware Communication Inthe Signature Groups table select the Prevent All and Detect All checkbox for each spyware danger level that you want to prevent Navigate to the Security Services gt Anti Spyware page Log Redundancy 11 12 To log all spyware attacks leave the Log Redundancy Filter field set to zero To enforce a delay between log entries for detections of the same attack enter the number of seconds to delay Click Configure Anti Spyware Settings to configure clientless notification alerts and crea
60. lays For Original Source select Opt Subnet For Translated Source select WAN Primary IP For Original Destination select Any For Translated Destination select Original For Original Service select Any For Translated Service select Original For Inbound Interface select Opt 9 For Outbound Interface select WAN 10 For Comment enter a short description 11 Select the Enable NAT Policy checkbox 12 Leave Create a reflexive policy unchecked 13 Click OK EN rer This policy can be duplicated for subnets behind the other interfaces of the SonicWALL security appliance just replace the Original Source with the subnet behind that interface adjust the source interface and add another NAT policy SonicWALL NSA E5500 Getting Started Guide Page 47 Enabling Security Services in SonicOS You must enable each security service individually in the SonicOS user interface See the following procedures to enable and configure the three security services that must be enabled e Enabling Gateway Anti Virus e Enabling Intrusion Prevention Services Enabling Anti Spyware Page 48 Enabling Security Services in SonicOS Enabling Gateway Anti Virus To enable Gateway Anti Virus in SonicOS 1 Navigate to the Security Services gt Gateway Anti Virus page Select the Enable Gateway Anti Virus checkbox Security Services Gateway Anti Virus Accept Cancel Gateway Anti Virus Status Gateway Ant
61. mpact on overcurrent protection and supply wir ing Appropriate consideration of equipment nameplate rat ings must be used when addressing this concern Reliable grounding of rack mounted equipment must be maintained Particular attention must be given to power supply connections other than direct connections to the branch circuits such as power strips Lithium Battery Warning The Lithium Battery used in the SonicWALL Internet security appliance may not be replaced by the user The SonicWALL must be returned to a SonicWALL authorized service center for replacement with the same or equivalent type recommended by the manufacturer If for any reason the battery or SonicWALL Internet security appliance must be disposed of do so following the battery manufacturer s instructions Cable Connections All Ethernet and RS232 Console cables are designed for intra building connection to other equipment Do not connect these ports directly to communication wiring or other wiring that exits the building where the SonicWALL is located Safety and Regulatory Information in German Weitere Hinweise zur Montage Die oben genannten SonicWALL Modelle sind fur eine Montage in einem standardm igen 19 Zoll Rack konzipiert Fur eine ordnungsgem e Montage sollten die folgenden Hinweise beachtet werden e Vergewissern Sie sich dass das Rack f r dieses Ger t geeig net ist und verwenden Sie das vom Rack Hersteller empfoh lene Montagezubeh r e
62. nc Pair in NAT Route Mode page 22 Scenario C L2 Bridge Mode page 23 Page 20 Selecting a Deployment Scenario Scenario A NAT Route Mode Gateway For new network installations or installations where the SonicWALL NSA E5500 is replacing the existing network gateway In this scenario the SonicWALL NSA E5500 is configured in NAT Route mode to operate as a single network gateway Two Internet sources may be routed through the SonicWALL appliance for load balancing and failover purposes Because only a single SonicWALL appliance is deployed the added benefits of high availability with a stateful synchronized pair are not available To set up this scenario follow the steps covered in the nitial Setup section If you have completed setup procedures in that section continue to the Additional Deployment Configuration section on page 41 to complete configuration LAN Zone SonicWALL NSA E5500 Getting Started Guide Page 21 Scenario B State Sync Pair in NAT Route Mode For network installations with two SonicWALL NSA E Series B appliances configured as a stateful synchronized pair for Se redundant high availability networking HA Failover Pair In this scenario one SonicWALL NSA E5500 operates as the primary gateway device and the other SonicWALL NSA E5500 is in passive mode All network connection information is synchronized between the two devices so that the backup appliance can seamlessly switch to active mode withou
63. ng L2 Bridge Mode sections If you have completed setup procedures in those sections continue to the Additional Deployment Configuration section on page 41 to complete configuration Network Gateway Internet or LAN Segment 2 LAN Zone SonicWALL NSA E5500 Getting Started Guide Page 23 Initial Setup This section provides initial configuration instructions for connecting your SonicWALL NSA E5500 Follow these steps if you are setting up scenario A B or C This section contains the following sub sections e System Requirements page 24 e Connecting the WAN Port page 24 e Connecting the LAN Port page 25 e Applying Power page 25 e Accessing the Management Interface page 26 e Using the Setup Wizard page 26 e Connecting to Your Network page 27 e Testing Your Connection page 27 e Activating Licenses in SonicOS page 28 e Upgrading Firmware on Your SonicWALL page 29 System Requirements Before you begin the setup process check to verify that you have e An Internet connection e A Web browser supporting Java Script and HTTP uploads Page 24 Initial Setup Accepted Browser Version Browser Number o Internet Explorer 6 0 or higher 0 or higher Opera 9 10 or higher for Windows Connecting the WAN Port 1 Connect one end of an Ethernet cable to your Internet connection 2 Connect the other end of the cable to the X1 WAN port on your SonicWALL NSA E5500 SonicWALL NSA E5500
64. nicWALL NSA E5500 includes two fans for system temperature control Power Supply The SonicWALL NSA E5500 power supply dada SonicWALL NSA E5500 Getting Started Guide Page 7 Front Bezel Control Features The SonicWALL Network Security Appliance E Class is equipped with a front panel bezel interface that allows an administrator to customize certain aspects of the appliance or simply monitor its status without having to log into it through a separate terminal SONICWALL A A A Icon Feature Description LCD Displays the front panel bezel interface A Screen which can be used to display status information perform basic configurations restart the appliance or boot the appliance in SafeMode Up Down Left and Right buttons Control AA A A Buttons used to navigate the LCD menu system Page 8 Front Bezel Control Features Note Using the front bezel for configuration purposes prior to completing initial setup will bypass the Setup Wizard s automatic launch at startup LCD Control Buttons The LCD interface is controlled by a D pad consisting of four buttons Up Down Left Right The table below describes the functions of the buttons Icon Button Navigation Features Up Down Selects options and navigates up AA and down lists Left Cancels changes and returns to the A previous menu Confirms choices and enters A menus Also sets the appliance to screen saver mode when used from the main menu Main
65. nterfaces are properly configured for failover Connect the HA ports on the Primary SonicWALL and Backup SonicWALL appliances with a CAT6 rated crossover cable red crossover cable The Primary and Backup SonicWALL security appliances must have a dedicated connection using the HA interface SonicWALL recommends cross connecting the two together using a CAT 6 crossover Ethernet cable but a connection using a dedicated 100Mbps hub switch is also valid Power up the Primary SonicWALL security appliance and then power up the Backup SonicWALL security appliance Do not make any configuration changes to the Primary s HA interface the High Availability configuration in an upcoming step takes care of this issue When done disconnect the workstation Configuring High Availability The first task in setting up HA after initial setup is configuring the High Availability gt Settings page on the Primary SonicWALL security appliance Once you configure HA on the Primary SonicWALL security appliance it communicates the settings to the Backup SonicWALL security appliance To configure HA on the Primary SonicWALL perform the following steps 1 Navigate to the High Availability gt Settings page 2 Select the Enable High Availability checkbox 3 Under SonicWALL Address Settings type in the serial number for the Backup SonicWALL appliance You can find the serial number on the back of the SonicWALL security appliance or in the Sy
66. om the SonicOS VPN and Wireless courses to the advanced Certified SonicWALL Global Manager SonicWALL Training can help your IT professionals build an impenetrable wall against Internet attacks Browse By Training Services SonicWALL offers sales and technical training curriculum for Network Administrators Security Experts and SonicWALL Medallion Partners who need to enhanced their knowledge and maximize their investment in SonicWALL Products and Security Applications For a quick overview of Training Services please click here Training Services Overview flash demo For information on Instructor led Training please click here Instructor led Training Technical e Training Certification SonicWALL offers a wide range of sales and technical training based on your technological needs and business challenges Locate the specific type of training that best meets your needs using the following categories e Training Technical Primer OS VPN Secure Wireless Secure Remote Access GMS Secure Content Management Just In Time Secure Wireless Monitoring and Reporting UTM OS Continuous Data Protection SonicWALL Tools Email Security Learning Paths SonicWALL Learning Paths define the steps for obtaining certification and for gaining proficiency in a category or a technology area Selecting a link below will display the courses recommended for successful completion of the
67. oning Profiles page 53 e Configuring a Wireless Zone page 55 e Assigning an Interface to the Wireless Zone page 56 e Connecting the SonicPoint page 57 SonicWALL SonicPoints are wireless access points specially engineered to work with SonicWALL security appliances to provide wireless access throughout your enterprise The SonicPoint section of the Management Interface lets you manage the SonicPoints connected to your system Before you can manage SonicPoints in the Management Interface you must first e Verify that the SonicPoint image is downloaded to your SonicWALL security appliance e Configure your SonicPoint provisioning profiles e Configure a Wireless zone e Assign profiles to wireless zones This step is optional If you do not assign a default profile for a zone SonicPoints in that zone will use the first profile in the list e Assign an interface to the Wireless zone e Attach the SonicPoints to the interfaces in the Wireless zone and test Updating SonicPoint Firmware If your SonicWALL appliance has Internet connectivity it will automatically download the correct version of the SonicPoint image from the SonicWALL server when you connect a SonicPoint device Otherwise see the SonicOS Enhanced Administrator s Guide for the correct procedure Configuring SonicPoint Provisioning Profiles SonicPoint Profile definitions include all of the settings that can be configured on a SonicPoint such as radio set
68. online purchases or is on the front of the certificate that was included with your purchase Locate the product on the Services Management page and click Enter Key in that row In the Activate Service page type or paste your key into the Activation Key field and then click Submit Depending on the product you will see an Expire date or a license key string in the Status column when you return to the Service Management page 4 To license a product of service do one of the following e To try a Free Trial of a service click Try in the Service Management page A 30 day free trial is immediately activated The Status page displays relevant information including the activation status expiration date number of licenses and links to installation instructions or other documentation The Service Management page is also updated to show the status of the free trial e To purchase a product or service click Buy Now 5 Inthe Buy Service page type the number of licenses you want in the Quantity column for either the 1 year 2 year or 3 year license row and then click Add to Cart 6 Inthe Checkout page follow the instructions to complete your purchase The mysonicwall com server will generate a license key for the product The key is added to the license keyset You can use the license keyset to manually apply all active licenses to your SonicWALL appliance SonicWALL NSA E5500 Getting Started Guide Page 17 Registering a Second Appl
69. ou have a reason to use or avoid specific channels Page 54 Deploying SonicPoints for Wireless Access Enter a recognizable string for the SSID of each SonicPoint using this profile This is the name that will appear in clients lists of available wireless connections Under ACL Enforcement select Enable MAC Filter List to enforce Access Control by allowing or denying traffic from specific devices Select a MAC address object group from the Allow List to automatically allow traffic from all devices with MAC addresses in the group Select a MAC address group from the Deny List to automatically deny traffic from all devices with MAC addresses in the group The Deny List is enforced before the Allow List Under WEP WPA Encryption select the Authentication Type for your wireless network SonicWALL recommends using WPA2 as the authentication type gt WPAZ2 is a more secure replacement for the older WEP and WPA standards Fill in the fields specific to the authentication type that you selected The remaining fields change depending on the selected authentication type In the 802 11g Adv tab configure the advanced radio settings for the 802 11g radio For most 802 11g advanced options the default settings give optimum performance For a full description of the fields on this tab see the SonicOS Enhanced Administrator s Guide 4 Inthe 802 11a Radio and 802 11a Adv tabs configure the 4 Click the Wireless tab settings for
70. ptionally enable the Block all non IPv4 traffic setting to prevent the L2 bridge from passing non IPv4 traffic Proceed to Section If You Are Following Scenario C L2 Bridge Mode Additional Deployment Configuration page 41 Additional Deployment Configuration In this Section This section provides basic configuration information to begin building network security policies for your deployment This section also contains several SonicOS diagnostic tools and a deployment configuration reference checklist e Creating Network Access Rules page 42 e Creating a NAT Policy page 44 e Enabling Security Services in SonicOS page 48 e Applying Security Services to Network Zones page 52 e Deploying SonicPoints for Wireless Access page 53 e Troubleshooting Diagnostic Tools page 58 e Deployment Configuration Reference Checklist page 62 SonicWALL NSA E5500 Getting Started Guide Page 41 Creating Network Access Rules A Zone is a logical grouping of one or more interfaces designed to make management such as the definition and application of access rules a simpler and more intuitive process than following a strict physical interface scheme By default the SonicWALL security appliance s stateful packet inspection allows all communication from the LAN to the Internet and blocks all traffic from the Internet to the LAN The following behaviors are defined by the Default stateful inspection packet
71. s Corporation in the U S and other countries Netscape Navigator and Netscape Communicator are also trademarks of Netscape Communications Corporation and may be registered outside the U S Adobe Acrobat and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the U S and or other countries Firefox is a trademark of the Mozilla Foundation Other product and company names mentioned herein may be trademarks and or registered trademarks of their respective companies and are the sole property of their respective manufacturers SonicWALL NSA E5500 Getting Started Guide Page 79 Notes Page 80 Trademarks Notes SonicWALL NSA E5500 Getting Started Guide Page 81 Notes Page 82 Trademarks SonicWALL Inc 1143 Borregas Avenue T 1 408 745 9600 www sonicwall com SONICWALL gt Sunnyvale CA 94089 1306 F 1 408 745 9300 PROTECTION AT THE SPEED OF BUSINESS PN 232 001052 51 Rev A 8 07 2007 SonicWALL Inc is a registered trademark of SonicWALL Inc Other product names mentioned herein may be trademarks and or registered trademarks of their respective companies Specifications and descriptions subject to change without notice
72. s Notification Enable HTTP Clientless Notification Alerts Message to Display when Blocking This request is blocked by the SonicWALL Gateway Anti Virus Service Gateway AV Exclusion List Enable Gateway AV Exclusion List From Address To Address Configure No Entries Add Ready OK Cancel In the Gateway AV Config View window to suppress the sending of email messages SMTP to clients from SonicWALL GAV when a virus is detected in an email or attachment check the Disable SMTP Responses box SonicWALL NSA E5500 Getting Started Guide Page 49 7 Select Enable HTTP Clientless Notification Alerts and customize the message This feature informs the user that GAV detected a threat from the HTTP server 8 Select Enable Gateway AV Exclusion List and then click Add to define a range of IP addresses whose traffic will be excluded from SonicWALL GAV scanning 9 When finished in the Add GAV Range dialog box click OK 10 In the Gateway AV Config View window click OK 11 In the Security Services gt Gateway Anti Virus page click Accept Enabling Intrusion Prevention Services To enable Intrusion Prevention Services in SonicOS 1 Navigate to the Security Services gt Intrusion Prevention page Select the Enable Intrusion Prevention checkbox Intrusion Prevention A Accept Cancel IPS Status IPS Status Signature Database Downloaded Signature Database Timestamp UTC
73. stem gt Status screen of the backup unit The serial number for the Primary SonicWALL is automatically populated 4 Click Apply to retain these settings Configuring Advanced HA Settings 1 2 Navigate to the High Availability gt Advanced page To configure Stateful HA select Enable Stateful Synchronization A dialog box is displayed with recommended settings for the Heartbeat Interval and Probe Interval fields The settings it shows are minimum recommended values Lower values may cause unnecessary failovers especially when the SonicWALL is under a heavy load You can use higher values if your SonicWALL handles a lot of network traffic Click OK To backup the firmware and settings when you upgrade the firmware version select Generate Overwrite Backup Firmware and Settings When Upgrading Firmware Select the Enable Virtual MAC checkbox Virtual MAC allows the Primary and Backup appliances to share a single MAC address This greatly simplifies the process of updating network ARP tables and caches when a failover occurs Only the WAN switch that the two appliances are connected to needs to be notified All outside devices will continue to route to the single shared MAC address Optionally adjust the Heartbeat Interval to control how often the two units communicate The default is 5000 milliseconds the minimum recommended value is 1000 milliseconds Less than this may cause unnecessary failovers especially when the Sonic
74. t dropping any connections if the primary device loses connectivity To set up this scenario follow the steps covered in the nitial Setup and the Configuring a State Sync Pair in NAT Route Mode page 32 sections If you have completed setup procedures in those sections continue to the Additional Deployment Configuration section on page 41 to complete configuration Page 22 Selecting a Deployment Scenario SonicWALL NSA E Class 2 Local Network Internet Scenario C L2 Bridge Mode For network installations where the SonicWALL NSA E5500 is running in tandem with an existing network gateway In this scenario the original gateway is maintained The SonicWALL NSA E5500 is integrated seamlessly into the existing network providing the benefits of deep packet inspection and comprehensive security services on all network traffic L2 Bridge Mode employs a secure learning bridge architecture enabling it to pass and inspect traffic types that cannot be handled by many other methods of transparent security appliance integration Using L2 Bridge Mode a SonicWALL security appliance can be non disruptively added to any Ethernet network to provide in line deep packet inspection for all traversing IPv4 TCP and UDP traffic L2 Bridge Mode can pass all traffic types including IEEE 802 1q VLANs Spanning Tree Protocol multicast broadcast and IPv6 To set up this scenario follow the steps covered in the nitial Setup and the Configuri
75. t have a spanning tree delay set Page 36 Configuring a State Sync Pair in NAT Route Mode Synchronizing Firmware Checking the Synchronize Firmware Upload and Reboot checkbox allows the Primary and Backup SonicWALL security appliances in HA mode to have firmware uploaded on both devices at once in staggered sequence to ensure security is always maintained During the firmware upload and reboot you are notified via a message dialog box that the firmware is loaded on the Backup SonicWALL security appliance and then the Primary SonicWALL security appliance You initiate this process by clicking on the Synchronize Firmware button HA License Configuration Overview You can configure HA license synchronization by associating two SonicWALL security appliances as HA Primary and HA Secondary on mysonicwall com Note that the Backup appliance of your HA pair is referred to as the HA Secondary unit on mysonicwall com You must purchase a single set of security services licenses for the HA Primary appliance To use Stateful HA you must first activate the Stateful High Availability Upgrade license for the primary unit in SonicOS This is automatic if your appliance is connected to the Internet See Registering and Licensing Your Appliance on Mysonicwall com page 15 GATEWAY SERVICES Service Name Info Status Option Expiry 08 Jun 2007 License synchronization is used during HA so that the Backup appliance can maintain the same le
76. t ist Insbesondere muss auf nicht direkte Anschl sse an Stromquellen geachtet werden wie z B bei Verwendung von Mehrfachsteckdosen Hinweis zur Lithiumbatterie Die in der Internet Security Appliance von SonicWALL verwendete Lithiumbatterie darf nicht vom Benutzer ausgetauscht werden Zum Austauschen der Batterie muss die SonicWALL in ein von SonicWALL autorisiertes Service Center gebracht werden Dort wird die Batterie durch denselben oder entsprechenden vom Hersteller empfohlenen Batterietyp ersetzt Beachten Sie bei einer Entsorgung der Batterie oder der SonicWALL Internet Security Appliance die diesbez glichen Anweisungen des Herstellers Kabelverbindungen Alle Ethernet und RS232 C Kabel eignen sich f r die Verbindung von Ger ten in Innenr umen Schlie en Sie an die Anschl sse der SonicWALL keine Kabel an die aus dem Geb ude in dem sich das Ger t befindet herausgef hrt werden SonicWALL NSA E5500 Getting Started Guide Page 77 FCC Part 15 Class A Notice NOTE This equipment was tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy And if not installed and used in accordance with the instruction manual the device may cause harmful interference to
77. te a SonicWALL Anti Spyware exclusion list In the Anti Spyware Config View window to suppress the sending of e mail messages SMTP to clients from SonicWALL Anti Spyware when spyware is detected in an e mail or attachment check the Disable SMTP Responses box Select Enable HTTP Clientless Notification Alerts and customize the message This feature informs the user that SonicWALL Anti Spyware detected a threat from the HTTP server Select Enable Anti Spyware Exclusion List and then click Add to define a range of IP addresses whose traffic will be excluded from SonicWALL Anti Spyware scanning When finished in the Add Anti Spyware Range dialog box click OK In the Anti Spyware Config View window click OK Select the Enable Inbound Inspection checkboxes for the protocols to inspect By default SonicWALL GAV inspects all inbound HTTP FTP IMAP SMTP and POP3 traffic Select the Enable Inspection of Outbound Communication checkbox to enable scanning of traffic that originates internally On the Security Services gt Anti Spyware page click Accept SonicWALL NSA E5500 Getting Started Guide Page 51 Applying Security Services to Network Zones A network zone is a logical group of one or more interfaces to which you can apply security rules to regulate traffic passing from one zone to another zone Security services such as Gateway Anti Virus are automatically applied to the LAN and WAN network zones when you activate
78. the license and enable the service To protect other zones such as the DMZ or Wireless LAN WLAN you must apply the security services to the network zones For example you can configure SonicWALL Intrusion Prevention Service for incoming and outgoing traffic on the WLAN zone to add more security for internal network traffic To apply services to network zones 1 Navigate to the Network gt Zones page 2 Inthe Zone Settings table click the Configure icon for the zone where you want to apply security services 3 Inthe Edit Zone dialog box on the General tab select the checkboxes for the security services to enable on this zone Page 52 Applying Security Services to Network Zones 4 Onthe Edit Zone page select the checkboxes for the security services that you want to enable General Wireless Guest Services General Settings Name Security Type CI Allow Interface Trust CI Enforce Content Filtering Service CFS Policy CI Enable Client Av Enforcement Service Enable Gateway Anti Virus Service Enable IPS CI Enforce Global Security Clients Create Group PN CI Enable SSL Control 5 Click OK 6 To enable security services on other zones repeat steps 2 through step 4 for each zone Deploying SonicPoints for Wireless Access This section describes how to configure SonicPoints with the SonicWALL NSA E5500 See the following sub sections e Updating SonicPoint Firmware page 53 e Configuring SonicPoint Provisi
79. tings for the 2 4GHz and 5GHz radios SSID s and channels of operation Once you have defined a SonicPoint profile you can apply it to a Wireless zone Each Wireless zone can be configured with one SonicPoint profile Any profile can apply to any number of zones Then when a SonicPoint is connected to a zone it is automatically provisioned with the profile assigned to that zone SonicOS includes a default SonicPoint profile named SonicPoint You can modify this profile or create a new one SonicWALL NSA E5500 Getting Started Guide Page 53 To add a new profile click Add below the list of SonicPoint provisioning profiles To edit an existing profile select the profile and click the Configure icon in the same line as the profile you are editing In the Add Edit SonicPoint Profile window on the General 1 tab Select Enable SonicPoint Enter a Name Prefix to be used as the first part of the name for each SonicPoint provisioned Select the Country Code for where the SonicPoints are operating In the 802 11g Radio tab Select Enable Radio Select a schedule for the radio to be enabled from the drop down list For Radio Mode select the speed that the SonicPoint will operate on You can choose from the following e 11Mbps 802 11b e 54 Mbps 802 11g e 108 Mbps Turbo G If you choose Turbo mode all users in your company must use wireless access cards that support Turbo mode For Channel use AutoChannel unless y
80. topics e Network Anti Virus related topics e Security Services and Content Filtering topics e GMS and Viewpoint related topics e SonicPoint and Wireless related topics e SSL VPN related topics e TZ 190 Wireless WAN 3G Capability e VPN Client related topics e VPN site to site and interoperability topics For further information visit https forum sonicwall com Page 66 User Forums SONICWALL gt Comprehensive Internet Secu Welcome khaitran You last visited 07 27 2007 at 1 Private Messages Unread 0 Tot KnowledgePortal SonicWALL Forums User CP FAQ Calendar Search w jo wtros Toren Firewalls Firewall related topics New Posts Quick Links w Network NAT Routing 3 053 Fr Networking related topics by gmurson Today 04 03 PM Bd d W VPN _ SonicWALL Enhanced 1 311 r VPN site to site and interoperability topics by victorylakeland Today 01 35 PM j x VPN Client Reducing default VPN 1 262 r VPN Client related topics by cstizzai Today 03 27 PM SonicPoint Wireless Lots of FCS errors 377 r SonicPoint and wireless related topics by evadmin Today 06 08 AM Bd SGMS Viewpoint E Another ViewPoint Newbie with gt gt r SGMS and Viewpoint related topics by OneSeventeen Today 10 20 AM BJ a Security Services E Allowed Domain list All IPS Gateway Antivirus Anti Spyware and by acm computers Today 01 11 PM By 716 Content Filtering topics ni
81. ttings page click the Boot icon in the row for Uploaded Firmware with Factory Default Settings 6 Inthe confirmation dialog box click OK The SonicWALL restarts and then displays the login page 7 Enter the default user name and password admin password to access the SonicWALL management interface Using SafeMode to Upgrade Firmware gt If you are unable to connect to the SonicWALL security appliance s management interface you can restart the SonicWALL security appliance in SafeMode The SafeMode feature allows you to recover quickly from uncertain configuration states with a simplified management interface that includes the same settings available on the System gt Settings page To use SafeMode to upgrade firmware on the SonicWALL security appliance perform the following steps 1 Connect your computer to the XO port on the SonicWALL appliance and configure your IP address with an address on the 192 168 168 0 24 subnet such as 192 168 168 20 To configure the appliance in SafeMode perform one of the following e Use a narrow straight object like a straightened paper clip or a toothpick to press and hold the reset button on the front of the security appliance for one second The reset button is in a small hole next to the USB ports e Use the LCD control buttons on the front bezel to set the appliance to SafeMode Once selected the LCD displays a confirmation prompt Select Y and press the Right button to
82. u to deploy different types of NAT simultaneously The following NAT configurations are available in SonicOS Enhanced e Many to One NAT Policy e Many to Many NAT Policy e One to One NAT Policy for Outbound Traffic e One to One NAT Policy for Inbound Traffic Reflexive e _ _One to Many NAT Load Balancing e Inbound Port Address Translation via One to One NAT Policy e Inbound Port Address Translation via WAN IP Address This section describes how to configure a Many to One NAT policy Many to One is the most common NAT policy on a SonicWALL security appliance and allows you to translate a group of addresses into a single address Most of the time this means that you are taking an internal private IP subnet and translating all outgoing requests into the IP address of the SonicWALL security appliance WAN port such that the destination sees the request as coming from the IP address of the SonicWALL security appliance WAN port and not from the internal private IP address For other NAT configurations see the SonicOS Enhanced Administrator s Guide An example configuration illustrates the use of the fields in the Add NAT Policy procedure To add a Many to One NAT policy that allows all systems on the Opt interface to initiate traffic using the SonicWALL security appliance s WAN IP address perform the following steps 1 Navigate to the Network gt NAT Policies page Click Add The Add NAT Policy dialog box disp
83. ubnet e X1 Gateway e X1DNS settings 3 available e Restore defaults The X1 Mode can be set to Static default option or to DHCP If DHCP is selected manual configuration options are not shown for X1 IP subnet gateway and DNS The Restore Defaults option will reset the appliance to default factory settings If selected it will prompt for confirmation twice before restoring defaults If an option is selected but not modified the appliance will display a message stating that no changes were made and will return the user to the edit value screen If achange was made it will prompt the user for confirmation before effecting the change Restart This option allows you to safely restart without resorting to power cycling the appliance Once selected the LCD will display a confirmation prompt Select Y for yes and press the Right button to confirm The appliance will reboot SafeMode This option will set the appliance to SafeMode Once selected the LCD will display a confirmation prompt Select Y for yes and press the Right button to confirm The appliance will change to SafeMode Once SafeMode is enabled the SonicWALL NSA E5500 must be controlled from the Web management interface Screen Saver If no button is pressed for over 60 seconds or ifthe Left button is pressed from the Main Menu the appliance will enter Screen Saver mode In this mode the Status List will cycle displaying every entry for a few seconds If the
84. unit the associated Private Keys are also copied Because the connection between the Primary and Backup units is typically protected this is generally not a security concern Ly Tip A compromise between the convenience of synchronizing Certificates and the added security of not synchronizing Certificates is to temporarily enable the Include Certificate Keys setting and manually synchronize the settings and then disable Include Certificate Keys To verify that Primary and Backup SonicWALL security appliances are functioning correctly wait a few minutes then power off the Primary SonicWALL device The Backup SonicWALL security appliance should quickly take over From your management workstation test connectivity through the Backup SonicWALL by accessing a site on the public Internet note that the Backup SonicWALL when active assumes the complete identity of the Primary including its IP addresses and Ethernet MAC addresses Log into the Backup SonicWALL s unique LAN IP address The management interface should now display Logged Into Backup SonicWALL Status green ball Active in the upper right hand corner Now power the Primary SonicWALL back on wait a few minutes then log back into the management interface If stateful synchronization is enabled automatically disabling preempt mode the management GUI should still display Logged Into Backup SonicWALL Status green ball Active in the upper right hand corn
85. ustom Address Objects displays Address Objects with custom properties Default Address Objects displays Address Objects configured by default on the SonicWALL security appliance To add an Address Object 1 2 3 Navigate to the Network gt Address Objects page Below the Address Objects table click Add In the Add Address Object dialog box enter a name for the Address Object in the Name field Name Zone Assignment LAN v Type Host v IP Address Ready Ok Cancel Page 46 Creating a NAT Policy Select the zone to assign to the Address Object from the Zone Assignment drop down list Select Host Range Network MAC or FQDN from the Type menu lf you selected Host enter the IP address in the IP Address field If you selected Range enter the starting and ending IP addresses in the Starting IP Address and Ending IP Address fields lf you selected Network enter the network IP address and netmask in the Network and Netmask fields If you selected MAC enter the MAC address and netmask in the Network and MAC Address field lf you selected FQDN enter the domain name for the individual site or range of sites with a wildcard in the FQDN field Click OK Creating a NAT Policy NAT policies allow you the flexibility to control Network Address Translation based on matching combinations of Source IP address Destination IP address and Destination Services Policy based NAT allows yo
86. vel of network protection provided before the failover To enable HA you can use the SonicOS Ul to configure your two appliances as a HA pair in Active Idle mode Mysonicwall com provides several methods of associating the two appliances You can start by registering a new appliance and then choosing an already registered unit to associate it with You can associate two units that are both already registered Or you can select a registered unit and then add a new appliance with which to associate it Note After registering new SonicWALL appliances on mysonicwall com you must also register each appliance from the SonicOS management interface by clicking the registration link on the System gt Status page This allows each unit to synchronize with the SonicWALL license server and share licenses with the associated appliance SonicWALL NSA E5500 Getting Started Guide Page 37 Associating Pre Registered Appliances 6 On the My Product Associated Products page in the text boxes under Associate New Products type the serial To associate two already registered SonicWALL security number and the friendly name of the appliance that you appliances so that they can use HA license synchronization want to associate as the child secondary backup unit perform the following steps 7 Select the group from the Product Group drop down list The product group setting specifies the mysonicwall users who can upgrade or modify the appliance 1 Login
87. work address expressions there are currently the following Address Objects types e Host Host Address Objects define a single host by its IP address e Range Range Address Objects define a range of contiguous IP addresses e Network Network Address Objects are like Range objects in that they comprise multiple hosts but rather than being bound by specified upper and lower range delimiters the boundaries are defined by a valid netmask e MAC Address MAC Address Objects allow for the identification of a host by its hardware address or MAC Media Access Control address e FQDN Address FQDN Address Objects allow for the identification of a host by its Fully Qualified Domain Names FQDN such as www sonicwall com SonicOS Enhanced provides a number of Default Address Objects that cannot be modified or deleted You can use the Default Address Objects when creating a NAT policy or you can create custom Address Objects to use All Address Objects are available in the drop down lists when creating a NAT policy See the following sections e Creating Address Objects page 46 e Creating a NAT Policy page 47 SonicWALL NSA E5500 Getting Started Guide Page 45 Creating Address Objects The Network gt Address Objects page allows you to create and manage your Address Objects You can view Address Objects in the following ways using the View Style menu All Address Objects displays all configured Address Objects C
88. ws maximum security on your WLAN Uncheck this option if you want to allow any traffic on your WLAN Zone regardless of whether or not it is from a wireless connection Uncheck Only allow traffic generated by a SonicPoint and use the zone on a wired interface to allow guest services on that interface Select SSL VPN Enforcement to require that all traffic that enters into the WLAN Zone be authenticated through a SonicWALL SSL VPN appliance SSL VPN Enforcement allows the added security of One Time Passwords and Two Factor Authentication when using a SonicWALL SSL VPN appliance In the SSL VPN Server list select an address object to direct traffic to the SonicWALL SSL VPN appliance In the SSL VPN Service list select the service or group of services that you want to allow for clients authenticated through the SSL VPN If your wireless network is already running WiFiSec you can select WiFiSec Enforcement to require that all traffic that enters into the WLAN Zone interface be either IPsec traffic WPA traffic or both SonicWALL NSA E5500 Getting Started Guide Page 55 Note f you have configured WPA2 as your authentication type you do not need to enable WiFiSec e Ifyou have enabled WiFiSec Enforcement you can specify the following e Select WiFiSec Exception Service to select services that are allowed to bypass the WiFiSec enforcement e Select Require WiFiSec for Site to Site VPN Tunnel Traversal to require WiFiSec security
Download Pdf Manuals
Related Search
Related Contents
Cissell L28UR30 Clothes Dryer User Manual GUÍA DEL USUARIO Teknetics ALPHA 2000 - La Boutique du Fouilleur AXIS 5400+Serveur d`impression réseau Fujitsu AMILO Mini Ui 3520 RV Directions 2010 User`s Manual Elo Touch Solution 15D2 JVC AV-20RM4SE User's Manual Copyright © All rights reserved.
Failed to retrieve file