SonicWALL NSA 5000 4500 3500 Getting Started Guide

Embed Size (px)

Citation preview

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    1/74

    Getting Started Guide

    SonicWALL Network Security Appliances

    NETWORK SECURITY NSA 5000/4500/3500

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    2/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    3/74

    Page 2 SonicWALL NSA Series

    SonicWALL NSA Series

    Note: Always observe proper safety and regulatory guidelines when removing administrator-serviceable parts from the SonicWALL

    NSA appliance. Proper guidelines can be found in the Safety and Regulatory Information section, on page 66of this guide.

    I

    o

    PML

    Front

    Back

    1U rack-mountable

    17 x 13.25 x 1.75 in

    43.18 x 33.65 x 4.44 cm

    11.30 lbs/5.14 kg

    11.30 lbs/5.14 kg

    Form Factor

    Dimensions

    Weight

    WEEE Weight

    Network Security Appliance

    NSA

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    4/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 3

    Pre-Configuration Tasks

    In this Section:

    This section provides pre-configuration information. Review this section before setting up your SonicWALL NSA Series appliance.

    Check Package Contents - page 4 Obtain Configuration Information - page 5

    The Front Panel - page 6 The Back Panel - page 7

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    5/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    6/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 5

    Obtain Configuration Information

    Please record and keep for future reference the following setupinformation:

    Registration Information

    Networking Information

    Administrator Information

    Obtain Internet Service Provider (ISP) InformationRecord the following information about your current Internet service:

    Note: If you are not using one of the network configurationsabove, refer to the SonicOS Enhanced Administrators

    Guide. You can locate this document online at.

    Serial Number: Record the serial number found on thebottom panel of your SonicWALLappliance.

    Authent icat ion Code:

    Record the authentication code found onthe bottom panel of your SonicWALLappliance.

    LAN IP Address:

    . . .

    Select a static IP address for yourSonicWALL appliance that is within therange of your local subnet. If you areunsure, you can use the default IPaddress (192.168.168.168).

    Subnet Mask:

    . . .

    Record the subnet mask for the localsubnet where you are installing yourSonicWALL appliance.

    Ethernet WAN IPAddress :

    . . .

    Select a static IP address for yourEthernet WAN.This setting only appliesif you are already using an ISP thatassigns a static IP address.

    Admin Name :

    Select an administrator account name.(default is admin)

    Admin Pass word :

    Select an administrator password.(default is password)

    If you connect

    using

    Please record

    DHCP No information is usually required: Some providersmay require a Host name:

    Static IP IP Address: . . .

    Subnet Mask: . . .Default Gateway: . . .

    Primary DNS: . . .

    DNS 2 (optional): . . .

    DNS 3 (optional): . . .

    http://localhost/var/www/apps/conversion/tmp/scratch_1/http://localhost/var/www/apps/conversion/tmp/scratch_1/
  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    7/74

    Page 6 The Front Panel

    The Front Panel

    Icon Feature Description

    Console Port Used to access the SonicOS Command Line Interface (CLI) via the DB9 -> RJ45 cable.

    USB Ports (2) Future extension.

    Reset Button Press and hold the button for a few seconds to manually reset the appliance using SafeMode.

    LED (from left to right) -Power LED:Indicates the SonicWALL NSA appliance is powered on.-Test LED: Flic kering : Indicates the appliance is initializing. Steady blinking: Indicates theappliance is in SafeMode. Solid: Indicates that the appliance is in test mode.-Alarm LED: Indicates an alarm condition.

    X0-X5 (Copper) Gigabit Ethernet ports.

    A

    Network Security Appliance

    A B DEC

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    8/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 7

    The Back Panel

    Icon Feature Description

    Fans (2) The SonicWALL NSA Series includes two fans for system temperature control.

    Power Supply The SonicWALL NSA Series utilizes a125 Volt North American power supply.

    I

    o

    A B

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    9/74

    Page 8 The Back Panel

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    10/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 9

    Registering Your Appliance on mysonicwall.com

    In this Section:

    This section provides instructions for registering your SonicWALL NSA Series appliance.

    Before You Register - page 10 Creating a mysonicwall.com Account - page 11

    Registering and Licensing Your Appliance on mysonicwall.com - page 11 Licensing Security Services and Software - page 12

    Registering a Second Appliance as a Backup - page 14

    Note: Registration is an important part of the setup process and is necessary in order to receive the benefits of SonicWALL securityservices, firmware updates, and technical support.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    11/74

    Page 10 Before You Register

    Before You Register

    You need a mysonicwall.com account to register theSonicWALL NSA appliance. You can create a newmysonicwall.com account on www.mysonicwall.comor directlyfrom the SonicWALL management interface. This sectiondescribes how to create an account by using the Web site.

    You can use mysonicwall.com to register your SonicWALLappliance and activate or purchase licenses for SecurityServices, ViewPoint Reporting and other services, support, orsoftware before you even connect your device. This allows youto prepare for your deployment before making any changes toyour existing network.

    For a High Availability configuration, you must usemysonicwall.com to associate a backup unit that can share the

    Security Services licenses with your primary SonicWALL.

    Note: Your SonicWALL NSA appliance does not need to bepowered on during account creation or during the

    mysonicwall.com registration and licensing process.

    Note: After registering a new SonicWALL appliance onmysonicwall.com, you must also register the appliance

    from the SonicOS management interface. This allows

    the unit to synchronize with the SonicWALL License

    Server and to share licenses with the associatedappliance, if any. SeeAccessing the Management

    Interface - page 22.

    If you already have a mysonicwall .com account, go toRegistering and Licensing Your Appliance on mysonicwall.comto register your appliance on mysonicwall.com.

    http://www.mysonicwall.com/http://www.mysonicwall.com/http://www.mysonicwall.com/
  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    12/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    13/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    14/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 13

    To manage your licenses, perform the following tasks:

    1. In the mysonicwall.com Service Management - AssociatedProducts page, check theAppl icable Servi ces table forservices that your SonicWALL appliance is alreadylicensed for. Your initial purchase may have includedsecurity services or other software bundled with theappliance. These licenses are enabled onmysonicwall.com when the SonicWALL appliance isdelivered to you.

    2. If you purchased a service subscription or upgrade from asales representative separately, you will have anAct ivat ion Keyfor the product. This key is emailed to youafter online purchases, or is on the front of the certificatethat was included with your purchase. Locate the producton the Services Management page and click Enter Keyinthat row.

    3. In the Activate Service page, type or paste your key into the

    Activati on Key field and then click Submit. Depending onthe product, you will see an Expire date or a license keystring in the Status column when you return to the ServiceManagement page.

    4. To license a product of service, do one of the following: To try a Free Trial of a service, click Tryin the Service

    Management page. A 30-day free trial is immediatelyactivated. The Status page displays relevantinformation including the activation status, expirationdate, number of licenses, and links to installationinstructions or other documentation. The ServiceManagement page is also updated to show the statusof the free trial.

    To purchase a product or service, click Buy Now.

    5. In the Buy Service page, type the number of licenses youwant in the Quantitycolumn for either the 1 year, 2 year, or3 year license row and then clickAdd to Cart .

    6. In the Checkoutpage, follow the instructions to completeyour purchase.

    The mysonicwall.com server will generate a license key for theproduct. The key is added to the license keyset. You can usethe license keyset to manually apply all active licenses to yourSonicWALL appliance.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    15/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    16/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 15

    Deployment Scenarios

    In this Section:

    This section provides detailed overviews of advanced deployment scenarios as well as configuration instructions for connecting yourSonicWALL NSA Series.

    Selecting a Deployment Scenario - page 16

    Scenario A: NAT/Route Mode Gateway - page 17 Scenario B: State Sync Pair in NAT/Route Mode - page 18 Scenario C: L2 Bridge Mode - page 19

    Initial Setup - page 20 Upgrading Firmware on Your SonicWALL - page 25 Configuring a State Sync Pair in NAT/Route Mode - page 28 Configuring L2 Bridge Mode - page 35

    Tip: Before completing this section, fill out the information in Obtain Configuration Information - page 5. You will need to enter this

    information during the Setup Wizard.

    3

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    17/74

    Page 16 Selecting a Deployment Scenario

    Selecting a Deployment Scenario

    Before continuing, select a deployment scenario that best fits your network scheme. Reference the table below and the diagrams on thepages for help in choosing a scenario.

    Scenario A: NAT/Route Mode Gateway - page 17 Scenario B: State Sync Pair in NAT/Route Mode - page 18 Scenario C: L2 Bridge Mode - page 19

    Current Gateway Configuration New Gateway Configuration Use Scenario

    No gateway appliance Single SonicWALL NSA as a primary gateway. A- NAT/Route Mode Gateway

    Pair of SonicWALL NSA appliances for highavailability.

    B- NAT with State Sync Pair

    Existing Internet gateway appliance SonicWALL NSA as replacement for an exist inggateway appliance.

    A- NAT/Route Mode Gateway

    SonicWALL NSA in addition to an existinggateway appliance.

    C- L2 Bridge Mode

    Existing SonicWALL gateway appliance SonicWALL NSA in addition to an existingSonicWALL gateway appliance.

    B- NAT with State Sync Pair

    B

    Network Security Appliance

    NSA

    ANetwork Security Appliance

    NSA

    Son icP o in t

    C

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    18/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 17

    Scenario A: NAT/Route Mode Gateway

    For new network installations or installations where theSonicWALL NSA Series is replacing the existing networkgateway.

    In this scenario, the SonicWALL NSA Series is configured inNAT/Route mode to operate as a single network gateway. TwoInternet sources may be routed through the SonicWALLappliance for load balancing and failover purposes. Becauseonly a single SonicWALL appliance is deployed, the addedbenefits of high availability with a stateful synchronized pair arenot available.

    To set up this scenario, follow the steps covered in theInitialSetupsection. If you have completed setup procedures in thatsection, continue to theAdditional Deployment Configuration

    section, on page 37to complete configuration.

    ASonicWALL NSA

    InternetISP 1Network Security Appliance NSA

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    19/74

    Page 18 Selecting a Deployment Scenario

    Scenario B: State Sync Pair in NAT/Route Mode

    For network installations with two SonicWALL NSA Seriesappliances of the same model configured as a statefulsynchronized pair for redundant high-availability networking.

    In this scenario, one SonicWALL NSA Series operates as the

    primary gateway device and the other SonicWALL NSA Seriesis in passive mode. All network connection information issynchronized between the two devices so that the backupappliance can seamlessly switch to active mode withoutdropping any connections if the primary device losesconnectivity.

    To set up this scenario, follow the steps covered in theInitialSetupand the Configuring a State Sync Pair in NAT/Route

    Modesections. If you have completed setup procedures inthose sections, continue to theAdditional DeploymentConfiguration section, on page 37to complete configuration.

    SonicWALL NSA 1

    SonicWALL NSA 2B

    NetworkSecurityAppliance

    NSA

    Local Network

    SonicWALL

    HA / Failover Pair

    Internet

    HA Link

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    20/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 19

    Scenario C: L2 Bridge Mode

    For network installations where the SonicWALL NSA Series isrunning in tandem with an existing network gateway.

    In this scenario, the original gateway is maintained. TheSonicWALL NSA Series is integrated seamlessly into theexisting network, providing the benefits of deep packetinspection and comprehensive security services on all networktraffic.

    L2 Bridge Mode employs a secure learning bridge architecture,enabling it to pass and inspect traffic types that cannot behandled by many other methods of transparent securityappliance integration. Using L2 Bridge Mode, a SonicWALLsecurity appliance can be non-disruptively added to anyEthernet network to provide in-line deep-packet inspection for

    all traversing IPv4 TCP and UDP traffic. L2 Bridge Mode canpass all traffic types, including IEEE 802.1Q VLANs, SpanningTree Protocol, multicast, broadcast and IPv6.

    To set up this scenario, follow the steps covered in theInitialSetupand theConfiguring L2 Bridge Modesections. If youhave completed setup procedures in those sections, continue totheAdditional Deployment Configuration section, on page 37tocomplete configuration.

    SonicWALL NSA

    Third Party Gateway

    Internet or

    LAN Segment 2L2 Bridge Link

    C

    NetworkSecurityAppliance

    NSA

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    21/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    22/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    23/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    24/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 23

    Connecting to Your Network

    The SonicWALL NSA Series ships with the internal DHCPserver active on the LAN port. However, if a DHCP server isalready active on your LAN, the SonicWALL will disable its ownDHCP server to prevent conflicts.

    As shown in the illustration on this page, ports X1 and X0 arepreconfigured as WAN and LAN respectively. The remainingports (X2-X5) can be configured to meet the needs of yournetwork. In the graphical example on this page, the zones are:X1: WAN, X0: LAN, X2: WLAN, X4: DMZ.

    Refer to the SonicOS Enhanced Administrators Guideforadvanced configuration deployments.

    Testing Your Connection

    1. After you exit the Setup Wizard, the login page reappears.Log back into the Management Interface and verify your IPand WAN connection.

    2. Ping a host on the Internet, such as sonicwall.com.

    3. Open another Web browser and navigate to:.

    If you can view the SonicWALL home page, you haveconfigured your SonicWALL NSA appliance correctly.

    If you cannot view the SonicWALL home page, renew yourmanagement station DHCP address.

    4. If you still cannot view a Web page, try one of thesesolutions: Restart your Management Stationto accept new

    network settings from the DHCP server in the

    SonicWALL security appliance. Restart your Internet Routerto communicate withthe DHCP Client in the SonicWALL security appliance.

    SonicWALL NSA

    Internet

    Network Security Appliance

    NSA

    http://www.sonicwall.com/http://www.sonicwall.com/http://www.sonicwall.com/
  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    25/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    26/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    27/74

    Page 26 Upgrading Firmware on Your SonicWALL

    Upgrading the Firmware with Current Settings

    Perform the following steps to upload new firmware to yourSonicWALL appliance and use your current configurationsettings upon startup.

    Tip: The appliance must be properly registered before it canbe upgraded. Refer to Registering and Licensing Your

    Appliance on mysonicwall.com - page 11for more

    information.

    1. Download the SonicOS Enhanced firmware image file frommysonicwall.com and save it to a location on your localcomputer.

    2. On the System> Settings page, click Upload NewFirmware.

    3. Browse to the location where you saved the SonicOSEnhanced firmware image file, select the file and click theUpload button.

    4. On the System> Settingspage, click the Booticon in therow for Uploaded Firmware.

    5. In the confirmation dialog box, click OK. The SonicWALLrestarts and then displays the login page.

    6. Enter your user name and password. Your new SonicOSEnhanced image version information is listed on theSystem >Settingspage.

    Upgrading the Firmware with Factory Defaults

    Perform the following steps to upload new firmware to yourSonicWALL appliance and start it up using the defaultconfiguration:

    1. Download the SonicOS Enhanced firmware image file from

    mysonicwall.com and save it to a location on your localcomputer.

    2. On the System> Settings page, click Create Backup.3. Click Upload New Firmware.4. Browse to the location where you saved the SonicOS

    Enhanced firmware image file, select the file and click theUpload button.

    5. On the System > Settingspage, click the Booticon in therow for Uploaded Firmware with Factory DefaultSettings.

    6. In the confirmation dialog box, click OK. The SonicWALLrestarts and then displays the login page.

    7. Enter the default user name and password (admin /password) to access the SonicWALL managementinterface.

    Using SafeMode to Upgrade Firmware

    If you are unable to connect to the SonicWALL securityappliances management interface, you can restart theSonicWALL security appliance in SafeMode. The SafeModefeature allows you to recover quickly from uncertain

    configuration states with a simplified management interface thatincludes the same settings available on the System> Settingspage.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    28/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 27

    To use SafeMode to upgrade firmware on the SonicWALLsecurity appliance, perform the following steps:

    1. Connect your computer to the X0 port on the SonicWALLappliance and configure your IP address with an addresson the 192.168.168.0/24 subnet, such as 192.168.168.20.

    2. Use a narrow, straight object, like a straightened paper clipor a toothpick, to press and hold the reset button on thefront of the security appliance for one second. The resetbutton is in a small hole next to the USB ports.The Test light starts blinking when the SonicWALL securityappliance has rebooted into SafeMode.

    3. Point the Web browser on your computer to192.168.168.168. The SafeMode management interfacedisplays.

    4. If you have made any configuration changes to the securityappliance, select the Create Backup On Next Bootcheckbox to make a backup copy of your current settings.Your settings will be saved when the appliance restarts.

    5. Click Upload New Firmware, and then browse to thelocation where you saved the SonicOS Enhanced firmwareimage, select the file and click the Upload button.

    6. Select the boot icon in the row for one of the following: Uploaded Firmware - New!

    Use this option to restart the appliance with yourcurrent configuration settings.

    Uploaded Firmware with Factory Defaults - New!

    Use this option to restart the appliance with defaultconfiguration settings.

    7. In the confirmation dialog box, click OK to proceed.8. After successfully booting the firmware, the login screen is

    displayed. If you booted with factory default settings, enterthe default user name and password (admin / password) toaccess the SonicWALL management interface.

    If You Are Follow ing

    Scenario...

    Proceed to Section:

    A- NAT/Route ModeGateway

    Additional Deployment Configuration -page 37

    B- NAT with State Sync Pair Configuring a State Sync Pair in NAT/Route Mode - page 28

    C- L2 Bridge Mode Configuring L2 Bridge Mode - page 35

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    29/74

    Page 28 Configuring a State Sync Pair in NAT/Route Mode

    Configuring a State Sync Pair in

    NAT/Route Mode

    This section provides instructions for configuring a pair ofSonicWALL NSA appliances for high availability (HA). Thissection is relevant to administrators following deploymentscenario B.

    This section contains the following sub-sections:

    Initial High Availability Setup - page 28 Configuring High Availability - page 29 Configuring Advanced HA Settings - page 29 Synchronizing Settings - page 31 Adjusting High Availability Settings - page 32 Synchronizing Firmware - page 32

    HA License Configuration Overview - page 33 Associating Pre-Registered Appliances - page 34

    Initial High Availability Setup

    Before you begin the configuration of HA on the PrimarySonicWALL security appliance, perform the following setup:

    1. On the bottom panel of the Backup SonicWALL security

    appliance, locate the serial number and write the numberdown. You need to enter this number in the HighAvai labil ity >Settingspage.

    2. Verify that the Primary SonicWALL and BackupSonicWALL security appliances are registered, running thesame SonicOS Enhanced versions, and running the sameSonicWALL Security services.

    3. Make sure the Primary SonicWALL and BackupSonicWALL security appliances LAN, WAN and otherinterfaces are properly configured for failover.

    4. Connect the X5 ports on the Primary SonicWALL and

    Backup SonicWALL appliances with a CAT6-ratedcrossover cable (red crossover cable). The Primary andBackup SonicWALL security appliances must have adedicated connection. SonicWALL recommends cross-connecting the two together using a CAT6 crossoverEthernet cable, but a connection using a dedicated hub/switch is also valid.

    5. Power up the Primary SonicWALL security appliance, andthen power up the Backup SonicWALL security appliance.

    6. Do not make any configuration changes to the PrimarysHA interface; the High Availability configuration in an

    upcoming step takes care of this issue. When done,disconnect the workstation.

    SonicWALL NSA 1

    SonicWALL NSA 2

    Network Security ApplianceNetwork Security Appliance

    NSA

    Local Network

    SonicWALLHA / Failover Pair

    Internet

    X5 HA Link

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    30/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 29

    Configuring High Availability

    The first task in setting up HA after initial setup is configuring theHigh Availability >Settingspage on the Primary SonicWALLsecurity appliance. Once you configure HA on the PrimarySonicWALL security appliance, it communicates the settings to

    the Backup SonicWALL security appliance.To configure HA on the Primary SonicWALL, perform thefollowing steps:

    1. Navigate to the High Availability>Settingspage.2. Select the Enable High Availabilit ycheckbox.3. Under SonicWALL Address Settings, type in the serial

    number for the Backup SonicWALL appliance.You can find the serial number on the back of theSonicWALL security appliance, or in the System >Statusscreen of the backup unit. The serial number for the

    Primary SonicWALL is automatically populated.4. ClickApplyto retain these settings.

    Configuring Advanced HA Settings

    1. Navigate to the High Availability >Advancedpage.

    2. To configure Stateful HA, select Enable StatefulSynchronization . A dialog box is displayed withrecommended settings for the Heartbeat Intervaland

    Probe Intervalfields. The settings it shows are minimumrecommended values. Lower values may causeunnecessary failovers, especially when the SonicWALL isunder a heavy load. You can use higher values if yourSonicWALL handles a lot of network traffic. Click OK.

    Tip: Preempt mode is automatically disabled after enablingStateful Synchronization. This is because preempt

    mode can be over-aggressive about failing over to the

    backup appliance. For example if both devices are idle,

    preempt mode may prompt a failover.

    3. To backup the firmware and settings when you upgrade thefirmware version, select Generate/Overwrite BackupFirmware and Settings When Upgrading Firmware.

    4. Select the Enable Virtual MAC checkbox. Virtual MACallows the Primary and Backup appliances to share asingle MAC address. This greatly simplifies the process ofupdating network ARP tables and caches when a failoveroccurs. Only the WAN switch that the two appliances areconnected to needs to be notified. All outside devices will

    continue to route to the single shared MAC address.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    31/74

    Page 30 Configuring a State Sync Pair in NAT/Route Mode

    5. Optionally adjust the Heartbeat Intervalto control howoften the two units communicate. The default is 5000milliseconds; the minimum recommended value is 1000milliseconds. Less than this may cause unnecessaryfailovers, especially when the SonicWALL is under a heavyload.

    6. Set the Probe Levelfor the interval in seconds betweencommunication with upstream or downstream systems.SonicWALL recommends that you set the interval for atleast 5 seconds. You can set the Probe IP Address(es) onthe High Availability >Monitoringscreen.

    7. Typically, SonicWALL recommends leaving the FailoverTrigger Level (missed heartbeats), Election Delay Time(seconds), and Dynamic Route Hold-Down Timefieldsto their default settings. These fields can be tuned later asnecessary for your specific network environment.- The Failover Trigger Levelsets the number of

    heartbeats that can be missed before failing over.- The Election Delay Timeis the number of seconds

    allowed for internal processing between the two units inthe HA pair before one of them takes the primary role.

    - The Dynamic Route Hold-Down Timesetting is usedwhen a failover occurs on a HA pair that is using eitherRIP or OSPF dynamic routing. When a failover occurs,Dynamic Route Hold-Down Time is the number ofseconds the newly-active appliance keeps the dynamicroutes it had previously learned in its route table.During this time, the newly-active appliance relearns

    the dynamic routes in the network. When the DynamicRoute Hold-Down Time duration expires, it deletes the

    old routes and implements the new routes it haslearned from RIP or OSPF. The default value is45 seconds. In large or complex networks, a largervalue may improve network stability during a failover.

    8. Click the Include Certificates/Keyscheckbox to have theappliances synchronize all certificates and keys.

    9. Click Synchronize Settingsto synchronize the settingsbetween the Primary and Backup appliances.

    10. Click Synchroni ze Firmwareif you previously uploadednew firmware to your Primary unit while the Secondary unitwas offline, and it is now online and ready to upgrade to thenew firmware. Synchronize Firmwareis typically usedafter taking your Secondary appliance offline while you testa new firmware version on the Primary unit beforeupgrading both units to it.

    11. ClickApplyto retain the settings on this screen.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    32/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 31

    Synchronizing Settings

    Once you have configured the HA setting on the PrimarySonicWALL security appliance, click the Synchronize Settingsbutton. You should see a HA Peer Firewall has been updated message at the bottom of the management interface page. Also

    note that the management interface displays Logged Into:Primary SonicWALL Status: (green ball) Activein the upper-right-hand corner.

    By default, the Include Certificate/Keyssetting is enabled.This specifies that Certificates, CRLs and associated settings(such as CRL auto-import URLs and OCSP settings) aresynchronized between the Primary and Backup units. WhenLocal Certificates are copied to the Backup unit, the associatedPrivate Keys are also copied. Because the connection betweenthe Primary and Backup units is typically protected, this is

    generally not a security concern.

    Tip: A compromise between the convenience ofsynchronizing Certificates and the added security of not

    synchronizing Certificates is to temporarily enable the

    Include Certificate/Keyssetting and manually

    synchronize the settings, and then disable Include

    Certificate/Keys.

    To verify that Primary and Backup SonicWALL securityappliances are functioning correctly, wait a few minutes, thentrigger a test failover by logging into the primary unit and doinga restart. The Backup SonicWALL security appliance shouldquickly take over.

    From your management workstation, test connectivity throughthe Backup SonicWALL by accessing a site on the publicInternet note that the Backup SonicWALL, when active,assumes the complete identity of the Primary, including its IPaddresses and Ethernet MAC addresses.

    Log into the Backup SonicWALLs unique LAN IP address. Themanagement interface should now display Logged Into:Backup SonicWALL Status: (green ball) Acti ve in the upper-right-hand corner.

    Now, power the Primary SonicWALL back on, wait a fewminutes, then log back into the management interface. Ifstateful synchronization is enabled (automatically disablingpreempt mode), the management GUI should still displayLogged Into : Backup Soni cWALL Status: (green ball)

    Activein the upper-right-hand corner.

    If you are using the Monitor Interfaces feature, experiment withdisconnecting each monitored link to ensure correctconfiguration.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    33/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    34/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 33

    HA License Configuration Overview

    You can configure HA license synchronization by associatingtwo SonicWALL security appliances as HA Primary and HASecondary on mysonicwall.com. Note that the Backupappliance of your HA pair is referred to as the HA Secondary

    unit on mysonicwall.com.You must purchase a single set of security services licenses forthe HA Primary appliance. To use Stateful HA, you must firstactivate the Stateful High Availability Upgrade license for theprimary unit in SonicOS. This is automatic if your appliance isconnected to the Internet. See Registering and Licensing YourAppliance on mysonicwall.com - page 11.

    License synchronization is used during HA so that the Backupappliance can maintain the same level of network protectionprovided before the failover. To enable HA, you can use theSonicOS UI to configure your two appliances as a HA pair inActive/Idle mode.

    Mysonicwall.com provides several methods of associating thetwo appliances. You can start by registering a new appliance,and then choosing an already-registered unit to associate itwith. You can associate two units that are both alreadyregistered, or you can select a registered unit and then add anew appliance with which to associate it.

    Note: After registering new SonicWALL appliances onmysonicwall.com, you must also register each

    appliance from the SonicOS management interface by

    clicking the registration link on the System >Statuspage. This allows each unit to synchronize with the

    SonicWALL license server and share licenses with the

    associated appliance.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    35/74

    Page 34 Configuring a State Sync Pair in NAT/Route Mode

    Associating Pre-Registered Appliances

    To associate two already-registered SonicWALL securityappliances so that they can use HA license synchronization,perform the following steps:

    1. Login to mysonicwall.com.2. In the left navigation bar, click My Products.3. On the My Products page, under Registered Products,

    scroll down to find the appliance that you want to use asthe parent, or primary, unit. Click the productnameorserial number.

    4. On the Service Management - Associated Products page,scroll down to theAssociated Products section.

    5. Under Associated Products, click HA Secondary.6. On the My Product - Associated Products page, in the text

    boxes underAssociate New Products, type the serialnumberand the friendlynameof the appliance that youwant to associate as the child/secondary/backup unit.

    7. Select the group from the Product Groupdrop-down list.The product group setting specifies the mysonicwall userswho can upgrade or modify the appliance.

    8. Click Register.

    If You Are Followi ng

    Scenario...

    Proceed to Section:

    B- NAT with State Sync Pair Additional Deployment Configuration -page 37

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    36/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 35

    Configuring L2 Bridge Mode

    This section provides instructions to configure the SonicWALLNSA appliance in tandem with an existing Internet gatewaydevice. This section is relevant to users following deploymentscenarioC.

    This section contains the following sub-sections:

    Connection Overview - page 35 Configuring the Primary Bridge Interface - page 35 Configuring the Secondary Bridge Interface - page 36

    Connection Overview

    Connect the X1 port on your SonicWALL NSA Series to theLAN port on your existing Internet gateway device. Then

    connect the X0 port on your SonicWALL to your LAN.

    Configuring the Primary Bridge Interface

    The primary bridge interface is your existing Internet gatewaydevice. The only step involved in setting up your primary bridgeinterface is to ensure that the WAN interface is configured for astatic IP address. You will need this static IP address when

    configuring the secondary bridge.

    Note: The primary bridge interface must have a static IPassignment.

    SonicWALL NSA

    Network Gateway

    L2 Bridge Link

    LANInternet or

    LAN Segment 2

    Network Security Appliance

    NSA

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    37/74

    Page 36 Configuring L2 Bridge Mode

    Configuring the Secondary Bridge Interface

    Complete the following steps to configure the SonicWALLappliance:

    1. Navigate to the Network > Interfaces page from thenavigation panel.

    2. Click the Configureicon in the right column of the X0(LAN) interface.

    3. In the IP Assignment drop-down, select Layer 2 BridgedMode.

    4. In the Bridged to drop-down, select the X1 interface.

    5. Configure management options (HTTP, HTTPS, Ping,SNMP, SSH, User logins, or HTTP redirects).

    Note: Do not enable Never route traffic on the bridge-pairunless your network topology requires that all packets

    entering the L2 Bridge remain on the L2 Bridge

    segments.

    You may optionally enable the Block all non-IPv4

    traffic setting to prevent the L2 bridge from passing

    non-IPv4 traffic.

    If You Are Followi ng

    Scenario...

    Proceed to Section:

    C- L2 Bridge Mode Additional Deployment Configuration

    - page 37

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    38/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 37

    Additional Deployment Configuration

    In this Section:

    This section provides basic configuration information to begin building network security policies for your deployment. This section alsocontains several SonicOS diagnostic tools and a deployment configuration reference checklist.

    Creating Network Access Rules - page 38 Creating a NAT Policy - page 40

    Configuring Address Objects - page 42

    Configuring NAT Policies - page 43 Enabling Security Services in SonicOS - page 44 Applying Security Services to Network Zones - page 48 Deploying SonicPoints for Wireless Access - page 49 Troubleshooting Diagnostic Tools - page 54 Deployment Configuration Reference Checklist - page 58

    4

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    39/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    40/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 39

    3. In the Add Rule page in the General tab, selectAl low |Deny | Discard from theAct ion list to permit or block IPtraffic.

    Select the from and to zones from the From Zone andTo Zone menus.

    Select the service or group of services affected by theaccess rule from the Service list. If the service is notlisted, you must define the service in theAdd Serv icewindow. Select Create New Service or Create NewGroup to display theAdd Service window orAddService Group window.

    Select the source of the traffic affected by the accessrule from the Source list. Selecting Create NewNetwork displays theAdd Address Objec t window.

    Select the destination of the traffic affected by theaccess rule from the Destination list. Selecting CreateNew Network displays theAdd Address Objec twindow.

    From the Users Allowed menu, add the user or user

    group affected by the access rule. Select a schedule from the Schedule menu. Thedefault schedule isAlways on .

    Enter any comments to help identify the access rule inthe Comments field.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    41/74

    Page 40 Creating a NAT Policy

    4. Click on theAdvanced tab.

    If you would like for the access rule to timeout after adifferent period of TCP inactivity, set the amount oftime, in minutes, in the TCP Connection Inactivit yTimeout (minutes) field. The default value is 15minutes.

    If you would like for the access rule to timeout after a

    different period of UDP inactivity, set the amount oftime, in minutes, in the UDP Connection Inactivit yTimeout (minutes) field. The default value is 30minutes.

    Specify the number of connections allowed as apercent of maximum number of connections allowedby the SonicWALL security appliance in the Numberof connections allowed (% of maximum

    connections) field. Select Create a reflexive rule if you want to create a

    matching access rule to this one in the oppositedirection--from your destination zone or addressobject to your source zone or address object.

    5. Cl ick on the QoS tab if you want to apply DSCP or 802.1pQuality of Service coloring/marking to traffic governed bythis rule. See the SonicOS Enhanced AdministratorsGuidefor more information on managing QoS marking inaccess rules.

    6. Click OK to add the rule.

    Creating a NAT Policy

    The Network Address Translation (NAT) engine in SonicOSEnhanced allows users to define granular NAT policies for theirincoming and outgoing traffic. By default, the SonicWALLsecurity appliance has a preconfigured NAT policy to allow allsystems connected to the LAN interface to perform Many-to-One NAT using the IP address of the WAN interface, and apolicy to not perform NAT when traffic crosses between theother interfaces.

    You can create multiple NAT policies on a SonicWALL runningSonicOS Enhanced for the same object for instance, you canspecify that an internal server use one IP address whenaccessing Telnet servers, and to use a totally different IPaddress for all other protocols. Because the NAT engine inSonicOS Enhanced supports inbound port forwarding, it ispossible to hide multiple internal servers off the WAN IPaddress of the SonicWALL security appliance. The moregranular the NAT Policy, the more precedence it takes.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    42/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 41

    Before configuring NAT Policies, you must create all AddressObjects associated with the policy. For instance, if you arecreating a One-to-One NAT policy, first create Address Objectsfor your public and private IP addresses.

    Address Objects are one of four object classes (Address, User,

    Service and Schedule) in SonicOS Enhanced. These AddressObjects allow for entities to be defined one time, and to be re-used in multiple referential instances throughout the SonicOSinterface. For example, take an internal Web server with an IPaddress of 67.115.118.80. Rather than repeatedly typing in theIP address when constructing Access Rules or NAT Policies,Address Objects allow you to create a single entity called MyWeb Server as a Host Address Object with an IP address of67.115.118.80. This Address Object, My Web Server, can thenbe easily and efficiently selected from a drop-down menu in anyconfiguration screen that employs Address Objects as a

    defining criterion.

    Since there are multiple types of network address expressions,there are currently the following Address Objects types: Host Host Address Objects define a single host by its IP

    address. Range Range Address Objects define a range of

    contiguous IP addresses. Network Network Address Objects are like Range

    objects in that they comprise multiple hosts, but rather than

    being bound by specified upper and lower range delimiters,the boundaries are defined by a valid netmask.

    MAC Address MAC Address Objects allow for theidentification of a host by its hardware address or MAC(Media Access Control) address.

    FQDN Address FQDN Address Objects allow for theidentification of a host by its Fully Qualified Domain Names(FQDN), such as www.sonicwall.com.

    SonicOS Enhanced provides a number of Default AddressObjects that cannot be modified or deleted. You can use theDefault Address Objects when creating a NAT policy, or you cancreate custom Address Objects to use. All Address Objects areavailable in the drop-down lists when creating a NAT policy.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    43/74

    Page 42 Creating a NAT Policy

    Configuring Address Objects

    The Network >Address Objects page allows you to createand manage your Address Objects. You can view AddressObjects in the following ways using the View Style menu:

    Al l Address Objec ts - displays all configured AddressObjects. Custom Address Objects - displays Address Objects with

    custom properties. Default Address Objects - displays Address Objects

    configured by default on the SonicWALL securityappliance.

    To add an Address Object:

    1. Navigate to the Network>Address Objects page.2. Below the Address Objects table, clickAdd.

    3. In the Add Address Object dialog box, enter a name for theAddress Object in the Name field.

    4. Select the zone to assign to the Address Object from theZone Assignment drop-down list.

    5. Select Host, Range, Network, MAC, or FQDN from theType menu.- If you selected Host, enter the IP address in the IP

    Address field.

    - If you selected Range, enter the starting and ending IPaddresses in the Starting IP Address and Ending IPAddress fields.

    - If you selected Network, enter the network IP addressand netmask in the Network and Netmask fields.

    - If you selected MAC, enter the MAC address andnetmask in the Network and MAC Address field.

    - If you selected FQDN, enter the domain name for theindividual site or range of sites (with a wildcard) in theFQDN field.

    6. Click OK.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    44/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    45/74

    Page 44 Enabling Security Services in SonicOS

    Enabling Security Services in SonicOS

    You must enable each security service individually in theSonicOS user interface. See the following procedures to enableand configure the three security services that must be enabled:

    Enabling Gateway Anti-Virus - page 44 Enabling Intrusion Prevention Services - page 46 Enabling Anti-Spyware - page 47

    Enabling Gateway Anti-Virus

    To enable Gateway Anti-Virus in SonicOS:

    1. Navigate to the SecurityServices > GatewayAnti -Viruspage. Select the Enable Gateway Anti-Viruscheckbox.

    2. Select the Enable Inbound Inspectioncheckboxes for theprotocols to inspect. By default, SonicWALL GAV inspectsall inbound HTTP, FTP, IMAP, SMTP and POP3 traffic.CIFS/NetBIOScan optionally be enabled to allow sharedaccess to files. Generic TCP Stream can optionally beenabled to inspect all other TCP based traffic, such as non-standard ports of operation for SMTP and POP3, and IM

    and P2P protocols.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    46/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    47/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    48/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    49/74

    Page 48 Applying Security Services to Network Zones

    Applying Security Services to Network

    Zones

    A network zone is a logical group of one or more interfaces towhich you can apply security rules to regulate traffic passingfrom one zone to another zone.

    Security services such as Gateway Anti-Virus are automaticallyapplied to the LAN and WAN network zones when you activatethe license and enable the service. To protect other zones suchas the DMZ or Wireless LAN (WLAN), you must apply thesecurity services to the network zones. For example, you canconfigure SonicWALL Intrusion Prevention Service for incomingand outgoing traffic on the WLAN zone to add more security forinternal network traffic.

    To apply services to network zones:

    1. Navigate to the Network> Zones page.2. In the Zone Settings table, click the Configureicon for the

    zone where you want to apply security services.3. In the Edit Zone dialog box on the Generaltab, select the

    checkboxes for the security services to enable on thiszone.

    4. On the Edit Zone page, select the checkboxes for thesecurity services that you want to enable.

    5. Click OK.6. To enable security services on other zones, repeat steps 2

    through 4 for each zone.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    50/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 49

    Deploying SonicPoints for Wireless

    Access

    This section describes how to configure SonicPoints with theSonicWALL NSA Series. See the following sub-sections:

    Updating SonicPoint Firmware - page 49 Configuring SonicPoint Provisioning Profiles - page 49 Configuring a Wireless Zone - page 51 Assigning an Interface to the Wireless Zone - page 52 Connecting the SonicPoint - page 53

    SonicWALL SonicPoints are wireless access points speciallyengineered to work with SonicWALL security appliances toprovide wireless access throughout your enterprise. TheSonicPoint section of the Management Interface lets youmanage the SonicPoints connected to your system.

    Before you can manage SonicPoints in the ManagementInterface, you must first:

    Verify that the SonicPoint image is downloaded to yourSonicWALL security appliance.

    Configure your SonicPoint provisioning profiles. Configure a Wireless zone. Assign profiles to wireless zones. This step is optional. If

    you do not assign a default profile for a zone, SonicPointsin that zone will use the first profile in the list.

    Assign an interface to the Wireless zone.

    Attach the SonicPoints to the interfaces in the Wirelesszone and test.

    Updating SonicPoint Firmware

    If your SonicWALL appliance has Internet connectivity, it willautomatically download the correct version of the SonicPointimage from the SonicWALL server when you connect aSonicPoint device. Otherwise, see the SonicOS Enhanced

    Administrators Guidefor the correct procedure.Configuring SonicPoint Provisioning Profiles

    SonicPoint Profile definitions include all of the settings that canbe configured on a SonicPoint, such as radio settings for the2.4GHz and 5GHz radios, SSIDs and channels of operation.

    Once you have defined a SonicPoint profile, you can apply it toa Wireless zone. Each Wireless zone can be configured withone SonicPoint profile. Any profile can apply to any number ofzones. Then, when a SonicPoint is connected to a zone, it is

    automatically provisioned with the profile assigned to that zone.SonicOS includes a default SonicPoint profile, namedSonicPoint. You can modify this profile or create a new one.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    51/74

    Page 50 Deploying SonicPoints for Wireless Access

    To add a new profile clickAdd below the list of SonicPointprovisioning profiles. To edit an existing profile, select the profileand click the Configureicon in the same line as the profile youare editing.

    1. In the Add/Edit SonicPoint Profile window on the Generaltab:

    Select Enable SonicPoint. Enter a Name Prefixto be used as the first part of the

    name for each SonicPoint provisioned. Select the Country Codefor where the SonicPoints

    are operating.

    2. In the 802.11g Radio tab: Select Enable Radio. Select a schedule for the radio to be enabled from the

    drop-down list. For Radio Mode, select the speed that the SonicPoint

    will operate on. You can choose from the following: 11Mbps - 802.11b 54 Mbps - 802.11g 108 Mbps - Turbo GIf you choose Turbo Mode, all users in your companymust use wireless access cards that support Turbomode.

    For Channel , use AutoChannel unless you have areason to use or avoid specific channels.

    Enter a recognizable string for the SSIDof eachSonicPoint using this profile. This is the name that willappear in clients lists of available wirelessconnections.

    UnderACL En forcement , select Enable MAC FilterListto enforce Access Control by allowing or denying

    traffic from specific devices. Select a MAC addressobject group from theAl low Lis tto automatically allowtraffic from all devices with MAC addresses in thegroup. Select a MAC address group from the DenyListto automatically deny traffic from all devices withMAC addresses in the group. The Deny List isenforced before the Allow List.

    Under WEP/WPA Encryption, select theAuthent ication Typefor your wireless network.SonicWALL recommends using WPA2as theauthentication type.

    Note: WPA2 is a more secure replacement for the olderWEP and WPA standards.

    Fill in the fields specific to the authentication type thatyou selected. The remaining fields change dependingon the selected authentication type.

    3. In the 802.11g Adv tab, configure the advanced radiosettings for the 802.11g radio. For most 802.11g advanced

    options, the default settings give optimum performance.For a full description of the fields on this tab, see theSonicOS Enhanced Administrators Guide.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    52/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 51

    4. In the 802.11a Radio and802.11a Adv tabs, configure thesettings for the operation of the 802.11a radio bands. TheSonicPoint has two separate radios built in. Therefore, itcan send and receive on both the 802.11a and 802.11gbands at the same time.

    5. The settings in the 802.11a Radio and 802.11a Advanced

    tabs are similar to the settings in the 802.11g Radio and802.11g Advanced tabs.6. When finished, click OK.

    Configuring a Wireless Zone

    You can configure a wireless zone on the Network> Zones page. Typically, you will configure the WLAN zone for use withSonicPoints.

    1. On the Network> Zonespage in the WLANrow, click theicon in the Configurecolumn.

    2. In the Edit Zone dialog box on the Generaltab, theAl lowInterface Trust setting automates the creation of AccessRules to allow traffic to flow between the interfaces of azone instance. For example, if the WLAN zone has boththe X2 and X3 interfaces assigned to it, checkingAl lowInterface Trust on the WLAN zone creates the necessaryAccess Rules to allow hosts on these interfaces tocommunicate with each other.

    3. Select the checkboxes for the security services to enableon this zone. Typically you would enable Gateway Anti -Virus, IPS, andAnti -Spyware. If you are running

    SonicWALL Client Anti-Virus, select Enable Client AVEnforcement Service.

    4. Click the Wireless tab. In the Wireless Settings section, select Only allow

    traffic generated by a SonicPoint to allow only trafficfrom SonicWALL SonicPoints to enter the WLAN zoneinterface. This allows maximum security on yourWLAN. Uncheck this option if you want to al low any

    traffic on your WLAN zone regardless of whether ornot it is from a wireless connection.Uncheck Onlyallow traffic generated by a SonicPoint and use thezone on a wired interface to allow guest services onthat interface.

    Select SSL VPN Enforcement to require that all trafficthat enters into the WLAN zone be authenticatedthrough a SonicWALL SSL VPN appliance.

    Note: SSL VPN Enforcement allows the added security of

    one-time passwords when using a SonicWALL SSLVPN appliance.

    In the SSL VPN Server list, select an address objectto direct traffic to the SonicWALL SSL VPN appliance.

    In the SSL VPN Service list, select the service orgroup of services that you want to allow for clientsauthenticated through the SSL VPN.

    If your wireless network is already running WiFiSec,you can select WiFiSec Enforcement to require that

    all traffic that enters into the WLAN zone interface beeither IPsec traffic, WPA traffic, or both.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    53/74

    Page 52 Deploying SonicPoints for Wireless Access

    Note: If you have configured WPA2 as your authenticationtype, you do not need to enable WiFiSec.

    If you have enabled WiFiSec Enforcement, you can

    specify the following: Select WiFiSec Exception Serviceto selectservices that are allowed to bypass the WiFiSecenforcement.

    Select Require WiFiSec for Site-to-Site VPNTunnel Traversal to require WiFiSec security forall wireless connections through the WLAN zonethat are part of a Site-to-Site VPN.

    If you wish to run WPA or WPA2 in addition toWiFiSec, you can select Trust WPA/WPA2 traf ficas WiFiSec to accept WPA and WPA2 as

    allowable alternatives to IPsec. Under SonicPoint Settings, select the SonicPoint

    Provisioning Profile you want to apply to allSonicPoints connected to this zone. Whenever aSonicPoint connects to this zone, it will automaticallybe provisioned by the settings in the SonicPointProvisioning Profile, unless you have individuallyconfigured it with different settings.

    5. Optionally configure the settings on the Guest Servicestab. For information about configuring Guest Services, see

    the SonicOS Enhanced Administrators Guide.6. When finished, click OK.

    Assigning an Interface to the Wireless Zone

    Once the wireless zone is configured, you can assign aninterface to it. This is the interface where you will connect theSonicPoint.

    1. On the Network> Interfacespage, click the Configure

    icon in the row for the interface that you want to use, forexample, X3. The interface must be unassigned.2. In the Edit Interface dialog box on the Generaltab, select

    WLANor the zone that you created from the Zonedrop-down list. Additional fields are displayed.

    3. Enter the IP address and subnet mask of the zone in the IPAddress and Subnet Mask fields.

    4. In the SonicPoint Limit field, select the maximum numberof SonicPoints allowed on this interface.

    5. If you want to enable remote management of theSonicWALL security appliance from this interface, select

    the supported management protocol(s): HTTP, HTTPS,SSH, Ping, SNMP, and/or SSH.6. If you want to allow selected users with limited

    management rights to log in to the security appliance,select HTTP and/or HTTPS in User Login.

    7. Click OK.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    54/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 53

    Connecting the SonicPoint

    When a SonicPoint unit is first connected and powered up, it willhave a factory default configuration (IP Address 192.168.1.20,username: admin, password: password). Upon initializing, itwill attempt to find a SonicOS device with which to peer. If it is

    unable to find a peer SonicOS device, it will enter into a stand-alone mode of operation with a separate stand-aloneconfiguration allowing it to operate as a standard Access Point.

    If the SonicPoint locates a peer SonicOS device via theSonicWALL Discovery Protocol, an encrypted exchangebetween the two units will occur and the profile assigned to therelevant wireless zone will be used to automatically configure(provision) the newly added SonicPoint unit.

    As part of the provisioning process, SonicOS will assign thediscovered SonicPoint device a unique name, and it will record

    its MAC address and the interface and zone on which it wasdiscovered. It can also automatically assign the SonicPoint anIP address, if so configured, so that the SonicPoint cancommunicate with an authentication server for WPA-EAPsupport. SonicOS will then use the profile associated with therelevant zone to configure the 2.4GHz and 5GHz radio settings.

    To connect the SonicPoint:

    1. Using a Cat-5 Ethernet cable, connect the SonicPoint tothe interface that you configured, and connect theSonicPoint to a power source.

    2. In the SonicOS user interface on the SonicPoint>SonicPointspage, click the Synchronize SonicPoints

    button. The SonicWALL appliance downloads a SonicPointimage from the SonicWALL back-end server.3. Follow the instructions in the SonicPoint wizard. Be sure to

    select the same authentication type and enter the samekeys or password that you configured in SonicOS.

    For more information about wireless configuration, see theSonicOS Enhanced Administrators Guide.

    http://www.sonicwall.com/us/support/3437.htmlhttp://www.sonicwall.com/us/support/3437.html
  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    55/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    56/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 55

    The SonicOS user interface provides three windows to displaydifferent views of the captured packets:

    Captured Packets Packet Detail Hex Dump

    Click the Configurebutton to customize the settings for thecapture. Once the configuration is complete, click Startto begincapturing packets. The settings available in the five main areasof configuration are summarized below:

    General- number of bytes to capture, wrap capture buffer

    Capture Filter- interfaces, packet types, source/destination

    Display Filter- interfaces, packet types, source/destination

    Logging- automatic transfer of buffer to FTP server Advanced- generated packets, GMS, syslog,

    management

    Using Ping

    Pingis available on the System>Diagnosticspage.

    The Pingtest bounces a packet off a machine on the Internetand returns it to the sender. This test shows if the SonicWALLsecurity appliance is able to contact the remote host. If users onthe LAN are having problems accessing services on theInternet, try pinging the DNS server, or another machine at theISP location. If the test is unsuccessful, try pinging devices

    outside the ISP. If you can ping devices outside of the ISP, thenthe problem lies with the ISP connection.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    57/74

    Page 56 Troubleshooting Diagnostic Tools

    Using the Active Connections Monitor

    TheActive Connections Mon itor displays real-time,exportable (plain text or CSV), filterable views of all connectionsto and through the SonicWALL security appliance. This tool isavailable on the Systems>Diagnosticspage.

    You can filter the results to display only connections matchingcertain criteria. You can filter by Source IP, Destination IP,Destination Port, Protocol, Src Interfaceand Dst Interface.Enter your filter criteria in theActive Connections Mon itorSettings table.

    The fields you enter values into are combined into a searchstring with a logicalAND. Select the Group Filters box next toany two or more criteria to combine them with a logical OR.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    58/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    59/74

    Page 58 Deployment Configuration Reference Checklist

    Deployment Configuration Reference Checklist

    Use this checklist to find more information about various deployment tasks within the SonicOS Enhanced Administrators Guide.

    For this Task... See this Chapter...

    Inspecting the rule base for inbound and outbound rules Configuring Access Rules

    Setting logging levels Configuring Log Categories (Logging Level section)

    Configuring threat prevention on al l used zones Configuring Zones(Enabling SonicWALL Security Services on Zones section)

    Configuring Web filtering protection Configuring SonicWALL Content Filtering Service

    Changing administrator login Configuring Administration Settings("Administrator Name & Password section)

    Setting administrator email Configuring Log Automation (Email Log Automation section)

    Disabling HTTP and ping access Configuring Interfaces

    (Configuring Advanced Settings for the Interfaces section)Disabling or enabling DHCP Setting Up the DHCP Server

    Configuring user management Managing Users and Authentication Settings

    Configuring VPN policies Configuring VPN Policies

    Securing wireless access Managing SonicPoints

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    60/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 59

    Support and Training Options

    In this Section:

    This section provides overviews of customer support and training options for the SonicWALL NSA Series.

    Customer Support - page 60 Support Services - page 60 SonicWALL Live Product Demos - page 61

    Knowledge Portal - page 61 User Forums - page 62 Training - page 63 Related Documentation - page 64

    5

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    61/74

    Page 60 Customer Support

    Customer Support

    SonicWALL offers Web-based and telephone support tocustomers who have a valid Warranty or who purchased aSupport Contract. Please review our Warranty Support Policyfor product coverage. SonicWALL also offers a full range of

    consulting services to meet your needs, from our innovativeimplementation services to traditional statement of work-basedservices.

    For further information, visit:

    Support Services

    SonicWALL support services are designed not only to keepyour security infrastructure current, but also to react swiftly toany problem that may occur. However, that is not enough tokeep your network safe these days. So our support services

    also include crucial updates and upgrades, the finest technicalsupport, access to extensive electronic tools and timelyhardware replacement.

    For further information, visit:

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    62/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 61

    SonicWALL Live Product Demos

    Get an interactive insight into SonicWALL security products andservices with the following series of live product demos:

    Unified Threat Management Platform Secure Cellular Wireless Continuous Data Protection SSL VPN Secure Remote Access Content Fi ltering Mandatory Remote Assist Secure Wireless Solutions Email Security GMS and ViewPoint

    For further information, visit:

    Knowledge Portal

    The Knowledge Portal is a resource that allows users to searchfor SonicWALL documents, and set alerts when new content isavailable, based on the following types of search tools:

    Browse

    Bookmarks and alerts Search for keywords Full-text search Top 25 categories

    For further information, visit:

    http://www.sonicwall.com/us/products/resources/2198.htmlhttp://livedemo.sonicwall.com/http://livedemo.sonicwall.com/http://www.sonicwall.com/us/products/resources/2198.html
  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    63/74

    Page 62User Forums

    User Forums

    The SonicWALL User Forums is a resource that provides usersthe ability to communicate and discuss a variety of security andappliance subject matters. In this forum, the followingcategories are available for users:

    Content Security Manager topics Continuous Data Protection topics Email Security related topics Firewall related topics Network Anti-Virus related topics Security Services and Content Filtering topics GMS and Viewpoint related topics SonicPoint and Wireless related topics SSL VPN related topics TZ 190 / Wireless WAN - 3G Capability

    VPN Client related topics VPN site-to-site and interoperability topics

    For further information, visit:

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    64/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    65/74

    Page 64 Related Documentation

    Related Documentation

    See the following related documents for more information:

    SonicOS Enhanced Administrators Guide

    SonicOS Enhanced Release Notes

    SonicOS Enhanced Feature Modules Application Firewall Dashboard HF License Sync Multiple Admin NAT Load Balancing Packet Capture RF Management Single Sign On SSL Control

    Virtual Access Points SonicWALL GVC 4.0 Administrators Guide

    SonicWALL ViewPoint 4.1 Administrators Guide

    SonicWALL GAV 2.1 Administrators Guide

    SonicWALL IPS 2.0 Administrators Guide

    SonicWALL Anti-Spyware Administrators Guide

    SonicWALL CFS Administrators Guide

    For further information, visit:

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    66/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 65

    Product Safety and Regulatory Information

    In this Section:

    This section provides regulatory along with trademark and copyright information.

    Safety and Regulatory Information - page 66 Safety and Regulatory Information in German - page 67

    FCC Part 15 Class A Notice - page 68

    Canadian Radio Frequency Emissions Statement - page 68 CISPR 22 (EN 55022) Class A - page 68

    Regulatory Information for Korea - page 68 Copyright Notice - page 69 Trademarks - page 69

    6

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    67/74

    Page 66 Safety and Regulatory Information

    Safety and Regulatory Information

    Rack Mounting the SonicWALLThe above SonicWALL appliances are designed to be mounted in astandard 19-inch rack mount cabinet. The following conditions arerequired for proper installation:

    Use the mounting hardware recommended by the rack manu-facturer and ensure that the rack is adequate for the applica-tion.

    Four mounting screws, compatible with the rack design, mustbe used and hand tightened to ensure secure installation.Choose a mounting location where all four mounting holes lineup with those of the mounting bars of the 19-inch rack mountcabinet.

    Mount in a location away from direct sunlight and sources ofheat. A maximum ambient temperature of 104 F (40 C) isrecommended.

    Route cables away from power lines, fluorescent lighting fix-tures, and sources of noise such as radios, transmitters andbroadband amplifiers.

    The included power cord is intended for use in North Americaonly. For European Union (EU) customers, a power cord is notincluded.

    Ensure that no water or excessive moisture can enter the unit. Allow unrestricted airflow around the unit and through the

    vents on the side of the unit. A minimum of 1 inch (25.44mm)clearance is recommended.

    Mount the SonicWALL appliances evenly in the rack in orderto prevent a hazardous condition caused by uneven mechan-ical loading.

    Consideration must be given to the connection of the equip-ment to the supply circuit. The effect of overloading the circuitshas minimal impact on overcurrent protection and supply wir-ing. Appropriate consideration of equipment nameplate rat-ings must be used when addressing this concern.

    Reliable grounding of rack-mounted equipment must be main-tained. Particular attention must be given to power supplyconnections other than direct connections to the branch cir-cuits such as power strips.

    Lithium Battery WarningThe Lithium Battery used in the SonicWALL Internet security appliancemay not be replaced by the user. The SonicWALL must be returned to aSonicWALL authorized service center for replacement with the same orequivalent type recommended by the manufacturer. If, for any reason,the battery or SonicWALL Internet security appliance must be disposedof, do so following the battery manufacturer's instructions.

    Cable ConnectionsAll Ethernet and RS232 (Console) cables are designed for intra-buildingconnection to other equipment. Do not connect these ports directly tocommunication wiring or other wiring that exits the building where theSonicWALL is located.

    Regulatory Model/Typ e Product Name

    1RK13-0511RK13-0511RK13-052

    NSA 5000NSA 4500NSA 3500

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    68/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 67

    Safety and Regulatory Information in German

    Weitere Hinweise zur MontageDie oben genannten SonicWALL-Modelle sind fr eine Montage ineinem standardmigen 19-Zoll-Rack konzipiert. Fr eineordnungsgeme Montage sollten die folgenden Hinweise beachtetwerden:

    Vergewissern Sie sich, dass das Rack fr dieses Gert geeig-net ist und verwenden Sie das vom Rack-Hersteller empfoh-lene Montagezubehr.

    Verwenden Sie fr eine sichere Montage vier passende Be-festigungsschrauben, und ziehen Sie diese mit der Hand an.

    Whlen Sie fr die Montage einen Ort, der keinem direktenSonnenlicht ausgesetzt ist und sich nicht in der Nhe vonWrmequellen befindet. Die Umgebungstemperatur darf nichtmehr als 40 C betragen.

    Achten Sie darauf, das sich die Netzwerkkabel nicht in der un-mittelbaren Nhe von Stromleitungen, Leuchtstoffrhren undStrquellen wie Funksendern oder Breitbandverstrkern be-finden.

    Das beigefgte Netzkabel ist nur fr den Gebrauch in Nor-damerikas Vorgesehen. Fr Kunden in der Europaschen Un-ion (EU) ist ein Netzkabel nicht im Lieferumfang enthalten.

    Stellen Sie sicher, dass das Gert vor Wasser und hoher Luft-feuchtigkeit geschtzt ist.

    Stellen Sie sicher, dass die Luft um das Gert herum zirkuli-eren kann und die Lftungsschlitze an der Seite des Gehus-es frei sind. Hier ist ein Belftungsabstand von mindestens 26mm einzuhalten.

    Bringen Sie die SonicWALL waagerecht im Rack an, ummgliche Gefahren durch ungleiche mechanische Belastungzu vermeiden.

    Prfen Sie den Anschluss des Gerts an die Stromver-sorgung, damit der berstromschutz sowie die elektrischeLeitung nicht von einer eventuellen berlastung der Stromver-sorgung beeinflusst werden. Prfen Sie dabei sorgfltig dieAngaben auf dem Aufkleber des Gerts.

    Vergewissern Sie sich, dass das Gert sicher im Rack befes-tigt ist. Insbesondere muss auf nicht direkte Anschlsse anStromquellen geachtet werden wie z. B. bei Verwendung vonMehrfachsteckdosen.

    Hinweis zur LithiumbatterieDie in der Internet Security Appliance von SonicWALL verwendeteLithiumbatterie darf nicht vom Benutzer ausgetauscht werden. ZumAustauschen der Batterie muss die SonicWALL in ein von SonicWALLautorisiertes Service-Center gebracht werden. Dort wird die Batteriedurch denselben oder entsprechenden, vom Hersteller empfohlenenBatterietyp ersetzt. Beachten Sie bei einer Entsorgung der Batterie oderder SonicWALL Internet Security Appliance die diesbezglichenAnweisungen des Herstellers.

    KabelverbindungenAlle Ethernet- und RS232-C-Kabel eignen sich fr die Verbindung vonGerten in Innenrumen. Schlieen Sie an die Anschlsse derSonicWALL keine Kabel an, die aus dem Gebude in dem sich dasGert befindet ,herausgefhrt werden.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    69/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    70/74

    SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 69

    Copyright Notice

    2008 SonicWALL, Inc.

    All rights reserved.

    Under the copyright laws, this manual or the software described within,cannot be copied, in whole or part, without the written consent of themanufacturer, except in the normal use of the software to make abackup copy. The same proprietary and copyright notices must beaffixed to any permitted copies as were affixed to the original. Thisexception does not allow copies to be made for others, whether or notsold, but all of the material purchased (with all backup copies) can besold, given, or loaned to another person. Under the law, copyingincludes translating into another language or format.

    Specifications and descriptions subject to change without notice.

    Trademarks

    SonicWALL is a registered trademark of SonicWALL, Inc.

    Microsoft Windows 98, Windows Vista, Windows 2000, Windows XP,

    Windows Server 2003, Internet Explorer, and Active Directory aretrademarks or registered trademarks of Microsoft Corporation.

    Netscape is a registered trademark of Netscape CommunicationsCorporation in the U.S. and other countries. Netscape Navigator andNetscape Communicator are also trademarks of NetscapeCommunications Corporation and may be registered outside the U.S.

    Adobe, Acrobat, and Acrobat Reader are either registered trademarks ortrademarks of Adobe Systems Incorporated in the U.S. and/or othercountries.

    Firefox is a trademark of the Mozilla Foundation.

    Other product and company names mentioned herein may betrademarks and/or registered trademarks of their respective companiesand are the sole property of their respective manufacturers.

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    71/74

    Page 70 Notes

    Notes

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    72/74

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    73/74

    Page 72 Notes

    Notes

  • 7/22/2019 SonicWALL NSA 5000 4500 3500 Getting Started Guide

    74/74