Policy Configuration : Viewing Network Diagnostic Settings

Viewing Network Diagnostic Settings
To view network settings, complete the following steps:
1
2
Click the Policies tab. In the center pane, navigate to Diagnostics > Network.
3
To refresh the diagnostic data, click Refresh Diagnostic Data display.
4
To delete the diagnostic data, click Delete Diagnostic Data display.
5
The Diagnostic Data section populates the data requests and is capable of displaying IPv4 and IPv6 data.
6
7
8
9
10
To ping a host from the SonicWALL appliance(s), enter a hostname or IP address in the Host field. This can be an IPv4 or IPv6 address. Click the Interface drop-down list, then select Any or one of the listed interfaces. If you want to select an IPv6 address, click Prefer IPv6 networking.
11
12
To view dynamic routing information, click Fetch Default Route Policies (SonicOS 2.5 Enhanced or later).
13
To complete a reverse name resolution, enter an IP address in the Reverse Lookup the IP Address field and click Reverse Name Resolution.
14
To complete a real-time black list lookup, enter an IP address in the IP Address field, a FQDN for the RBL in the RBL Domain field, and DNS server information in the DNS Server field. Click Real-time Black List Lookup.
15
To generate a Tech Support Report, select any of the following four report options:
VPN Keys—Saves shared secrets, encryption, and authentication keys to the report.
ARP Cache—Saves a table relating IP addresses to the corresponding MAC or physical addresses.
DHCP Bindings—Saves entries from the SonicWALL security appliance DHCP server.
IKE Info—Saves current information about active IKE configurations.
16
Click Fetch Tech Support Report.
17
To request a packet trace, enter the IP address of the remote host in the Host field, and click Start. You must enter an IP address in the Host field; do not enter a host name, such as “www.yahoo.com”. Click Stop to terminate the packet trace and Query to query the trace. To reset a host, enter the IP address in the Host field and click Reset.