Network : Network > Interfaces

Configuring IPS Sniffer Mode
To configure the firewall for IPS Sniffer Mode, you will use two interfaces in the same zone for the L2 Bridge-Pair. You can use any interfaces except the WAN interface. For this example, we will use X2 and X3 for the Bridge-Pair, and configure them to be in the LAN zone. The WAN interface (X1) is used by the firewall for access to the firewall Data Center as needed. The mirrored port on the switch will connect to one of the interfaces in the Bridge-Pair.
Topics:
Configuration Task List for IPS Sniffer Mode
Configuring the Primary Bridge Interface
1
Select the Network tab, Interfaces folder from the navigation panel.
2
Click the Configure icon in the right column of interface X2.
3
In the Edit Interface dialog box on the General tab, select LAN from the Zone drop-down list.
4
For IP Assignment, select Static from the drop-down list.
5
6
7
8
9
Configuring the Secondary Bridge Interface
Our example continues with X3 as the secondary bridge interface.
1
Select the Network tab, Interfaces folder from the navigation panel.
2
Click the Configure icon in the right column of the X3 interface.
3
In the Edit Interface dialog box on the General tab, select LAN from the Zone drop-down list.
4
In the IP Assignment drop-down list, select Layer 2 Bridged Mode.
5
In the Bridged to drop-down list, select the X2 interface.
6
Do not enable the Block all non-IPv4 traffic setting if you want to monitor non-IPv4 traffic.
7
Select Never route traffic on this bridge-pair to ensure that the traffic from the mirrored switch port is not sent back out onto the network.
8
Select Only sniff traffic on this bridge-pair to enable sniffing or monitoring of packets that arrive on the L2 Bridge from the mirrored switch port.
9
Select Disable stateful-inspection on this bridge-pair to exempt these interfaces from stateful high availability inspection. If Deep Packet Inspection services are enabled for these interfaces, the DPI services will continue to be applied.
10
11
Enabling and Configuring SNMP
When SNMP is enabled, SNMP traps are automatically triggered for many events that are generated by SonicWALL Security Services such as Intrusion Prevention and Gateway Anti-Virus.
More than 50 IPS and GAV events currently trigger SNMP traps. The SonicOS Log Event Reference Guide contains a list of events that are logged by SonicOS, and includes the SNMP trap number where applicable. The guide is available online at http://www.sonicwall.com/us/Support.html by typing Log Event into the Search field at the top of the page.
To determine the traps that are possible when using IPS Sniffer Mode with Intrusion Prevention enabled, search for Intrusion in the table found in the Index of Log Event Messages section in the SonicOS Log Event Reference Guide. The SNMP trap number, if available for that event, is printed in the SNMP Trap Type column of the table.
To determine the possible traps with Gateway Anti-Virus enabled, search the table for Security Services, and view the SNMP trap number in the SNMP Trap Type column.
To enable and configure SNMP:
1
Navigate to the System > SNMP page.
2
Select Enable SNMP.
3
Click Accept. The Configure icon becomes active and the View, User/Group, and Access sections are displayed.
4
Click Configure. The SNMP Settings dialog box is displayed.
5
6
7
8
9
10
11
12