Introduction

Introduction

SonicOS 5.9 is the most powerful SonicOS operating system for SonicWALL security appliances. This chapter contains the following sections:

Key features in SonicOS 5.9

SonicOS 5.9 includes the following new features:

Active-Active Clustering

Active/Active Clustering is the most recent addition to the High Availability feature set in SonicOS. A typical Active/Active Clustering deployment includes four firewalls of the same SonicWALL model configured as two Cluster Nodes, where each node consists of one Stateful High Availability pair. For larger deployments, the cluster can include eight firewalls, configured as four Cluster Nodes.

With Active/Active Clustering, you can assign certain traffic flows to each node in the cluster, providing load sharing in addition to redundancy, and supporting a much higher throughput without a single point of failure. Earlier High Availability features, such as Stateful Synchronization and Active/Active DPI (previously called Active/Active UTM), continue to be supported and are recommended for use in conjunction with Active/Active Clustering.

Bandwidth Management Enhancements

The Enhanced Bandwidth Management feature provides extensive enhancements to SonicWALL's BWM functionality, including the following:

BGP Advanced Routing

Border Gateway Protocol (BGP) advanced routing is a large-scale routing protocol used to communicate routing information between Autonomous Systems (AS’s), which are well-defined, separately administered network domains. BGP support allows for SonicWALL security appliances to replace a traditional BGP router on the edge of a network's AS. The current SonicWALL implementation of BGP is most appropriate for "single-provider / single-homed" environments, where the network uses one ISP as their Internet provider and has a single connection to that provider. SonicWALL BGP is also capable of supporting "single-provider / multi-homed" environments, where the network uses a single ISP but has a small number of separate routes to the provider. Because BGP transmits packets in the clear, SonicWALL supports using an IPSec tunnel for secure BGP sessions. The IPSec tunnel is configured independently within the VPN configuration section of the SonicOS Web-based management interface, while BGP is enabled on the Network > Routing page and then configured on the SonicOS Command Line Interface.

Common Access Card Support

The Common Access Card (CAC) is a smart card issued by the United States Department of Defense (DoD).  The CAC enables encrypting and cryptographically signing email, facilitating the use of PKI authentication tools, and establishes an authoritative process for the use of identity credentials. Although this feature is developed to meet CAC requirements, it can be used for any scenario which requires client certificate in the HTTPS/SSL connection.

CAC support is enabled on the System > Adminstration page by selecting the Enable Client Certificate Check option.

CAC is only supported for HTTPS management. Optionally, an additional Online Certificate Status Protocol (OSCP) check can verify the authenticity certificate.

Users do not need to perform any configuration. When the CAC Smart Card is inserted into the PC, the card imports client certificates to the Internet Explorer personal certificate store automatically. The certificate selection window pops up when customer initiates HTTPS management.

Note         Note: The CAC card is designed to work automatically with Internet Explorer. CAC certificates can be manually imported into other browsers.

When the SonicWALL UTM appliance receives the client certificate, it verifies it with the certificate issuer and then redirects the user to the regular admin login page. If OCSP is enabled, the browser will be redirect to an OCSP Pending page while the appliance performs the OSCP check.

Enhanced TSR

 

Enterprise CLI

SonicOS 5.9 introduces a new, more-robust, enterprise-level Command Line Interface (CLI). The CLI can be accessed via the console and SSH. The new CLI is designed to follow the organization of the SonicOS management GUI. The commands will be categorized as follows:

LDAP User Group Mirroring

LDAP User Group Mirroring provides the ability to manage LDAP User Groups only on the LDAP server without needing to do any duplication of that on the SonicWALL appliance. The groups and group-group memberships will be periodically read from the LDAP server via the existing import mechanism and local user groups will be created to mirror them.

The name of the local user group that is auto-created to mirror one on the LDAP server will include the domain where the group is located, formatted name@domain.com. This will ensure that we have a unique user group name when mirroring user groups from multiple domains.

The following will apply for these auto-created mirror user groups:

LDAP Group Membership by Organizational Unit

The LDAP Group Membership by Organizational Unit feature provides the ability to set LDAP rules and policies for the users who are located in certain Organizational Units (OUs) on the LDAP server. This is accomplished through the new "Set membership for LDAP users at/under location" setting in local user groups. When a user logs in or is authenticated via SSO and user groups are being set via LDAP, when the user object is found on the LDAP server the user will be made a member of any such groups that its location matches.

It will now be possible to set any local user group, including the default user groups (apart from Everyone or Trusted Users) as one whose member users are set from their location in the LDAP directory tree, and to configure the location in the group object.

When groups are configured this way:

Logging enhancement

 

One-Touch Configuration

The One-Touch Configuration Override feature is configured on the System > Settings page. It can be thought of us as a quick tune-up for your SonicWALL appliance’s security settings. With a single click, One-Touch Configuration Override applies over sixty configuration settings over sixteen pages of the SonicWALL GUI to implement SonicWALL’s recommended best practices. These settings ensure that your appliance is taking advantage of SonicWALL’s security features.

There are two sets of One-Touch Configuration Override settings:

Both of the One-Touch Configuration Override deployments implement the following configurations:

The DPI and Stateful Firewall Security deployment also configures the following DPI-related configurations:

Caution        Be aware that the One-Touch Configuration Override may change the behavior of your SonicWALL security appliance. Review the list of configurations before applying One-Touch Configuration Override.

In particular, the following configurations may affect the experience of the administrator:
- Administrator password requirements on the System > Administration page.
- Requiring HTTPS management.
- Disabling HTTP to HTTPS redirect.
- Disabling Ping management.

SHA-2 in IPSec

SHA-2 is a set of cryptographic algorithms used to secure IPSec traffic. SHA-2 provides a number of enhancements over its predecessor, SHA-1, to address potential security flaws. SonicWALL has implemented the SHA256 variant of SHA-2.

SHA-2 can be used for Global VPN policies that are configured either manually or through the VPN wizard. If IKE is used for IPSec, SHA256 is available for both IKE and IKEv2.

If the two phases are negotiated successful, the new algorithms will also be shown in the log page.

SNMPv3

Simple Network Management Protocol Version 3 (SNMPv3) is an interoperable standards-based protocol for network management. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network. The security features provided in SNMPv3 are:

SNMPv3 provides for both security models and security levels. A security model is an authentication strategy that is set up for a user and the group in which the user resides. A security level is the permitted level of security within a security model. A combination of a security model and a security level will determine which security mechanism is employed when handling an SNMP packet. Three security models are available: SNMPv1, SNMPv2c, and SNMPv3.

SSL VPN Remote Access End-Point Control

Remote Access End Point Control (EPC) verifies that remote users’s computers are secure before allowing network access. Remote Access EPC guards against threats when your network is accessed from remote, insecure environments. Remote Access EPC is a two-part process:

  1. Evaluates the Security Attributes of a user’s computer.

  2. The user’s computer is checked against a number of configurable Security Attributes, such as antivirus, anti-spyware, or personal firewall programs, client certificates, registry entry, or Windows version.

  3. Assigns the user session to a Device Profile that grants an appropriate level of network access over SSL VPN, depending on the security of the user’s computer.

The user session is assigned to a Device Profile that will either allow or block network access. If the computer does not meet the security requirements, a message can be displayed to instruct the user on how to secure the computer. Multiple Device Profiles can be configured to provide different levels of network access,

Device Profiles

There are three categories of Device Profiles that you can customize, plus a built-in default Device Profile.

Note         When Remote Access EPC is disabled, the Default Device Profile is used to configure SSL VPN access. With Remote Access EPC disabled, only the Settings, Client Routes, and Client Settings options can be configured. The Security Attributes settings are not available when EPC is disabled.

Security Attributes

Security Attributes are the critical component of Remote Access EPC. Each Device Profile can contain multiple Security Attributes. In order for the client to match the Device Profile, it must satisfy all of the configured Security Attributes. SonicWALL Remote Access EPC currently supports the following eleven types of Security Attributes:

SSL-VPN Multi-Core Scalability

Muti-Core SonicWALL UTM appliances now distribute SSL VPN sessions across all cores on the platform. Previous releases of SonicOS performed all SSL VPN functions on core 0. This feature will enable multi-core appliances to support a greater number of concurrent SSL VPN sessions. This feature is transparent to the administrator and does not affect the GUI or configuration process.

UDP Flood Protection

UDP Flood Attack is type of denial-of-service (DoS) attack. It can be initiated by sending a large number of UDP packets to random ports on a remote host. The UDP Flood Protection feature defends against these attacks by monitoring UDP traffic that passes through the appliance for UDP Flood attack.

UDP Flood Protection is configured on the Firewall Settings > Flood Protection page:

Wireless and SonicPoint Enhancements

SonicOS 5.9 includes the following wireless and SonicPoint enhancements:

SonicPoint Features

SonicPoint Layer 3 Management Phase I – This enhancement provides the DHCP and tunneling solution to support SonicPoint deployment in a Layer 3 network. SonicWALL DHCP-based Discovery Protocol (SDDP) is based on the well known DHCP protocol and allows the SonicWALL gateway and SonicPoint to discover each other automatically across Layer 3 local networks. The remote network management protocol, SonicWALL SSLVPN-based Management Protocol (SSMP), is based on SonicWALL SSLVPN infrastructure to allow SonicPoints to be managed by a SonicWALL SSLVPN enabled network security appliance over the Internet. Supported on SonicPoint-N/Ni/Ne/NDR, all NSA models, and the TZ 210 Series.

SonicPoint-N Dynamic Frequency Selection (DFS) Support – After a DFS certificate is issued, the SonicPoint-N can support dynamic frequency selection to allow a SonicPoint-N to be deployed in sensitive channels of the 5 GHz frequency band. Supported on SonicPoint-N.

To view and select from these 5 GHz channels, navigate to SonicPoint > SonicPoints and configure a SonicPoint-N Profile or an individual SonicPoint-N. On the 802.11n Radio tab, select any 5 GHz setting in the Mode field, then select either Standard or Wide as the Radio Band. The Standard Channel or Primary Channel drop-down lists display a choice of sensitive channels.

SonicPoint 802.11e (WMM) QoS – SonicPoint access points now support Wi-Fi Multimedia (WMM) to provide a better Quality of Service experience on miscellaneous applications, including VoIP on Wi-Fi phones, and multimedia traffic on IEEE 802.11 networks. WMM is a Wi-Fi Alliance interoperability certification based on the IEEE 802.11e standard. It prioritizes traffic according to four access categories: voice, video, best effort, and background. Note that WMM does not provide guaranteed throughput. Supported on SonicPoint-N/Ni/Ne/NDR.

Each Access Category has its own transmit queue. WMM requires the SonicPoint-N to implement multiple queues for multiple priority access categories. The SonicPoint-N relies on either the application or the firewall to provide type of service (TOS) information in the IP data in order to differentiate traffic types. One way to provide TOS is through firewall services and access rules; another way is through VLAN tagging.

Firewall Services and Access Rules:

Services using a certain port can be prioritized and put into a proper transmit queue. For example, UDP traffic sending to port 2427 can be regarded as a video stream. The firewall administrator can add a custom service on the Firewall > Services page, similar to the following:

At least one access rule should be added on the Firewall > Access Rules page for the new service. For example, when such a service happens from a station on the LAN zone to a wireless client on the WLAN zone, an access rule can be inserted. In the QoS setting tab, an explicit DSCP value is defined. Later, when packets are sent to the SonicPoint-N via the firewall using UDP protocol with destination port 2427, their TOS fields are set according to the QoS setting in the access rule. The General and QoS tabs of an example access rule are shown below:

VLAN Tagging

Prioritization is possible in VLAN over Virtual Access Point (VAP), because the SonicPoint-N allows a VAP to be configured to connect with a VLAN by using same VLAN ID. You can set priority for VLAN traffic through a firewall access rule.

The firewall access rule is similar to that shown above to set priority for a UDP service destined to a port such as 2427, but is configured with a VLAN (VLAN over VAP) interface, such as X3:V10 Subnet, as the Source and Destination, and is a WLAN to WLAN rule.

SonicPoint WMM Configuration

The SonicPoint > Wi-Fi Multimedia page provides a way to configure WMM profiles, including parameters and priority mappings.

You can also create a WMM profile or select an existing WMM profile when configuring a SonicPoint-N or a SonicPoint-N Profile from the SonicPoint > SonicPoints page. The configuration window provides a WMM  (Wi-Fi Multimedia) drop-down list on the Advanced tab with these options.

When configuring the WMM profile, on the Settings tab, the administrator can configure the size of the contention window (CWMin/CWMax) and the arbitration interframe space (AIFS) number when creating a WMM profile. These values can be configured individually for each priority, AC_BK, AC_BE, AC_VI, and AC_VO on the Access Point (SonicPoint-N) and for the Station (firewall).

The Mapping tab allows you to map priority levels to DSCP values. The default DSCP values are as same as the ones in Firewall > Access Rules, QoS mapping.

SonicPoint RADIUS Server Failover – Provides round-robin algorithm and more flexibility to manage primary and secondary RADIUS servers of SonicPoint-N/Ni/Ne/NDR.

SonicPoint WPA TKIP Countermeasures and MIC Failure Flooding Detection and Protection – Wi-Fi Protected Access (WPA) TKIP countermeasures will lock down the entire Wireless LAN network in situations where an intruder launches a WPA passphrase dictionary attack to generate a Message Integrity Check (MIC) failure flood in an attempt to impact the WLAN functionality and performance. This SonicWALL solution can detect a TKIP MIC failure flood and take action with TKIP countermeasures against the source to automatically block them by adding them to the runtime blacklist, protecting the overall system. Supported on SonicPoint-N/Ni/Ne/NDR.

SonicPoint FairNet Support – After optimizing the system resources, FairNet is now supported on the SonicPoint-Ni and SonicPoint-Ne to provide bandwidth fairness control in the WLAN. FairNet continues to be supported on SonicPoint-N and SonicPoint-N DR.

SonicPoint Auto Provisioning – A SonicPoint can be re-provisioned automatically according to a wireless zone profile. This increases management efficiency and ease of use, as previously a SonicPoint had to be deleted and re-added in order to be re-provisioned with a modified profile. Supported on SonicPoint-N/Ni/Ne/NDR/a/g.

SonicPoint Diagnostics Enhancement – A SonicPoint can collect critical runtime data and save it into persistent storage. If the SonicPoint has a failure, the SonicWALL managing appliance retrieves that data when the SonicPoint reboots, and incorporates it into the Tech Support Report (TSR). A subsequent SonicPoint failure will overwrite the data. Supported on SonicPoint-N/Ni/Ne/NDR.

Wireless PCI Compliance and Intrusion Detection/Prevention

Rogue Device Detection and Prevention – The SonicPoint-N can be configured in dedicated sensor mode to focus on rogue device detection and prevention, either passively or proactively on both the 2.4 GHz and 5 GHz bands. Both bands can be scanned even if only one is in use. The rogue device can be analyzed to report whether it is connected to the network and if it is blocked by a wired or wireless mechanism.

To scan rogue devices, navigate to the SonicPoint > IDS page. Select the type of scan to perform from the Perform SonicPoint Scan drop-down list, and then click OK in the confirmation dialog box.

Built-in Wireless Radio Scan Schedule – The internal built-in radio on the SonicWALL TZ 210 Wireless, TZ 200 Wireless, and TZ 100 Wireless appliances can now be scheduled to perform Intrusion Detection/Prevention scanning with granular scheduling options to cover up to 24 hours a day, 7 days a week. The same scheduling options already exist on the 802.11n Radio tab (or comparable tab) when editing SonicPoint profiles for all SonicPoint models.

Wireless Bridge

Wireless Client Bridge Support – A wireless bridge is supported in WLAN Layer 2 Bridge Mode to provide more flexibility. This feature allows you to bridge wired traffic wirelessly to another LAN. Supported on TZ 100W / 200W /  210W.

To configure the bridge, edit the WLAN interface in Network > Interfaces. Set the IP Assignment field to Layer 2 Bridged Mode, and set the Bridged to interface to a LAN interface, such as X0.

Virtual Access Points

Virtual Access Point Schedule Support – Each Virtual Access Point schedule can be individually enabled or disabled, for ease of use.

To select a VAP schedule, navigate to the SonicPoint > Virtual Access Point page. Add or edit a Virtual Access Point. In the configuration window, click the Advanced tab. Select the desired schedule from the VAP Schedule Name drop-down list.

Virtual Access Point Layer 2 Bridging – Each Virtual Access Point can be bridged to a corresponding VLAN interface on the LAN zone, providing better flexibility.

Virtual Access Point ACL Support – Each Virtual Access Point can support an individual Access Control List (ACL) to provide more effective authentication control. Unified ACL support is provided for both SonicPoints and built-in wireless radio.

Virtual Access Point Group Sharing on SonicPoint-N Dual Radios – The same Virtual Access Point / VLAN settings can be applied to dual radios. This allows you to use a unified policy for both radios, and to share a VLAN trunk in the network switch. Supported on the SonicPoint-N DR.

Guest Services

Traffic Quota Based Guest Server Policy – Guest sessions can be controlled based on traffic quota policy for better usability. This allows you to configure different transmit/receive limits for different guest clients, possibly based on payment.

External Guest Service FQDN Support – Fully Qualified Domain Names are supported for Lightweight Hotspot Messaging (LHM) server configuration.

External Guest Service Apache Web Server / PHP Support – Apache Web server and PHP scripts are supported for Lightweight Hotspot Messaging infrastructure purposes. This allows support for Linux based Web servers that run Apache and PHP, rather than the Microsoft .Net Framework and ASP scripts.

Guest Administrator Support – A “Guest Administrator” privileges group is available to provide administrator access only to manage guest accounts and sessions. After logging in, the Guest Administrator can manage guest accounts and sessions, but cannot access any other resources or management interface pages.

Key Features in SonicOS 5.8.1

SonicOS 5.8.1 and higher releases include the following key features:

Although the entire SonicOS interface is available in different languages, sometimes the administrator does not want to change the entire UI language to a specific local one. However, if the firewall requires authentication before users can access other networks, or enables external access services (e.g. VPN, SSL-VPN), those login related pages usually should be localized to make them more usable for normal users.

You can look up an IP address to find out the domain, DNS server, and check whether it is part of a Botnet. The Services > Geo-IP & Botnet Filter page provides this functionality at the bottom of the page. The System > Diagnostics and Dashboard > App Flow Monitor pages also provide this capability.

Global bandwidth management provide 8 priority queues. The Guaranteed rate and Maximum\Burst rate are user configurable. Eight queues are created for each physical interface. As traffic flows through the firewall from interface1 to interface2, BWM is applied on both the interfaces according to the configuration. For example, ingress BWM can be applied based on interface1 settings and egress BWM applied on interface2 settings.

The purpose of this option is to provide the ability to access the SonicOS management interface even when the appliance is running at 100% utilization.

Anti-virus exclusions which existed before the upgrade and which apply to hosts residing in custom zones will not be detected. IP address ranges not falling into the supported zones will default to the LAN zone. Conversion to the LAN zone occurs during the restart booting process. There is no message in the SonicOS management interface at login time regarding the conversion.

The SonicWALL Enforced Client Beta Release Notes, available with the software on MySonicWALL, provide detailed information about client installation and usage, and describe administrator access to the SonicWALL Enforced Client Anti-Virus Policy and Reporting Server (EPRS). The EPRS system allows administrators to configure policies for clients and client groups, and to view reports showing top hazards and other client status.

Caution        Before installing SonicWALL Enforced Client on your client systems, Kaspersky Anti-Virus must be licensed on your SonicWALL appliance. To do this, email the serial number of the appliance to the beta alias (secbeta@sonicwall.com). After the general release, if you are running a firmware version prior to 5.8.1 and currently licensed for McAfee Anti-Virus, the McAfee AV license must expire or be expired before you can license Kaspersky AV. Please note that SonicWALL cannot reinstate your McAfee licensing if it is prematurely expired on customer request.

Please do NOT contact SonicWALL technical support with any requests about the Enforced Client beta program.  All questions and feedback should go to the above beta alias.

WAN connections such as T1/E1 or xDSL typically have a round trip time of greater 25ms and less than 100ms. This latency causes some applications to perform less than expected or poorly. The typical remedy is to purchase a higher quality service or larger provision of bandwidth. WAN optimization can delay or postpone the expenditure and provide an increase in application performance response time.

Wire Mode is a simplified form of Layer 2 Bridge Mode. A Wire Mode interface does not take any IP address and it is typically configured as a bridge between a pair of interfaces. None of the packets received on a Wire Mode interface are destined to the firewall, but are only bridged to the other interface.

Wire Mode operates in any one these 4 different modes:

Wire Mode is supported on the following SonicWALL appliance models:

Key Features in SonicOS 5.8

SonicOS 5.8 and higher releases include the following key features:

SonicWALL appliances running SonicOS 5.8.0.0 or higher and already licensed for GAV/IPS/AS, Total Secure, or Comprehensive Gateway Security Suite (CGSS) will receive a complimentary license for the Real-Time Visualization Dashboard (App Visualization). Note that appliances running earlier versions of SonicOS and/or appliances not licensed for GAV/IPS/AS, Total Secure, or CGSS will receive a 30-day free trial

Appliances newly registered and upgraded to SonicOS 5.8.0.0 or higher will receive a 30-day free trial license of App Visualization by default.

Navigate to the Log > Flow Reporting page to manually Enable Flow Reporting and Visualization feature. You can then view real-time application traffic on the Dashboard > Real-Time Monitor page and application activity in other Dashboard pages for the configured flows from the SonicWALL application signature database.

If you plan to use both internal and external flow reporting, SonicWALL recommends enabling the following (located in the Log > Flow Reporting screen) after successfully registering and licensing your appliance to avoid multiple restarts:

Administrators can now more easily create network policy object-based control rules to filter network traffic flows based on:

Network security administrators now have application-level, user-level, and content-level real-time visibility into the traffic flowing through their networks. Administrators can take immediate action to re-traffic engineer their networks, and quickly identify Web usage abuse, and protect their organizations from infiltration by malware. Administrators can limit access to bandwidth-hogging websites and applications, reserve higher priority to critical applications and services, and prevent sensitive data from escaping the SonicWALL secured networks.

SonicWALL appliances running SonicOS 5.8.0.0 or higher and already licensed for GAV/IPS/AS, Total Secure, or Comprehensive Gateway Security Suite (CGSS) will receive a complimentary license for Application Intelligence and Control (App Control). Note that appliances running earlier versions of SonicOS and/or appliances not licensed for GAV/IPS/AS, Total Secure, or CGSS will receive a 30-day free trial

Appliances newly registered and upgraded to SonicOS 5.8.0.0 or higher will receive a 30-day free trial license of App Control by default.

Select the Enable App Control option on the Firewall > App Control Advanced page to begin using the App. Control feature.

To create policies using App Rules (included with the App Control license), select Enable App Rules on the Firewall > App Rules page.

SonicOS 5.8.0.0 supports Static Link Aggregation with the ability to aggregate up to 4 ports into a single link. A round-robin algorithm is used for load balancing traffic across the interfaces in an aggregated link.

When the primary interface is active, it handles all traffic from/to the interface. When the primary interface goes down, the backup interface takes over and handles all outgoing/incoming traffic. When the primary interface comes up again, it takes over all the traffic handling duties from the backup interface.

When Port Redundancy, High Availability and WAN Load Balancing are used together, Port Redundancy takes precedence followed by High Availability, then followed by WAN Load Balancing.

SIP ALG support has existed within SonicOS firmware since very early versions on legacy platforms. Changes to SIP ALG have been added over time to support optimized media between phones, SIP Back-to-Back User Agent (B2BUA), additional equipment vendors, and operation on a multi-core system.

The SIP protocol is now in a position of business critical importance - protecting the voice infrastructure, including VoIP. To accommodate the demands of this modern voice infrastructure, SIP ALG enhancements include the following:

Key Features in SonicOS 5.7

SonicOS 5.7 and higher releases include the following key features:

Key Features in SonicOS 5.6

SonicOS 5.6 and higher releases include the following key features:

Key Features in SonicOS 5.5

SonicOS 5.5 and higher releases include the following key features:

Key Features in SonicOS 5.4

SonicOS 5.4 and higher releases include the following key features:

Key Features in SonicOS 5.3

SonicOS 5.3 and higher releases include the following key features:

Key Features in SonicOS 5.2

SonicOS 5.2 and higher releases include the following key features:

Key Features in SonicOS 5.1

SonicOS 5.1 and higher releases include the following key features:

Tip             By default, Mozilla Firefox 2.0 and Microsoft Internet Explorer 7.0 enable SSL 3.0 and TLS, and disable SSL 2.0. SonicWALL recommends using these most recent Web browser releases. If you are using a previous release of these browsers, you should enable SSL 3.0 and TLS and disable SSL 2.0. In Internet Explorer, go to Tools > Internet Options, click on the Advanced tab, and scroll to the bottom of the Settings menu. In Firefox, go to Tools > Options, click on the Advanced tab, and then click on the Encryption tab.

Note         HTTPS Filtering is IP-based, so IP addresses must be used rather than domain names in the Allowed or Forbidden lists. You can use the nslookup command in a DOS cmd window to convert a domain name to its IP address(es). There may be more than one IP address associated with a domain, and if so, all must be added to the Allowed or Forbidden list.

These settings are available by pressing the Configure button in the VPN > Advanced screen of the management interface. However, if a VPN Policy with IKEv2 exchange mode and a 0.0.0.0 IPsec gateway is defined, you cannot configure these IKE Proposal settings on an individual policy basis.

Note         The VPN policy on the remote gateway must also be configured with the same settings.

VAPs allow the network administrator to control wireless user access and security settings by setting up multiple custom configurations on a single physical interface. Each of these custom configurations acts as a separate (virtual) access point, and can be grouped and enforced on single or multiple physical SonicPoint access points simultaneously. You can configure up to eight VAPs per SonicPoint access point.

L2 Bridge Mode employs a secure learning bridge architecture, enabling it to pass and inspect traffic types that cannot be handled by many other methods of transparent security appliance integration. Using L2 Bridge Mode, a SonicWALL security appliance can be non-disruptively added to any Ethernet network to provide in-line deep-packet inspection for all traversing IPv4 TCP and UDP traffic. Unlike other transparent solutions, L2 Bridge Mode can pass all traffic types, including IEEE 802.1Q VLANs, Spanning Tree Protocol, multicast, broadcast, and IPv6, ensuring that all network communications will continue uninterrupted.

L2 Bridge Mode provides an ideal solution for networks that already have an existing firewall, and do not have immediate plans to replace their existing firewall but wish to add the security of SonicWALL Unified Threat Management (UTM) deep-packet inspection, such as Intrusion Prevention Services, Gateway Anti-Virus, and Gateway Anti Spyware.

The following feature enhancements are included in SonicOS 5.0 and higher:

SonicWALL Management Interface

The SonicWALL security appliance’s Web-based management interface provides an easy-to-use graphical interface for configuring your SonicWALL security appliance. The following sections provide an overview of the key management interface objects:

Dynamic User Interface

 SonicOS 5.0 introduced a new Dynamic User Interface. Table statistics and log entries now dynamically update within the user interface without requiring users to reload their browsers. Active connections, user sessions, VoIP calls, and similar activities can be disconnected or flushed dynamically with a single click on the icon_delete.jpg delete icon in the Flush or Logout column.

This lightweight dynamic interface is designed to have no impact on the SonicWALL Web server, CPU utilization, bandwidth or other performance factors. You can leave your browser window on a dynamically updating page indefinitely with no impact to the performance of your SonicWALL security appliance.

Navigating the Management Interface

Navigating the SonicWALL management interface includes a hierarchy of menu buttons on the navigation bar (left side of your browser window). When you click a menu button, related management functions are displayed as submenu items in the navigation bar.

The left navigation bar now expands and contracts dynamically when clicked on without automatically navigating to a sub-folder page. When you click on a top-level heading in the left navigation bar, it automatically expands that heading and contracts the heading for the page you are currently on, but it doesn’t not navigate away from your current page. To navigate to a new page, you first click on the heading, and then click on the sub-folder page you want. This eliminates the delay and redundant page loading that occurred in previous versions of SonicOS when clicking on a heading automatically loaded the first sub-folder page.

menu.jpg

 

 

If the navigation bar continues below the bottom of your browser, an nav_bar_up_down.jpg up-and-down arrow symbol appears in the bottom right corner of the navigation bar. Mouse over the up or down arrow to scroll the navigation bar up or down.

scroll_status_bar.jpg

 

Common Icons in the Management Interface

The following describe the functions of common icons used in the SonicWALL management interface:

Status Bar

The Status bar at the bottom of the management interface window displays the status of actions executed in the SonicWALL management interface.

status_bar.jpg

 

Applying Changes

Click the Accept button at the top right corner of the SonicWALL management interface to save any configuration changes you made on the page.

accept.jpg

 

 

If the settings are contained in a secondary window within the management interface, when you click OK, the settings are automatically applied to the SonicWALL security appliance.

add_address_object.jpg

 

 

Tooltips

SonicOS 5.0 introduced embedded tool tips for many elements in the SonicOS UI. These Tooltips are small pop-up windows that are displayed when you hover your mouse over a UI element. They provide brief information describing the element. Tooltips are displayed for many forms, buttons, table headings and entries.

Note         Not all UI elements have Tooltips. If a Tooltip does not display after hovering your mouse over an element for a couple of seconds, you can safely conclude that it does not have an associated Tooltip.

When applicable, Tooltips display the minimum, maximum, and default values for form entries. These entries are generated directly from the SonicOS firmware, so the values will be correct for the specific platform and firmware combination you are using.

The behavior of the Tooltips can be configured on the System > Administration page.

Tooltips are enabled by default. To disable Tooltips, uncheck the Enable Tooltip checkbox. The duration of time before Tooltips display can be configured:

Navigating Dynamic Tables

In the SonicOS dynamic user interface, table statistics and log entries now dynamically update within the user interface without requiring users to reload their browsers.You can navigate tables in the management interface with large number of entries by using the navigation buttons located on the upper right top corner of the table.

table.jpg

 

The table navigation bar includes buttons for moving through table pages.

table_navigation.jpg

 

A number of tables now include an option to specify the number of items displayed per page.

table_nav_per_page.jpg

 

 

Active connections, user sessions, VoIP calls, and similar activities can be disconnected or flushed dynamically with a single click on the icon_delete.jpg delete icon in the Flush or Logout column.

Several tables include a new table statistics icon table_stats_icon.jpg that displays a brief, dynamically updating summary of information for that table entry. Tables with the new statistics icon include:

Several tables include a tooltip that displays the maximum number of entries that the SonicWALL security appliance supports. For example, the following image shows the maximum number of address groups the appliance supports.

Tables that display the maximum entry tooltip include NAT policies, access rules, address objects, and address groups.

Getting Help

Each SonicWALL security appliance includes Web-based online help available from the management interface.Clicking the question mark ? button on the top-right corner of every page accesses the context-sensitive help for the page.

help_button.jpg

 

Tip             Accessing the SonicWALL security appliance online help requires an active Internet connection.

Logging Out

The Logout button at the bottom of the menu bar terminates the management interface session and displays the authentication page for logging into the SonicWALL security appliance.

logout_button.jpg