System_systemSettingsView

System > Settings

This System > Settings page allows you to manage your SonicWALL security appliance’s SonicOS versions and preferences.

Settings

The Settings sections provides the following capabilities.

Import Settings

To import a previously saved preferences file into the SonicWALL security appliance, follow these instructions:

  1. Click Import Settings to import a previously exported preferences file into the SonicWALL security appliance. The Import Settings window is displayed.

  2. Click Browse to locate the file which has a *.exp file name extension.

  3. Select the preferences file.

  4. Click Import, and restart the firewall.

Export Settings

To export configuration settings from the SonicWALL security appliance, use the instructions below:

  1. Click Export Settings. The Export Settings window is displayed.

  2. Click Export.

  3. Click Save, and then select a location to save the file. The file is named “sonicwall.exp” but can be renamed.

  4. Click Save. This process can take up to a minute. The exported preferences file can be imported into the SonicWALL security appliance if it is necessary to reset the firmware.

Send Diagnostic Reports

Click Send Diagnostic Reports to send system diagnostics to SonicWALL Technical Support. The status bar at the bottom of the screen displays “Please wait!” while sending the report, then displays “Diagnostic reports sent successfully”.

Firmware Management

The Firmware Management section provides settings that allow for easy firmware upgrade and preferences management. The Firmware Management section allows you to:

Note         SonicWALL security appliance SafeMode, which uses the same settings used Firmware Management, provides quick recovery from uncertain configuration states.

Firmware Management Table

The Firmware Management table displays the following information:

Caution        Clicking Boot next to any firmware image overwrites the existing current firmware image making it the Current Firmware image.

Caution        When uploading firmware to the SonicWALL security appliance, you must not interrupt the Web browser by closing the browser, clicking a link, or loading a new page. If the browser is interrupted, the firmware may become corrupted.

Updating Firmware Manually

Click Upload New Firmware to upload new firmware to the SonicWALL security appliance. The Upload Firmware window is displayed. Browse to the firmware file located on your local drive. Click Upload to upload the new firmware to the SonicWALL security appliance.

Creating a Backup Firmware Image

When you click Create Backup, the SonicWALL security appliance takes a “snapshot” of your current system state, firmware and configuration preferences, and makes it the new System Backup firmware image. Clicking Create Backup overwrites the existing System Backup firmware image as necessary.

SafeMode - Rebooting the SonicWALL Security Appliance

SafeMode allows easy firmware and preferences management as well as quick recovery from uncertain configuration states. To access the SonicWALL security appliance using SafeMode, use a narrow, straight object (such as a straightened paper clip or a toothpick) to press and hold the reset button on the back of the security appliance for more than twenty seconds. The reset button is in a small hole next to the console port or next to the power supply.

Note         Holding the reset button for two seconds will take a diagnostic snapshot to the console. Holding the reset button for six to eight seconds will reboot the appliance in regular mode.

After the SonicWALL security appliance reboots, open your Web browser and enter the current IP address of the SonicWALL security appliance or the default IP address: 192.168.168.168. The SafeMode page is displayed:

SafeMode allows you to do any of the following:

System Information

System Information for the SonicWALL security appliance is retained and displayed in this section.

Firmware Management

The Firmware Management table in SafeMode has the following columns:

Note         Clicking Boot next to any firmware image overwrites the existing current firmware image making it the Current Firmware image.

Click Boot in the firmware row of your choice to restart the SonicWALL security appliance.

Caution        Only select the Boot with firmware diagnostics enabled (if available) option if instructed to by SonicWALL technical support.

Firmware Auto-Update

Sonic OS Enhanced 5.2 release introduces the Firmware Auto-Update feature, which helps ensure that your SonicWALL security appliance has the latest firmware release. Firmware Auto-Update contains the following options:

Caution        Firmware updates are available only to registered users with a valid support contract. You must register your SonicWALL at https://www.mysonicwall.com.

One-Touch Configuration Overrides

The One-Touch Configuration Override feature can be thought of us as a quick tune-up for your SonicWALL appliance’s security settings. With a single click, One-Touch Configuration Override applies over sixty configuration settings over sixteen pages of the SonicWALL GUI to implement SonicWALL’s recommended best practices. These settings ensure that your appliance is taking advantage of SonicWALL’s security features.

There are two sets of One-Touch Configuration Override settings:

Both of the One-Touch Configuration Override deployments implement the following configurations:

The DPI and Stateful Firewall Security deployment also configures the following DPI-related configurations:

Caution        Be aware that the One-Touch Configuration Override may change the behavior of your SonicWALL security appliance. Review the list of configurations before applying One-Touch Configuration Override.

In particular, the following configurations may affect the experience of the administrator:
- Administrator password requirements on the System > Administration page.
- Requiring HTTPS management.
- Disabling HTTP to HTTPS redirect.
- Disabling Ping management.

The following table lists the configuration settings that are applied as part of One-Touch Configuration Override for both the DPI and Stateful Firewall Security deployment and the Stateful Firewall Security Deployment.

Configuration Setting

DPI and Stateful Firewall Security

Stateful Firewall Security

System > Administration

Password must be changed every 90 days

X

X

Bar repeated password changes for 4 changes

X

X

Enforce password complexity: Require alphabetic, numeric and symbolic characters

X

X

Apply the above password constraints for: all user categories

X

X

Enable administrator/user lockout

X

X

Failed Login attempts per minute before lockout: 7

X

X

Enable inter-administrator messaging

X

X

Inter-administrator Messaging polling interval (seconds): 10

X

X

Network > Interfaces

Any interface allowing HTTP management is replaced with HTTPS Management

X

X

Any setting to 'Add rule to enable redirect from HTTP to HTTPS' is disabled

X

X

Ping Management is disabled on all interfaces

X

X

Network > Zones

Intrusion Prevention is enabled on all applicable default Zones

X

 

Gateway Anti-Virus protection is enabled on all applicable default Zones

X

 

Anti-Spyware protection is enabled on all applicable default Zones

X

 

App Rules is enabled on all applicable default Zones

X

 

SSL Control is enabled on all default Zones

X

 

Network > DNS

Enable DNS Rebinding protection

X

X

DNS Rebinding Action: Log Attack & Drop DNS Reply

X

X

Firewall > Access Rules

Any Firewall policy with an Action of Deny, the Action is changed Discard

X

X

Source IP Address connection limiting with a threshold of 128 connections is enabled for all firewall policies

X

X

Firewall > App Rules

If licensed, the Enable App Rules setting is turned on

X

 

Firewall Settings > Advanced

Turn on Enable Stealth Mode

X

X

Turn on Randomize IP ID

X

X

Turn off Decrement IP TTL for forwarded traffic

X

X

Turn on Never generate ICMP Time-Exceeded packets

X

X

Connections are set to: Recommended for normal deployments with UTM services enabled

X

X

Turn on Enable IP header checksum enforcement

X

X

Turn on Enable UDP checksum enforcement

X

X

Firewall Settings > Flood Protection

Turn on Enforce strict TCP compliance with RFC 793 and RFC 1122

X

X

Turn on Enable TCP handshake enforcement

X

X

Turn on Enable TCP checksum enforcement

X

X

Turn on Enable TCP handshake timeout

X

X

SYN Flood Protection Mode: Always proxy WAN client connections

X

X

Firewall Settings > Flood Protection

Turn on Enable SSL Control

X

X

Set Action to: Block connection and log the event

X

X

For Configuration, enable all categories

X

X

VPN > Advanced

Turn on Enable IKE Dead Peer Detection

X

X

Turn on Enable Dead Peer Detection for Idle VPN sessions

X

X

Turn on Enable Fragmented Packet Handling

X

X

Turn on Ignore DF (Dont Fragment) Bit

X

X

Turn on Enable NAT Traversal

X

X

Turn on Clean up Active tunnels when Peer Gateway DNS name resolves to a different address

X

X

Turn on Preserve IKE port for Pass Through Connections

X

X

Security Services > Gateway Anti-Virus

If licensed, Enable Gateway Antivirus

X

 

Configure Gateway AV Settings: Turn on Disable SMTP Responses

X

 

Configure Gateway AV Settings: Turn off Disable detection of EICAR test virus

X

 

Configure Gateway AV Settings: Turn on Enable HTTP Byte-Range requests with Gateway AV

X

 

Configure Gateway AV Settings: Turn on Enable FTP REST request with Gateway AV

X

 

Configure Gateway AV Settings: Turn off Do not scan parts of files with high compression ratios

X

 

Configure Gateway AV Settings: Turn off Disable HTTP Clientless Notification Alerts

X

 

Security Services > Intrusion Prevention

If licensed, Enable IPS

X

 

Turn on Prevent All and Detect All for High Priority Attacks

X

 

Turn on Prevent All and Detect All for Medium Priority Attacks

X

 

Turn on Prevent All and Detect All for Low Priority Attacks

X

 

Security Services > Anti-Spyware

If licensed, Enable Anti-Spyware

X

 

Turn on Prevent All and Detect All for High Priority Attacks

X

 

Turn on Prevent All and Detect All for Medium Priority Attacks

X

 

Turn on Prevent All and Detect All for Low Priority Attacks

X

 

Configure Anti-Spyware Settings: Turn on Disable SMTP Responses

X

 

Configure Anti-Spyware Settings: Turn off Disable HTTP Clientless Notification Alerts

X

 

Log > Categories

Set Logging Level: Debug

X

X

Set Alert Level: Warning

X

X

Log > Flow Reporting

Turn on Enable Flow Reporting and Visualization

X

X

Log > Name Resolution

Set Name Resolution Method to: DNS then NetBIOS

X

X

Internal Settings

Turn on Protect against TCP State Manipulation DoS

X

X

Turn on Apply IPS Signatures Bidirectionally

X

 

Enable ability to launch monitor pages in stand-alone browser frames

X

X

Enable Visualization UI for Non-Admin/Config users

X

X

 

Configuring One-Touch Configuration Override

To configure One-Touch Configuration override, perform the following steps:

  1. Navigate to the System > Settings page of the SonicWALL GUI.

  2. Scroll down to the One-Touch Configuration Override section.

  3. Click either the DPI and Stateful Firewall Security button or the Stateful Firewall Security button.

  4. A warning pop-up window reminds you that if you are connected over HTTP, you will have to manually reconnect using HTTPS after the appliance reboots. Click OK.

  5. one-touch_config_warning.png

     

  6. When the configuration has been apply, the Status Bar displays “Restart Firewall for changes to take effect.” Click Restart.

  7. one-touch_config_restart.png

     

  8. After the appliance restarts, navigate to the management URL of the appliance, ensuring that you are using HTTPS, and login to the appliance.

FIPS

When operating in FIPS (Federal Information Processing Standard) Mode, the SonicWALL security appliance supports FIPS 140-2 Compliant security. Among the FIPS-compliant features of the SonicWALL security appliance include PRNG based on SHA-1 and only FIPS-approved algorithms are supported (DES, 3DES, and AES with SHA-1).

Select Enable FIPS Mode to enable the SonicWALL security appliance to comply with FIPS. When you check this setting, a dialog box is displayed with the following message: Warning! Modifying the FIPS mode will disconnect all users and restart the device. Click OK to proceed.

Click OK to reboot the security appliance in FIPS mode. A second warning displays. Click Yes to continue rebooting. To return to normal operation, uncheck the Enable FIPS Mode check box and reboot the SonicWALL security appliance into non-FIPS mode.

Caution        When using the SonicWALL security appliance for FIPS-compliant operation, the tamper-evident sticker that is affixed to the SonicWALL security appliance must remain in place and untouched.