Intro_Copyright_and_Warranty_Notice
© 2014 SonicWALL, Inc.
All rights reserved.
Under the copyright laws, this manual or the software described within, can not be copied, in whole or part, without the written consent of the manufacturer, except in the normal use of the software to make a backup copy. The same proprietary and copyright notices must be affixed to any permitted copies as were affixed to the original. This exception does not allow copies to be made for others, whether or not sold, but all of the material purchased (with all backup copies) can be sold, given, or loaned to another person. Under the law, copying includes translating into another language or format.
Specifications and descriptions subject to change without notice.
All Dell SonicWALL network security appliances come with a 1-year Limited Hardware Warranty which provides delivery of critical replacement parts for defective parts under warranty. In addition, for 90 days from the warranty start date, Dell Dell SonicWALL network security appliances are entitled to a Limited Software Warranty which provides bug fixes, updates and any maintenance releases that occur during the coverage term. Visit the Warranty Information page at
http://www.sonicwall.com/us/support/Services.html#tab=warranty
for details on your product’s warranty.
SM10200, SM10400, and SM10800.
Multi-Core Monitor—Displays dynamically updated statistics on utilization of the individual cores of the SonicWALL SuperMassive.
• Provides administrators an inclusive, multi-functional display with information about applications, bandwidth usage, packet rate, packet size, connection rate, connection count, and multi-core monitoring.
• Provides administrators with real-time, incoming and outgoing network data. Various views and customizable options in the AppFlow Monitor Interface assist in visualizing the traffic data by applications, users, URLs, initiators, responders, threats, VoIP, VPN, devices, or by contents.
Provides administrators with configurable scheduled reports by applications, viruses, intrusions, spyware, and URL rating. AppFlow Reports statistics enable network administrators to view a top-level aggregate report of what is going on in your network.
Provides reports of the latest threat protection data from a single Dell SonicWALL network security appliance and aggregated threat protection data from SonicWALL SuperMassives deployed globally.
User Monitor—Displays details on all user connections to the SonicWALL SuperMassive.
• BWM Monitor—Displays per-interface bandwidth management for ingress and egress network traffic. The BWM monitor graphs are available for real-time, highest, high, medium high, medium, medium low, low and lowest policy settings.
• Displays details on all active connections to the SonicWALL SuperMassive.
• Allows you to monitor individual data packets that traverse your SonicWALL firewall appliance. Packets can be either monitored or mirrored. The monitored packets contain both data and addressing information.
Provides event log tracking for potential security threats. This log can be viewed in the Log > View page, or it can be automatically sent to an email address for convenience and archiving. The log is displayed in a table and can be sorted by column. The SonicWALL SuperMassive can alert you of important events, such as an attack to the SonicWALL SuperMassive. Alerts are immediately Emailed, either to an Email address or to an Email pager. Each log entry contains the date and time of the event and a brief message describing the event.
—interface objects that are directly linked to physical interfaces. The SonicOS scheme of interface addressing works in conjunction with network zones and address objects.
Portshield Groups—Configure some or all of the LAN ports into separate security contexts, providing protection not only from the WAN and DMZ, but between devices inside your network as well.
• —
—
—
—Address Objects are one of four object classes (Address, User, Service, and Schedule) in SonicOS. These Address Objects allow for entities to be defined one time, and to be re-used in multiple referential instances throughout the SonicOS interface.
• Services—onfigure service objects to be used network access rules for allowing or denying traffic to the network. The SonicWALL SuperMassive includes Default Services. Default Services are predefined services that are not editable. And you can also create Custom Services to configure firewall services to meet your specific business requirements.
• —
—
—
MAC-IP Anti-spoof—Configure MAC-IP Anti-Spoof protection in SonicWALL SonicOS.
• —
—
Note IP Helper enhancements are available in SonicOS 6.0.5.
• —
—
Network Monitor—Monitor network path viability. The results and status of this monitoring are displayed dynamically on the Network Monitor page, and are also provided to affected client components and logged in the system log. Each custom Network Monitor policy defines a destination Address Object to be probed. This Address Object may be a Host, Group, Range, or FQDN. When the destination Address Object is a Group, Range or FQDN with multiple resolved addresses, Network Monitor probes each probe target and derives the Network Monitor Policy state based on the results.
SonicWALL switching functionality includes the following features:
• VLAN Trunking—Provides the ability to trunk different VLANs between multiple switches.
• Layer 2 Network Discovery—Uses IEEE 802.1AB (LLDP) and Microsoft LLTD protocols and switch forwarding table to discover devices visible from a port.
• Link Aggregation—Provides the ability to aggregate ports for increased performance and redundancy.
• Port Mirroring—Allows the administrator to assign a mirror port to mirror ingress, egress or bidirectional packets coming from a group of ports.
a quick, efficient, and effective way to add anti-spam, anti-phishing, and anti-virus capabilities to your existing SonicWALL SuperMassive. There are two primary ways inbound messages are analyzed by the Anti-Spam feature - Advanced IP Reputation Management and Cloud-based Advanced Content Management. IP Address Reputation uses the GRID Network to identify the IP addresses of known spammers, and reject any mail from those senders without even allowing a connection. GRID Network Sender IP Reputation Management checks the IP address of incoming connecting requests against a series of lists and statistics to ensure that the connection has a probability of delivering valuable email. The lists are compiled using the collaborative intelligence of the SonicWALL GRID Network. Known spammers are prevented from connecting to the SonicWALL SuperMassive, and their junk email payloads never consume system resources on the targeted systems.
Appendix A: CLI Guide—
Appendix B: BGP Advanced Routing—Provides an overview of SonicWALL’s implementation of Border Gateway protocol (BGP), how BGP operates, and how to configure BGP for your network.
Appendix C: Using SonicWALL Configuration Wizards—Provides easy to use configuration wizards to assist network administrators with initial policy creation.
|
For timely resolution of technical support issues, visit Dell SonicWALL on the Internet at:
• http://www.sonicwall.com/us/Support.html
Web-based resources are available to help you resolve most technical issues. If you cannot find a solution to your technical issue online, you can contact Dell SonicWALL technical support by telephone. Refer to the telephone numbers listed on the following web pages:
• http://www.sonicwall.com/us/support/contact.html
• http://www.sonicwall.com/us/company/286.html
More Information on Dell SonicWALL Products
Contact Dell SonicWALL Sales and Support for information about Dell SonicWALL products and services at:
: Telephone and Web:: http://www.sonicwall.com/us/company/286.html
: Email:: sales@sonicwall.com