SonicWALL none manual Playing Back the Silent Installation, Using Setup.log to Check for Errors

Page 49

Playing Back the Silent Installation

After you have created the installation and the response file, you are ready to run the Global VPN Client installation in silent mode. When running an installation in silent mode, be aware that no messages are displayed. Instead, a log file Setup.log captures installation information, including whether the installation was successful. You can review the log file and determine the result of the installation.

To launch the silent setup, run setup with the -scommand line parameter:

Setup.exe –s

By default, setup looks for the response file in its default location (normally Disk1 or the same folder as Setup.ins). You can specify a different response file using the -f1command line parameter:

Setup.exe –s –f1<path\ResponseFile>

To verify if a silent installation succeeded, look at the ResultCode value in the [ResponseResult] section of Setup.log. InstallShield writes an appropriate return value after the ResultCode keyname.

Using Setup.log to Check for Errors

Setup.log is the default name for the silent installation log file, and its default location is Disk1 (in the same folder as Setup.ins). You can specify a different name and location for the setup log file using the -f2 command line parameter:

Setup.exe –s –f2<path\LogFile>

The Setup.log file contains three sections:

The first section, [InstallShield Silent], identifies the version of InstallShield Silent used in the silent installation. It also identifies the file as a log file.

The second section, [Application], identifies the installed application's name and version, and the company name.

The third section, [ResponseResult], contains the result code indicating whether or not the silent installation succeeded. An integer value is assigned to the ResultCode keyname in the [ResponseResult] section. The silent setup places one of the following return values after the ResultCode keyname:

0

Success

 

 

-1

General error

 

 

-2

Invalid mode

 

 

-3

Required data not found in the

 

Setup.iss file

 

 

-4

Not enough memory available

 

 

-5

File does not exist

 

 

-6

Cannot write to the response file

 

 

-7

Unable to write to the log file

 

 

-8

Invalid path to the InstallShield

 

Silent response file

 

 

-9

Not a valid list type (string or

 

number)

 

 

-10

Data type is invalid.

 

 

Page 48 SonicWALL Global VPN Client 4.0 Administrator’s Guide

Image 49
Contents Global VPN Client Administrators Guide Table of Contents Managing VPN Connection Policies Configuring SonicWALL Security Appliances forAppendix B SonicWALL Global VPN Client Installation Using Appendix a Creating and Deploying the Default.rcf File forInstallShield Silent Response File Command Line InterfaceAppendix E- Log Viewer Messages Appendix D Installing the Global VPN Client with aSonicWALL Global VPN Client SonicWALL Global VPN Client FeaturesNew Features in SonicWALL Global VPN Client About this Guide Using the Right Administrator’s GuidesGlobal VPN Client Enterprise/Global Security Client SonicWALL Global Security Client and Global VPN ClientIcons Used in this Guide Conventions Used in this GuideCopyright Notice SonicWALL Pocket Global VPN ClientLimited Warranty Installing the SonicWALL Global VPN ClientUsing the Setup Wizard Installing the SonicWALL Global VPN Client Understanding VPN Connection Policies Adding VPN Connection PoliciesUnderstanding Digital Certificates Using the New Connection WizardCreating a VPN Connection Policy Select Remote Access or Office Gateway and then click Next Importing a VPN Configuration File Configuring a Dial-Up VPN Connection Making VPN Connections Launching the SonicWALL Global VPN ClientConnecting changes to Provisioning Accessing Redundant VPN Gateways Enabling a VPN ConnectionEstablishing Multiple Connections Entering a Pre-Shared Key Username and Password AuthenticationSelecting a Certificate Checking the Status of a VPN Connection Disabling a VPN ConnectionConnection Warning Creating a VPN Policy Shortcut Managing the Global VPN Client System Tray Icon Specifying Global VPN Client Launch OptionsOpen SonicWALL Global VPN Client Opens the program window General Managing VPN Connection Policy PropertiesUser Authentication Peer Information Dialog Box PeersManaging VPN Connection Policy Properties Status Virtual IP ConfigurationConnection ActivityArranging Connection Policies Managing VPN Connection PoliciesRenaming a Connection Policy Deleting a Connection PolicyManaging Certificates Troubleshooting the SonicWALL Global VPN ClientUnderstanding the Global VPN Client Log Type The type of message Information, Error, or WarningConfiguring Auto-Logging Configuring the LogGenerating a Help Report Uninstalling the SonicWALL Global VPN Client Windows 98 SE Accessing Technical SupportViewing Help Topics Double-clickAdd/Remove ProgramsGroup VPN Connections Supported by Each SonicWALL Model SonicWALL Global VPN Client LicensesActivating Your SonicWALL Global VPN Clients Select Global VPN Client from the Applicable Services menuDownloading Global VPN Client Software and Documentation Global VPN Client License Support by SonicWALL ModelSoftware License Agreement for Sonicwall Globalvpn Client Exports License Miscellaneous Deploying the default.rcf File How the Global VPN Client uses the default.rcf FileSonicWALL Global VPN Client Support Replace the Existing SonicWALL Global VPN Client.rcf File Default.rcf File Tag Descriptions Creating the default.rcf FileSWClientPolicy version =9.0 FlagsPage SWClientPolicy Sample default.rcf FileSWClientPolicy version=9.0 Connections Flags PeerPeer Connection Peer Connection Connections /SWClientPolicy Creating the Silent Installation Troubleshooting the deafult.rcf FileUsing Setup.log to Check for Errors Playing Back the Silent InstallationSetup.exe -s Setup.exe -s -f1path\ResponseFileCommand Line Examples Command Line OptionsLog Viewer Messages Appendix E- Log Viewer MessagesDiffie-Hellman group generator length has not been set Failed to build dead peer detection packet Failed to construct quick mode hash payload Failed to find Oakley group specified in the SA payload Failed to set the Ipsec ESP attributes into the phase 2 SA Is not a valid XAuth status Info Peer certificate missing key value Received invalid message ID notify Sending phase 2 delete for SA lifetime for phase 2 is seconds Received an unencrypted packet when crypto active SonicWALL Global VPN Client 4.0 Administrator’s Guide SonicWALL, Inc Rev C, 10/07

none specifications

SonicWALL is a leading cybersecurity company that specializes in providing advanced network security solutions, primarily focused on firewalls and unified threat management. Established in 1991, SonicWALL has become synonymous with high-performance security and is particularly well-regarded for its adaptable solutions that cater to businesses of all sizes.

One of the main features of SonicWALL products is their next-generation firewall technology. These firewalls combine traditional firewall capabilities with modern security features such as intrusion prevention, malware protection, and content filtering. This enables businesses to comply with regulatory requirements while safeguarding their networks against ever-evolving cyber threats. SonicWALL's firewalls are equipped with advanced security protocols that offer deep packet inspection, allowing them to analyze the data flowing through the network meticulously.

SonicWALL's Cloud App Security is another significant component of its technology suite. This service secures cloud applications by providing essential tools that help protect against data breaches and insecure usage. Through broad compatibility with various cloud services, businesses can maintain security without sacrificing the efficiency and productivity benefits that cloud applications provide.

In terms of characteristics, SonicWALL emphasizes simplicity and ease of management. Their products are designed with intuitive user interfaces that simplify configuration and ongoing management. This allows even non-technical users to manage complex security protocols effectively. The SonicWALL Global Management System (GMS) enables centralized management for multiple appliances, ensuring that administrators can monitor their entire network security posture from a single dashboard.

SonicWALL also incorporates advanced threat detection technologies, including its Capture Advanced Threat Protection (ATP) service. Capture ATP leverages deep learning and sandboxing techniques to identify and isolate potential threats before they can affect the network. This proactive approach to security enables businesses to respond to new threats in real-time, enhancing overall protection.

Furthermore, SonicWALL offers scalable solutions, making it a suitable choice for both small businesses and large enterprises. Organizations can select from a range of appliances and services that can be easily scaled as their needs evolve. With a strong focus on customer support and continual innovation, SonicWALL remains a trusted partner in the sphere of network security. Overall, SonicWALL's blend of advanced features, user-friendly management, and robust technologies makes it a formidable player in the cybersecurity landscape.