SonicWALL 4500, NSA 5000, 3500 manual Assigning an Interface to the Wireless Zone

Page 53

Note: If you have configured WPA2 as your authentication type, you do not need to enable WiFiSec.

If you have enabled WiFiSec Enforcement, you can specify the following:

Select WiFiSec Exception Service to select services that are allowed to bypass the WiFiSec enforcement.

Select Require WiFiSec for Site-to-Site VPN Tunnel Traversal to require WiFiSec security for all wireless connections through the WLAN zone that are part of a Site-to-Site VPN.

If you wish to run WPA or WPA2 in addition to WiFiSec, you can select Trust WPA/WPA2 traffic as WiFiSec to accept WPA and WPA2 as allowable alternatives to IPsec.

Under SonicPoint Settings, select the SonicPoint Provisioning Profile you want to apply to all SonicPoints connected to this zone. Whenever a SonicPoint connects to this zone, it will automatically be provisioned by the settings in the SonicPoint Provisioning Profile, unless you have individually configured it with different settings.

5.Optionally configure the settings on the Guest Services tab. For information about configuring Guest Services, see the SonicOS Enhanced Administrator’s Guide.

6.When finished, click OK.

Assigning an Interface to the Wireless Zone

Once the wireless zone is configured, you can assign an interface to it. This is the interface where you will connect the SonicPoint.

1.On the Network > Interfaces page, click the Configure icon in the row for the interface that you want to use, for example, X3. The interface must be unassigned.

2.In the Edit Interface dialog box on the General tab, select WLAN or the zone that you created from the Zone drop- down list. Additional fields are displayed.

3.Enter the IP address and subnet mask of the zone in the IP Address and Subnet Mask fields.

4.In the SonicPoint Limit field, select the maximum number of SonicPoints allowed on this interface.

5.If you want to enable remote management of the SonicWALL security appliance from this interface, select the supported management protocol(s): HTTP, HTTPS, SSH, Ping, SNMP, and/or SSH.

6.If you want to allow selected users with limited management rights to log in to the security appliance, select HTTP and/or HTTPS in User Login.

7.Click OK.

Page 52 Deploying SonicPoints for Wireless Access

Image 53
Contents Getting Started Guide SonicWALL NSA Getting Started Guide Document ContentsSonicWALL NSA Series BackThis Section Pre-Configuration TasksCheck Package Contents Administrator Information Obtain Configuration InformationObtain Internet Service Provider ISP Information Registration InformationFront Panel Back Panel Power Supply8 The Back Panel Registering Your Appliance on mysonicwall.com Before You Register Product Registration Registering and Licensing Your Appliance on mysonicwall.comService Bundles Licensing Security Services and SoftwareGateway Services Support ServicesSonicWALL NSA 5000/4500/3500 Getting Started Guide Registration Next Steps Registering a Second Appliance as a BackupDeployment Scenarios Selecting a Deployment Scenario ABCScenario a NAT/Route Mode Gateway Scenario B State Sync Pair in NAT/Route Mode Scenario C L2 Bridge Mode System Requirements Initial SetupConnecting the WAN Port Applying Power Connecting the LAN PortAccessing the Setup Wizard Accessing the Management InterfaceTesting Your Connection Connecting to Your NetworkActivating Licenses in SonicOS Obtaining the Latest Firmware Saving a Backup Copy of Your PreferencesUpgrading Firmware on Your SonicWALL Upgrading the Firmware with Factory Defaults Upgrading the Firmware with Current SettingsUsing SafeMode to Upgrade Firmware On the System Settings page, click Upload New FirmwareConfirmation dialog box, click OK to proceed Uploaded Firmware NewScenario B Configuring a State Sync Pair in NAT/Route ModeInitial High Availability Setup Navigate to the High Availability Advanced Configuring High AvailabilityConfiguring Advanced HA Settings 30 Configuring a State Sync Pair in NAT/Route Mode Synchronizing Settings Synchronizing Firmware Adjusting High Availability SettingsHA License Configuration Overview Click Register Associating Pre-Registered AppliancesConnection Overview Configuring L2 Bridge ModeConfiguring the Primary Bridge Interface IP Assignment drop-down, select Layer 2 Bridged Mode Configuring the Secondary Bridge InterfaceAdditional Deployment Configuration WAN DMZ Creating Network Access RulesSonicWALL NSA 5000/4500/3500 Getting Started Guide Creating a NAT Policy SonicWALL NSA 5000/4500/3500 Getting Started Guide Configuring Address Objects Leave Create a reflexive policy unchecked Configuring NAT PoliciesEnabling Gateway Anti-Virus Enabling Security Services in SonicOSSonicWALL NSA 5000/4500/3500 Getting Started Guide Security Services Intrusion Prevention page, click Accept Enabling Intrusion Prevention ServicesSecurity Services Gateway Anti-Virus page, click Accept Enabling Anti-Spyware Applying Security Services to Network Zones Updating SonicPoint Firmware Deploying SonicPoints for Wireless AccessConfiguring SonicPoint Provisioning Profiles 802.11g Radio tab Select Enable Radio Select Enable SonicPointConfiguring a Wireless Zone Assigning an Interface to the Wireless Zone Connecting the SonicPoint Using Packet Capture Troubleshooting Diagnostic ToolsUsing Ping Using the Active Connections Monitor Using Log View For this Task See this Chapter Deployment Configuration Reference ChecklistSupport and Training Options Customer Support Support ServicesKnowledge Portal SonicWALL Live Product DemosUser Forums Training Related Documentation Product Safety and Regulatory Information Lithium Battery Warning Safety and Regulatory InformationRack Mounting the SonicWALL Cable ConnectionsWeitere Hinweise zur Montage Safety and Regulatory Information in GermanHinweis zur Lithiumbatterie KabelverbindungenCanadian Radio Frequency Emissions Statement FCC Part 15 Class a NoticeCispr 22 EN 55022 Class a Regulatory Information for KoreaTrademarks Copyright Notice70 Notes SonicWALL NSA 5000/4500/3500 Getting Started Guide 72 Notes Rev a 01/08