Enforced Client Product Guide

Using the Firewall Protection Service

 

Configuring policies for firewall protection

5

Specify a connection type

The connection type defines the environment where client computers are used and determines which IP addresses and ports the firewall protection service allows to communicate with them. This option defines what the firewall protection service considers to be suspicious activity. The default setting is Untrusted.

For client computers used in multiple environments, it is important to update the connection type whenever the working environment changes. For example, mobile users who connect to both secure (trusted) and unsecure (untrusted) networks must be able to change their setting accordingly.

Select from three connection environments:

Select this...

When the computer...

Then the firewall service...

 

 

 

Untrusted

Is connected directly to the Internet.

Blocks communications with all other

 

 

computers, including those on the same

 

For example: through a dial-up

subnet.

 

connection, a DSL line, or a cable modem;

 

 

through any type of connection in a coffee

 

 

shop, hotel, or airport.

 

 

 

 

Trusted

Is connected indirectly to a network that is

Allows communications with other

 

separated from the Internet by a hardware

computers on the same subnet, but

 

router or firewall.

blocks all other network

 

For example: in a home or office network.

communications.

 

 

 

 

 

Custom

Should communicate only through

Allows communications only with the

 

specific ports or with a specific range of

ports and IP addresses you specify, and

 

IP addresses, or the computer is a server

blocks all other network

 

providing system services.

communications.

 

You also need to configure additional

 

 

options (see Configure a custom

 

 

connection on page 117).

 

 

 

 

This feature does not affect Internet applications running on client computers. To configure

Internet applications, see Set up allowed Internet applications on page 121.

To specify a connection type:

1On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).

2Click the Desktop Firewall tab, select a Connection Type, then click Save.

Configure a custom connection

Configure a custom connection type to designate:

„Ports through which your computer can receive communications. This is required to set up your computer as a server that provides system services. Your computer will accept communications through any open port from any computer.

„IP addresses from which your computer can receive communications. This allows you to limit communications to specific IP addresses.

From the Firewall Custom Settings page, you can define exactly which communications the firewall protection service allows:

„Configure system services for a custom connection

116

Page 116
Image 116
SonicWALL 4.5 Specify a connection type, Configure a custom connection, Select from three connection environments, 116

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.