Enforced Client Product Guide

Using the Firewall Protection Service

 

Configuring policies for firewall protection

Configure IP addresses for a custom connection

In addition to accepting communications through the selected service ports, client computers accept communications originating from designated IP addresses.

To add one or more IP addresses:

1On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy).

2Click the Desktop Firewall tab.

3Under Connection Type, select Custom settings, then click edit.

4On the Firewall Custom Settings page, select which IP addresses can communicate with client computers:

Any computer

All IP addresses.

My network

All computers with IP addresses on your local network.

Specific address range

Only computers with IP addresses specified here. When you select

 

this option, you must specify an address range and click Add.

 

Address ranges that you enter appear in an Allowed IP Address

 

Range table.

5

When using a computer in multiple locations, you might want to specify more than one range of IP addresses. For example, you might want one IP address range for office use and another for home use. To specify multiple address ranges, repeat step 4, enter another address range, then click Add again.

5Click OK.

6On the Desktop Firewall tab, click Save.

To remove a range of IP addresses:

1Click in the system tray, then select Firewall Settings.

2Click the Desktop Firewall tab.

3Under Connection Type, select Custom settings, then click edit.

4On the Firewall Custom Settings page, under Allowed IP Address Range, click remove for each range you want to delete from the list, then click OK.

5On the Desktop Firewall tab, click Save.

Set up allowed Internet applications

The firewall protection service monitors communications with Internet applications, which connect to the Internet and communicate with client computers. When it detects an Internet application running on a computer, it allows the application to connect to the Internet or blocks the connection. Its response is based on these factors in this order:

1A policy-specific list of allowed Internet applications created by the administrator. The administrator creates this list as part of a policy, then assigns the policy to groups of computers (see Specify Internet applications in a policy).

120

Page 120
Image 120
SonicWALL 4.5 manual Set up allowed Internet applications, Configure IP addresses for a custom connection, Click OK

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.