Users

Use RADIUS - Select Use Radius if you have configured RADIUS to authenticate users accessing the network through the SonicWALL. If you have more than 100 users requiring authentication, you must use a RADIUS server. If you select Use RADIUS, users must log into the SonicWALL using HTTPS in order to encrypt the password sent to the SonicWALL. If a user attempts to log into the SonicWALL using HTTP, the browser is automatically redirected to HTTPS.

Allow only users listed below - Enable this setting if you have a subset of RADIUS users accessing the SonicWALL. The user names must be added to the internal SonicWALL user database before they can be authenticated using RADIUS.

Authenticate users listed below - Selecting this option allows you to configure users in the local database. To add new users, fill out the User Name, Password, and Confirm Password fields, then select from the list of privileges allowed for the user:

-Remote Access - Enable this check box if the user accesses LAN resources through the firewall from a remote location on the Internet.

Alert By enabling Remote Access, you allow unencrypted traffic over the Internet.

-Bypass Filters - Enable Bypass Filters if the user has unlimited access to the Internet from the LAN, bypassing Web, News, Java, and ActiveX blocking.

-Access to VPNs - Enable the check box if the user can send information over the VPN Security Associations with authentication enforcement.

-Access from the VPN Client with XAUTH - Enable the check box if the user requires XAUTH for authentication and accesses the firewall via a VPN client.

-Limited Management Capabilities - By enabling this check box, the user has limited local management access to the SonicWALL Management interface. The access is limited to the following pages:

General - Status, Network, Time

Log - View Log, Log Settings, Log Reports

Tools - Restart, Diagnostics minus Tech Support Report

Tip The SonicWALL supports up to 100 users requiring RADIUS authentication in the local database.

Adding and Removing a User

Alert You must add a user to the Local Database to enforce access privileges.

To add a new user, complete the following steps.

1.Log into the Management interface, click Access, then Users.

2.Highlight -Add New User- in the Current User list box.

3.Enter the name of a user into the User Name field.

4.Enter the user password in the Password and Confirm Password field. The password is case-sensitive.

5.Choose the privileges to be enabled for the user by selecting the appropriate check boxes.

6.Click Update to add the user to the SonicWALL database.

7.To remove a user, highlight the User Name, and click Remove User.

Page 140 SonicWALL Internet Security Appliance Administrator’s Guide

Page 139
Image 139
SonicWALL Internet Security Appliances Adding and Removing a User, Highlight -Add New User- in the Current User list box

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.