Configuring the SonicWALL DHCP Server

To configure the SonicWALL DHCP server for the WorkPort, the HomePort, or both, complete the following instructions.

1.Select the Enable DHCP Server.

Alert Make sure there are no other DHCP servers on the WorkPort or HomePort before you enable the DHCP server.

2.Enter the maximum length of the DHCP lease in the Lease Time field. The Lease Time determines how often the DHCP Server renews IP leases. The default Lease Time is 60 minutes. The length of time can range from 1 to 9999 minutes.

3.If configuring DHCP server for the WorkPort, enter the gateway address used by WorkPort computers to access the Internet in the WorkPort Default Gateway field. Enter the SonicWALL WorkPort IP Address if NAT is enabled.

4.If configuring DHCP server for the HomePort, enter the gateway address used by HomePort computers to access the Internet in the HomePort Default Gateway field. Enter the SonicWALL HomePort IP Address if NAT is enabled.

5.Enter the domain name registered for your network in the Domain Name field. An example of a domain name is "your-domain.com". If you do not have a domain name, leave this field blank.

6.Select Set DNS Servers using the SonicWALL Network settings to use the DNS servers that you specified in the SonicWALL Network section.

If you want to use different DNS servers than the ones specified in the SonicWALL Network section, then select Specify Manually. Enter your DNS Server addresses in the DNS Server 1, DNS Server 2, and DNS Server 3 fields. The DNS servers are used by computers on your WorkPort to resolve domain names to IP addresses. You only enter one DNS Server address, but multiple DNS entries improve performance and reliability.

7.Enter your WINS Server address(es) in the WINS Server 1 and WINS Server 2 fields. WINS Servers resolve Windows-based computer names to IP addresses. If you do not have a WINS server, leave these fields blank.

8.Dynamic Ranges are the ranges of IP addresses dynamically assigned by the DHCP server. The Dynamic Ranges should be in the same subnet as the SonicWALL WorkPort IP Address.

9.Enter the beginning IP address of your WorkPort IP address range in the Range Start field. Enter the ending IP address in the Range End field. Select the Allow BootP clients to use range check box if you want BootP clients to receive IP leases. Then click Update. When the SonicWALL has been updated, a message confirming the update is displayed at the bottom of the browser window. Continue this process until you have added all the desired dynamic ranges.

10.Enter the beginning IP address of your HomePort IP address range in the Range Start field. Enter the ending IP address in the Range End field. Select the Allow BootP clients to use range check box if you want BootP clients to receive IP leases. Then click Update. When the SonicWALL has been updated, a message confirming the update is displayed at the bottom of the browser window.Continue this process until you have added all the desired dynamic ranges.

Page 174 SonicWALL Internet Security Appliance Administrator’s Guide

Page 173
Image 173
SonicWALL Internet Security Appliances manual Configuring the SonicWALL Dhcp Server

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.