Phase 1 Encryption/Authentication - select an encryption method from the Encryption/Authen- tication for the VPN tunnel. If you select IKE using Pre-Shared Secret for your SA, you can select from one of eight encryption methods:

DES & MD5

AES-128

& MD5*

DES & SHA1

AES-128

& SHA1*

3DES & MD5

AES-256

& MD5*

3DES & SHA1

AES-256

& SHA1*

*AES support is available only on the PRO 230 and PRO 330.

The encryption methods are listed in order from least secure to most secure. If network speed is preferred, then select DES & MD5. If network security is preferred, select 3DES & SHA1. To compromise between network speed and network security, select DES & SHA1. AES (Advanced Encryption Standard) is an encryption method for securing sensitive but unclassified material by U.S. Government agencies.

Phase 2 Encryption/Authentication - The following encryption methods are available for IKE using Preshared Secret:

-Tunnel Only (ESP Null) - does not provide encryption or authentication. This option offers access to computers at private addresses behind NAT and allows unsupported services through the SonicWALL.

-Encrypt (ESP DES) - uses 56-bit DES to encrypt data. DES is an extremely secure encryption method supporting over 72 quadrillion possible encryption keys to encrypt data.

-Fast Encrypt (ESP ARCFour) - uses 56-bit ARCFour to encrypt data. ARCFour is a secure encryption method and has little impact on the throughput of the SonicWALL.

-Strong Encrypt (ESP 3DES) - uses 168-bit 3DES (Triple DES) to encrypt data. 3DES is considered to be an almost “unbreakable” encryption method, applying three DES keys in succession, but it significantly impacts the data throughput of the SonicWALL.

-Strong Encrypt and Authenticate (ESP 3DES HMAC MD5) - uses 168-bit 3DES encryption and HMAC MD5 authentication. 3DES is an extremely secure encryption method, and HMAC MD5 is used to verify integrity. This method significantly impacts the data throughput of the SonicWALL.

-Strong Encrypt for Checkpoint (ESP 3DES) - interoperable with CheckPoint Firewall-1. In manual key mode, Encrypt for CheckPoint uses 168-bit DES to encrypt data.

-Strong Encrypt and Authenticate (ESP 3DES HMAC SHA1) - uses 168-bit 3DES encryption and HMAC SHA1 authentication. 3DES is an extremely secure encryption method, and HMAC SHA1 is used to verify integrity. This method significantly impacts the data throughput of the SonicWALL.

-Encrypt for Checkpoint (ESP DES HMAC MD5) - uses 56-bit DES encryption and HMAC MD5 authentication. This method is compatible with CheckPoint Firewall-1.

Page 184 SonicWALL Internet Security Appliance Administrator’s Guide

Page 183
Image 183
SonicWALL Internet Security Appliances manual AES support is available only on the PRO 230 and PRO

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.