-Encrypt and Authenticate (ESP DES HMAC MD5) - uses 56-bit DES encryption and HMAC MD5 authentication. This method impacts the data throughput of VPN communications. SonicWALL VPN client supports this method.

-Authenticate (AH MD5) - uses AH to authenticate and MD5 to generate a 128-bit message digest.

-Authenticate (AH SHA1) - uses AH to authenticate and SHA1 to generate a 160-bit message digest.

-Authenticate (ESP MD5) - authenticates using ESP as the security protocol and MD5 to generate a 128-bit message digest.

-Authenticate (ESP SHA1) - authenticates using ESP as the security protocol and SHA1 to generate a 160-bit message digest.

-Encrypt and Authenticate (ESP DES HMAC SHA1) - uses 56-bit DES encryption and HMAC SHA1 authentication.

-Strong Encrypt (ESP AES-128)- uses ESP to authenticate and 128-bit AES to encrypt.

-Strong Encrypt and Authenticate (ESP AES-128 HMAC MD5) - uses 128-bit AES encryption and HMAC MD5 authentication.

-Strong Encrypt and Authenticate (ESP AES-128 HMAC SHA1) - uses 128-bit AES encryption and HMAC SHA1 authentication.

*AES support is available only on the PRO 230 and PRO 330.

If IKE using Pre-shared Secret is selected for the IPSec Keying Mode, the Shared Secret field is displayed and you can enter your shared secret.

Security Policy Settings using Manual Key

Manual Key is configured differently than IKE using Pre-shared Secret or Group VPN. It requires an Incoming and Outgoing Security Parameter Index (SPI) as well as an Encryption Key and Authentication Key.

Incoming SPI - Enter the Security Parameter Index (SPI) that the remote location transmits to identify the Security Association used for the VPN Tunnel. The SPI may be up to eight characters long and is comprised of hexadecimal characters. Valid hexadecimal characters are "0" to "9", and "a" to "f" inclusive (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c, d, e, f).

Outgoing SPI - Enter the Security Parameter Index (SPI) that the local SonicWALL transmits to identify the Security Association used for the VPN Tunnel. The SPI may be up to eight characters long and is comprised of hexadecimal characters.

Tip A Security Association's SPI must be unique when compared to SPIs used in other Security Associations. However, a Security Association's Incoming SPI may be the same as the Outgoing SPI.

SonicWALL VPN Page 185

Page 184
Image 184
SonicWALL Internet Security Appliances manual Security Policy Settings using Manual Key

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.