Destination Networks

In this section, enter the network settings for the remote VPN site (the “Destination Network”). Include the subnet mask which determines broadcast addresses for NetBIOS support.

Use this SA as the default route for all Internet traffic (Security Associations using IKE with Pre- shared Secret and Manual Key) - Enable this check box if all remote VPN connections access the Internet through this SA. You can only configure one SA to use this setting.

Destination network obtains IP addresses using DHCP through this SA (Security Associations using IKE and Pre-shared Secret but not Group VPN or Manual Key) - Enable this check box if you are managing your IP address allocation from a central location.

Specify destination networks below - Configure the destination networks for your VPN Security Association. Click Destination Networks to enter the IP address and subnet mask.

Adding Destination Networks

To add a second destination network, click Add New Network... and define the Network and Subnet Mask fields of the second network segment. To modify a destination network, click the Notepad icon to the right of the appropriate destination network entry. Then modify the appropriate fields and click Update to update the configuration. To delete a destination network, click the Trash Can icon to the far right of the appropriate destination network entry and then click OK to confirm the removal.

Modifying and Deleting Existing Security Associations

The Security Association menu also allows you to modify and delete existing Security Associations. To delete an SA, select it from the list and click the Delete This SA button. To modify an SA, select it from the list, make the desired changes, and click Update. Once the SonicWALL has been updated, a message confirming the update is displayed at the bottom of the Web browser window. Click Update to enable the changes.

Accessing Remote Resources across a Virtual Private Network

SonicWALL VPN Clients, which cannot transmit NetBIOS broadcasts, can access resources across a VPN by locating a remote computer by IP address. For example, if a remote office has a Microsoft® SQL server, users at the local office can access the SQL server by using the server private IP address.

There are several ways to facilitate connecting to a computer across a SonicWALL VPN:

Use the Find Computer tool

Create a LMHOSTS file in a local computer registry

Configure a WINS Server to resolve a name to a remote IP address.

For more information on accessing remote resources over a VPN, <http://www.sonicwall.com/products/documentation/vpnremotehostswp.html.>

Page 186 SonicWALL Internet Security Appliance Administrator’s Guide

Page 185
Image 185
SonicWALL Internet Security Appliances manual Adding Destination Networks, Use the Find Computer tool

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.