7.Define the length of time before an IKE Security Association automatically renegotiates in the SA Life Time (secs) field. The SA Life Time can range from 120 to 2,500,000 seconds.

Tip A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, users accessing remote resources are disconnected. Therefore, the default SA Life Time of 28,800 seconds (8 hours) is recommended.

8.Select 3DES & SHA1 from the Phase 1 Encryption/Authentication menu.

9.Select Strong Encrypt and Authenticate (ESP 3DES HMAC SHA1) from the Phase 2 Encryption/ Authentication menu. Enter an alphanumeric “secret” in the Shared Secret field. The Shared Secret must match the corresponding field in the remote SonicWALL. This field can range from 4 to 128 characters in length and is case sensitive.

10.Click Add New Network... to define the destination network addresses. Clicking Add New Network... updates the VPN configuration and opens the VPN Destination Network window.

11.Enter the IP address of the remote network in the Network field. This address is a private address if the remote LAN has enabled NAT.

12.Enter the subnet mask of the remote network in the Subnet mask field.

13.Click Update to add the remote network and close the VPN Destination Network window. Once the SonicWALL has been updated, a message confirming the update is displayed at the bottom of the browser window.

14.Click Advanced Settings and select the boxes that apply to your SA:

Enable Keep Alive - if you want to maintain the current connection by listening for traffic on the network segment between the two connections.

Enable Windows Networking (NetBIOS) broadcast - if remote clients use Windows Network Neighborhood to browse remote networks.

Apply NAT and firewall rules - to apply NAT and firewall rules to the SA or just firewall rules if in Standard mode.

Forward packets to remote VPNs - if creating a “hub and spoke” network configuration

Enable Perfect Forward Secrecy - if you want to add another layer of security by adding an additional Diffie-Hellman key exchange.

Phase 2 DH Group - select the level of Phase 2 DH key exchange if Perfect Forward Secrecy is enabled.

Default LAN Gateway - if specifying the IP address of the default LAN route for incoming IPSec packets for this SA. This is used in conjunction with the Route all internet traffic through this SA check box.

VPN Terminated at LAN, DMZ, or LAN/DMZ- select one of the three terminating points for the VPN tunnel.

15.Click OK to close the Advanced Settings window. Click Update to apply the changes to the SonicWALL.

Page 212 SonicWALL Internet Security Appliance Administrator’s Guide

Page 211
Image 211
SonicWALL Internet Security Appliances manual

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.