4.In the Web Management interface for the primary SonicWALL, configure the backup SonicWALL settings as follows:

Serial Number - Enter the serial number of the backup SonicWALL.

LAN IP Address - The unique LAN IP address used to access and manage the backup Son- icWALL whether it is Active or Idle.

Alert This IP address is different from the IP address used to contact the SonicWALL in the General Network settings.

WAN IP Address (Optional) - This is a unique WAN IP address used to remotely manage the primary SonicWALL whether it is Active or Idle.

5.Check the Preempt mode checkbox if you want the primary to SonicWALL to takeover from the backup SonicWALL whenever the primary becomes available (for example, after recovering from a failure and restarting). If this option is not used, the backup SonicWALL remains the active SonicWALL.

Tip The primary and backup SonicWALLs use a “heartbeat” signal to communicate with one another. This heartbeat is sent between the SonicWALLs over the network segment connected to the LAN ports of the two SonicWALLs. The interruption of this heartbeat signal triggers the backup SonicWALL to take over operation from the active unit of the High Availability pair. The time required for the backup SonicWALL to take over from the active unit depends on the Heartbeat Interval and the Failover Trigger Level.

6.Enter the Heartbeat Interval time in seconds. Use a value between 3 seconds and 255 seconds. This interval is the amount of time in seconds that elapses between heartbeats passed between the two SonicWALLs in the High Availability pair.

7.Enter the Failover Trigger Level in terms of the number of missed heartbeats. Use a value between 2 and 99 missed heartbeats. When the backup unit detects this number of consecutive missed heartbeats, the backup SonicWALL takes over operation from the active unit.

Example: Assume that the Heartbeat Interval and the Failover Trigger Level are 5 seconds and 2 missed heartbeats respectively. Based on these values, the backup SonicWALL takes over from the active unit after 10 seconds in the event of a failure in the active unit.

8.Enter the Active SonicWALL Detection Time in seconds using a value between 0 and 300. The default value of 0 is correct in most cases.When any SonicWALL (primary or backup) becomes active after bootup, it looks for an active SonicWALL configured for High Availability on the network. If another SonicWALL is active, the SonicWALL that is booting up transitions to the Idle mode. In some cases, there may be a delay in locating another SonicWALL due to network delays or problems with hubs or switches. You can configure either the primary or backup SonicWALL to allow an increment of time (in seconds) to look for another SonicWALL configured for High Availability on the network. You may enter a value between 0 and 300 seconds, but the default value of 0 seconds is sufficient in most cases.

9.Click Update. Once the SonicWALL has been updated, a message confirming the update is displayed at the bottom of the browser window.

High Availability Page 227

Page 226
Image 226
SonicWALL Internet Security Appliances manual High Availability

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.