Network Protocols

The method that used to regulate a workstation’s access to a computer network to prevent data collisions. The SonicWALL uses the TCP/IP protocol.

TCP/IP - Internet Protocol, or "IP", provides connectionless data transfer over a TCP/IP network. Since IP alone does not provide end-to-end data reliability as well as some other services, other protocols such as TCP (Transmission Control Protocol) can be added to provide these services. In TCP/IP, TCP works with IP to ensure the integrity of the data traveling over the network. TCP/ IP is the protocol of the Internet.

FTP - File Transfer Protocol (FTP) is used to transfer documents between different types of com- puters on a TCP/IP network.

HTTP - HyperText Transfer Protocol (HTTP) is a widely used protocol to transfer information over the Internet. Typically, it is used to transfer information from Web servers to Web browsers.

UDP - User Datagram Protocol (UDP) transfers information using virtual ports between two ap- plications on a TCP/IP network. Slightly faster than TCP, it is not as reliable.

DNS - Domain Name System (DNS) is a protocol that matches Internet computer names to their corresponding IP addresses. By using DNS, a user can type in a computer name, such as www.sonicwall.com, instead of an IP address, such as 192.168.168.168, to access a computer.

DHCP - Dynamic Host Configuration Protocol (DHCP) allows communication between network devices and a server that administers IP numbers. A DHCP server leases IP addresses and other TCP/IP information to DHCP client that requests them. Typically, a DHCP client leases an IP address for a period of time from a DHCP server which allows a larger number of clients to use a set pool of IP addresses.

WINS - Windows Internet Naming System (WINS), used on Microsoft® TCP/IP Networks, matches Microsoft® network computer names to IP addresses. Using this protocol allows computers on the Microsoft® network to communicate with other networks and computers that use the TCP/ IP suite.

HTTPS - Secure HyperText Transfer Protocol (HTTPS) is a protocol to transfer information securely over the Internet. HTTPS encrypts and decrypts information exchanged between a Web server and a Web browser using Secure Socket Layer (SSL).

SMTP - Simple Mail Transfer Protocol (SMTP) is used to send and receive e-mail messages. Typically, SMTP is used only to send e-mail while another protocol, POP3, is used to receive e- mail messages.

POP3 - Post Office Protocol 3 (POP3) is used to receive e-mail messages and storing messages on a server, referred to as a POP server.

ICMP - Internet Control Messages Protocol (ICMP) reports errors and controls messages on a TCP/IP network. PING uses ICMP protocol to test if a network device is available.

Page 264 SonicWALL Internet Security Appliance Administrator’s Guide

Page 263
Image 263
SonicWALL Internet Security Appliances manual Network Protocols

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.