SonicWALL Internet Security Appliances manual ISP Settings, Location Settings

Models: Internet Security Appliances

1 293
Download 293 pages 54.59 Kb
Page 61
Image 61

ISP Settings

To configure your ISP settings, you must obtain your Internet information from your dial-up Internet Service Provider. Use the information to configure the following dial-up ISP Settings:

1. Enter the primary number used to dial your ISP in the Primary Phone Number field.

Tip If a specific prefix is used to access an outside line, such as 9, &, or , , enter the number as part of the primary phone number.

2.Enter the secondary number used to dial your ISP in the Secondary Phone Number field (optional).

3.Enter your dial-up ISP user name in the User field.

4.Enter the password provided by your dial-up ISP in the Password field.

5.Confirm your dial-up ISP password in the Confirm field.

6.In the IP address section, select Obtain Automatically if you do not have a permanent dial-up IP address from your ISP. If you have a permanent dial-up IP address from your ISP, select Specify and enter the IP address in the IP Address field.

Alert Do not enter your broadband/high speed ISP information here. Enter only your dial-up Internet access information.

7.If you obtain an IP address automatically for your DNS server(s), select Obtain Automatically. If your ISP has a specific IP address for the DNS server(s), select Specify and enter the IP address in the field. Alternatively, you can use your internal DNS server IP address or a specific DNS server IP address on the Internet.

8.If your ISP has given you a script that runs when you access your ISP connection, cut and paste the script text in the Chat Script field. See the Information on Chat Scripts section at the end of this chapter for more information on using chat scripts.

Location Settings

Use this section to configure modem behavior on the TELE3 SP for WAN failover. The TELE3 SP has an autodetect feature that detects when the WAN Ethernet cable is physically disconnected from the TELE3 SP and automatically dials the ISP whether or not Enable WAN Failover is selected. You can override this feature by selecting Manual Dial for the modem behavior. There are three types of dial-up behavior:

Persistent Connection - By selecting Persistent Connection, the modem dials automatically when a WAN connection fails. If the Primary Profile cannot connect, the modem uses the Secondary Profile to dial an ISP.

Dial on Data - Using Dial on Data requires that outbound data is detected before the modem dials the ISP. Outbound data does not need to originate from computers on the LAN, but can also be packets generated by the SonicWALLTELE3 SP internal applications such as AutoUpdate and Anti-Virus. Also, if Enable WAN Failover is selected, the pings generated by the Probe can trigger the modem to dial when no WAN Ethernet connection is detected. If the Primary Profile cannot connect, the modem uses the Secondary Profile to dial an ISP.

Page 62 SonicWALL Internet Security Appliance Administrator’s Guide

Page 61
Image 61
SonicWALL Internet Security Appliances manual ISP Settings, Location Settings

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.