Manual Dial - Selecting Manual Dial for a Primary Profile means that WAN Failover does not automatically occur. Manual Dial requires you to log into the SonicWALL, click Modem, then Configure. Click Connect and the modem uses the Primary Profile information to dial an ISP.

Alert If you are configuring two dial-up profiles for WAN failover, the modem behavior should be the same for each profile. For example, if your Primary Profile uses Persistent Connection, your Secondary Profile should also use Persistent Connection.

1.Select Persistent Connection if you want the modem connection to stay active until the WAN Ethernet connection is reactivated. If you want the modem to dial the ISP only when there is data to transmit, select Dial on Data. Select Manual Dial to dial up the connection only when you want to dial the ISP as in the case of traveling with the SP.

Alert If you enable Persistent Connection for the modem, the modem connection remains active until the WAN Ethernet connection is reactivated or you force disconnection by clicking Disconnect on the Configure page.

2.Enter the number of minutes a dial-up connection is allowed to be inactive in the Inactivity Timeout (minutes) field. The default value is five (5) minutes.

3.Select the connection speed from the Max Connection Speed (bps) menu.

Auto is the default setting as the TELE3 SP automatically detects the connection speed when it connects to the ISP.

4.Select Maximum Connection Time (minutes) if the connection is terminated after the specified time. Enter the number of minutes for the connection to be active. The value can range from 0 to 1440 minutes. This feature does not conflict with Inactivity Timeout. If both features are configured, the connection is terminated based on the shortest configured time.

5.If you select Maximum Connection Time (minutes), enter the number of minutes to delay before redialing the ISP in the Delay Before Reconnect. The value can range from 0 to 1440, and the default value is 0 which means there is no delay before reconnecting to the ISP.

6.Select Disable VPN when Dialed if VPN Security Associations (SAs) are disabled when the modem connects to the ISP. Terminating the dial-up connection re-enables the VPN SAs. This is useful if you want to deploy your own point-to-point RAS network and want packets to be sent in the clear to your intranets.

7.If you have call waiting on your telephone line, you should disable it or another call can interrupt your connection to your ISP. Select Disable Call Waiting and then select command from the list. If you do not see your command listed, select Other, and enter the command in the field.

8.If the phone number for your ISP is busy, you can configure the number of times that the SonicWALL modem attempts to connect in the Dial Retries per Phone Number field. The default value is zero (0).

9.Enter the number of seconds between attempts to redial in the Delay Between Retries (seconds) field. The default value is five (5) seconds.

10.Click Update to add the dial-up profile to the SonicWALL.

Configuring the TELE3 SP Modem Connection Page 63

Page 62
Image 62
SonicWALL Internet Security Appliances manual Configuring the TELE3 SP Modem Connection

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.