Manuals / Brands / Household Appliance / Humidifier / SonicWALL / Household Appliance / Humidifier

SonicWALL TZ 190 manual - page 2

1 843
Download 843 pages, 14.8 Mb
Contents
Main Page Table of Contents Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page PART 1 Introduction Page CHAPTER 1 Preface Copyright Notice Trademarks Limited Warranty About this Guide Organization of this Guide Part 1 Introduction Part 2 System Part 3 Network Page Part 12 Log Part 13 Wizards Guide Conventions Icons Used in this Manual SonicWALL Technical Support North America Telephone Support International Telephone Support More Information on SonicWALL Products Page Page CHAPTER 2 Common Criteria Overview of Common Criteria Operation Use of GUI Interface for Local Management Related Documents SonicOS Log Events Reference Guide Page CHAPTER 3 Introduction Whats New in SonicOS Enhanced 4.0 Page Page Page Page SonicWALL Management Interface Page Page Getting Help Logging Out Page PART 2 System Page CHAPTER 4 Dashboard System > Security Dashboard SonicWALL Security Dashboard Overview What is the Security Dashboard? Page How Does the Security Dashboard Work? Platforms Using the SonicWALL Security Dashboard Administrator Prerequisites http://www.sonicwall.com/us/Support.html. Administrator Configuration Tasks SonicWALL Security Dashboard Configuration Overview Purchasing Security Services Page Page Page Page Page http://www.sonicwall.com/us/Support.html. Related Features Page CHAPTER 5 System > Status Wizards System Messages System Information Latest Alerts Security Services Before You Register Creating a mySonicWALL.com Account Page Registering Your SonicWALL Security Appliance Network Interfaces CHAPTER 6 System > Licenses Node License Status Excluding a Node Security Services Summary Manage Security Services Online Manual Upgrade Manual Upgrade for Closed Environments From a Computer Connected to the Internet From the Management Interface of your SonicWALL Security Appliance Page CHAPTER 7 System > Administration Firewall Name Administrator Name & Password Changing the Administrator Password Login Security Settings Page Multiple Administrators Activating Configuration Mode Web Management Settings Changing the Default Size for SonicWALL Management Interface Tables SSH Management Settings Advanced Management Enabling SNMP Management Configuring Log/Log Settings for SNMP Configuring SNMP as a Service and Adding Rules Enable GMS Management Page Download URL Selecting UI Language Page CHAPTER 8 System > Certificates Digital Certificates Overview Certificates and Certificate Requests Certificate Details Importing Certificates Importing a Certificate Authority Certificate Importing a Local Certificate Deleting a Certificate Certificate Revocation List (CRL) Importing a CRL Generating a Certificate Signing Request Page Page CHAPTER 9 System > Time System Time NTP Settings Page Page Adding a Schedule Deleting Schedules Page Page Settings Import Settings Export Settings Firmware Management Automatic Notification of New Firmware Firmware Management Table Updating Firmware Manually Creating a Backup Firmware Image SafeMode - Rebooting the SonicWALL Security Appliance System Information Firmware Management FIPS CHAPTER 12 System > Packet Capture Packet Capture Overview What is Packet Capture? How Does Packet Capture Work? Using Packet Capture Accessing Packet Capture in the UI Starting and stopping packet capture Starting packet capture Stopping packet capture Viewing the captured packets About the Captured Packets Window Page About the Packet Detail Window About the Hex Dump Window Configuring Packet Capture Configuring General Settings Configuring Capture Filter Settings Page Page Configuring Display Filter Settings Page Configuring Logging Settings Page Configuring Advanced Settings Restarting FTP logging Verifying Packet Capture Activity Understanding Status Indicators Page Resetting the Status Information Related Information Supported Packet Types File Formats for Export As Page Page Page Tech Support Report Generating a Tech Support Report Diagnostic Tools Active Connections Monitor Active Connections Monitor Settings CPU Monitor DNS Name Lookup Find Network Path Packet Capture Ping Page Trace Route Web Server Monitor System > Restart PART 3 Network Page Page Setup Wizard Interface Settings Interface Traffic Statistics Interfaces Physical Interfaces Permanently Assigned Interfaces User-definable Interfaces SonicOS Enhanced Secure Objects Transparent Mode Configuring Interfaces Configuring the LAN and OPT Interfaces (Static) Configuring Advanced Settings for the Interface Configuring Interfaces in Transparent Mode Configuring Advanced Settings for the Interface Configuring Wireless Interfaces Configuring Advanced Settings for the Interface Configuring a WAN Interface Configuring the Advanced Settings for the WAN Interface Ethernet Settings Bandwidth Management NAT Policy Settings Configuring SonicWALL PortShield Interfaces Page Configuring the Wireless WAN Interface Managing WWAN Connections Specifying the WAN Connection Model Configuring Basic Wireless WAN Settings Page Configuring Remotely Triggered Dial-Out on the WWAN Configuring the Maximum Allowed WWAN Connections Creating a WLAN Subnet Page CHAPTER 15 SonicWALL PortShield Interfaces Security Services with PortShield Network > SwitchPorts Overview Working in Static Mode Working in Transparent Mode Using Different Approaches to Configuration Creating a PortShield Interface from the Interfaces Area Page Page Page Creating a New Zone for the PortShield Interface Refining the PortShield Interface Page Creating Transparent Mode PortShield Interfaces Creating a Transparent Mode PortShield Interface with a Host Address Object Creating a PortShield Using an Address Object Containing an Address Range Creating a Transparent Mode PortShield Interface with a Group Address Object Mapping Ports from the Switch Ports Window Page PortShield Deployment Scenario Deployment Details Zones PortShield Interfaces Configuring the Hospitality Example Deployment Configure the SonicPoint Profile Configure the Zones Page Configuring Zones Configure the PortShield Interfaces with the PortShield Wizard Page CHAPTER 16 Balancing Network > WAN Failover & Load Balancing WAN Failover Caveats About Source and Destination IP Address Binding Setting Up WAN Failover and Load Balancing Configuring an Interface as a Secondary WAN Port Creating a NAT Policy for the Secondary WAN Port Activating WAN Failover and Selecting the Load Balancing Method Page Configuring WAN Interface Monitoring WAN Probe Monitoring Configuring WAN Probe Monitoring Page WAN Load Balancing Statistics Page CHAPTER 17 Network > Zones How Zones Work Predefined Zones Security Types Allow Interface Trust Enabling SonicWALL Security Services on Zones The Zone Settings Table Adding a New Zone Deleting a Zone Configuring the WLAN Zone Page Page Page Page Page CHAPTER 19 Network > Address Objects Types of Address Objects Address Object Groups Creating and Managing Address Objects Navigating and Sorting the Address Objects and Address Groups Entries Default Address Objects and Groups SonicWALL PRO 5060 Default Address Objects Default Address Groups SonicWALL PRO 4060 Default Address Objects Default Address Groups Adding an Address Object Editing or Deleting an Address Object Creating Group Address Objects Editing or Deleting Address Groups Public Server Wizard Working with Dynamic Addresses Key Features of Dynamic Address Objects Page Enforcing the use of sanctioned servers on the network Using MAC and FQDN Dynamic Address Objects Blocking All Protocol Access to a Domain using FQDN DAOs Using an Internal DNS Server for FQDN-based Access Rules Controlling a Dynamic Hosts Network Access by MAC Address Page Bandwidth Managing Access to an Entire Domain Page Page Page Page Route Advertisement Route Advertisement Configuration Route Policies Policy Based Routing Route Policies Table A Route Policy Example Advanced Routing Services (OSPF and RIP) Page Page OSPF Terms Page Page Page Configuring Advanced Routing Services Configuring RIP RIP Modes Receive (Available in Send and Receive and Receive Only modes) Send (Available in Send and Receive and Send Only modes) Configuring OSPF OSPFv2 Setting Page Page Page CHAPTER 21 Network > NAT Policies Page Navigating and Sorting NAT Policy Entries NAT Policy Settings Explained NAT Policies Q&A Why is it necessary to specify Any as the destination interface for inbound 1-2-1 NAT policies? Can I manually order the NAT Polices? Can I have multiple NAT policies for the same objects? What are the NAT System Polices? NAT Load Balancing Overview NAT LB Mechanisms Which NAT LB Method Should I Use? Caveats Details of Load Balancing Algorithms Sticky IP Algorithm Creating NAT Policies Creating a Many-to-One NAT Policy Creating a Many-to-Many NAT Policy Creating a One-to-One NAT Policy for Outbound Traffic Creating a One-to-One NAT Policy for Inbound Traffic (Reflective) Configuring One-to-Many NAT Load Balancing Page Inbound Port Address Translation via One-to-One NAT Policy Inbound Port Address Translation via WAN IP Address Page Page Using NAT Load Balancing NAT Load Balancing Topology Prerequisites Configuring NAT Load Balancing Page Page Page Troubleshooting NAT Load Balancing Page Page Static ARP Entries Secondary Subnets with Static ARP Adding a Secondary Subnet using the Static ARP Method Page Navigating and Sorting the ARP Cache Table Navigating and Sorting the ARP Cache Table Entries Flushing the ARP Cache CHAPTER 23 Network > DHCP Server DHCP Server Options Overview What Is the SonicWALL DHCP Server Options Feature? How Does the SonicWALL DHCP Server Options Feature Work? Supported Standards DHCP Server Persistence Overview What is DHCP Server Persistence? How Does DHCP Server Persistence Work? Enabling the DHCP Server DHCP Server Lease Scopes Configuring DHCP Server for Dynamic Ranges General Settings DNS/WINS Settings VoIP Settings Configuring Static DHCP Entries General Settings DNS/WINS Settings VoIP Settings Configuring SonicWALL DHCP Server Options Configuring DHCP Option Objects Page Page Page Configuring DHCP Option Groups Page Configuring DHCP Generic Options for DHCP Lease Scopes Page Current DHCP Leases DHCP Option Numbers Page Page Page Page Page Page Page Page CHAPTER 24 Network > IP Helper IP Helper Settings IP Helper Policies Adding an IP Helper Policy Editing an IP Helper Policy Deleting IP Helper Policies CHAPTER 25 Network > Web Proxy Configuring Automatic Proxy Forwarding (Web Only) Bypass Proxy Servers Upon Proxy Failure CHAPTER 26 Network > Dynamic DNS Supported DDNS Providers Additional Services offered by Dynamic DNS Providers Configuring Dynamic DNS Page Page Dynamic DNS Settings Table Page PART 4 Wireless Page CHAPTER 27 Station Status Wireless Overview Considerations for Using Wireless Connections Recommendations for Optimal Wireless Performance Adjusting the Antennas Wireless Node Count Enforcement MAC Filter List WiFiSec Enforcement Wireless > Status WLAN Settings WLAN Statistics WLAN Activities Station Status Page CHAPTER 28 Wireless > Settings Wireless Radio Mode Wireless Settings Secure Wireless Bridging Page Configuring a Secure Wireless Bridge Network Settings for the Example Network Wireless Bridging (without WiFiSec) Configuring VPN Policies for the Access Point and Wireless Bridge Page Configuration for VPN Policies Page Page CHAPTER 29 Wireless > WEP/WPA Security Authentication Overview WEP Encryption Settings WEP Encryption Keys WPA Encryption Settings WPA-PSK Settings WPA-EAP Settings WPA/WPA2 Encryption Settings WPA2-PSK Settings WPA2-EAP Settings Page Beaconing & SSID Controls Wireless Client Communications Configurable Antenna Diversity Page Advanced Radio Settings Page Page CHAPTER 31 Wireless > MAC Filter List Allow or Deny Specific Resources Page CHAPTER 32 Wireless > IDS Wireless Bridge IDS Access Point IDS Enable Client Null Probing Association Flood Detection Intrusion Detection Settings Discovered Access Points Scanning for Access Points Authorizing Access Points on Your Network CHAPTER 33 Wireless > Virtual Access Point SonicPoint VAP Overview What Is a Virtual Access Point? What Is an SSID? Wireless Roaming with ESSID What Is a BSSID? Virtual AP Configuration Task List VAP Configuration Overview Network Zones The Wireless Zone Custom Wireless Zone Settings Page Page Page WLAN Subnets DHCP Server Scope Virtual Access Points Profiles Virtual Access Point Profile Settings WPA-PSK / WPA2-PSK Encryption Settings WPA-EAP / WPA2-EAP Encryption Settings Virtual Access Points General VAP Settings Advanced VAP Settings Virtual Access Point Groups Thinking Critically About VAPs Determining Your VAP Needs A Sample Network Determining Security Configurations VAP Configuration Worksheet Page Page PART 5 WWAN Page CHAPTER 34 WWAN Wireless WAN Overview What is WWAN? Understanding Wireless WAN Connection Models Understanding WWAN Failover Persistent Connection WWAN Failover Dial on Data WWAN Failover Manual Dial WWAN Failover Wireless WAN PC Card Support 3G Wireless WAN Service Provider Support Wireless WAN Prerequisites Viewing the WWAN Status Configuring Wireless WAN Configuring WWAN Basic Settings Connect on Data Management/User Login WWAN Probe Settings Configuring WWAN Advanced Settings Configuring Remotely Triggered Dial-Out Configuring WWAN Connection Profiles Page Page Configuring the Maximum Allowed WWAN Connections Managing WWAN Connections Specifying the WAN Connection Model Monitoring WWAN Data Usage WWAN Glossary Page Page PART 6 SonicPoint Page CHAPTER 35 SonicPoint > SonicPoints Before Managing SonicPoints SonicPoint Provisioning Profiles Configuring a SonicPoint Profile Page Page Page Updating SonicPoint Settings Edit SonicPoint settings Synchronize SonicPoints Enable and Disable Individual SonicPoints Updating SonicPoint Firmware Automatic Provisioning (SDP & SSPP) SonicPoint States Page Page Page Page Page CHAPTER 37 SonicPoint > IDS Wireless Intrusion Detection Services Intrusion Detection Settings Scanning for Access Points Discovered Access Points View Style Authorizing Access Points on Your Network Page CHAPTER 38 SonicPoint > RF Monitoring RF Monitoring Overview Why RF Monitoring? Enabling RF Monitoring on SonicPoint(s) Using The RF Monitoring Interface RF Monitoring Interface Overview Set the Measurement Interval Selecting RF Signature Types Viewing Discovered RF Threat Stations Adding a Threat Station to the Watch List Types of RF Threat Detection Practical RF Monitoring Field Applications Before Reading this Section Using Sensor ID to Determine RF Threat Location Page Using RSSI to Determine RF Threat Proximity Page PART 7 Firewall Page CHAPTER 39 Firewall > Access Rules Stateful Packet Inspection Default Access Rules Overview Using Bandwidth Management with Access Rules Overview Example Scenario Configuration Task List Displaying Access Rules with View Styles Configuring Access Rules for a Zone Page Adding Access Rules Page Page Editing an Access Rule Deleting an Access Rule Enabling and Disabling an Access Rule Restoring Access Rules to Default Zone Settings Displaying Access Rule Traffic Statistics Access Rule Configuration Examples Enabling Ping Blocking LAN Access for Specific Services Enabling Bandwidth Management on an Access Rule Page CHAPTER 40 Settings Firewall > Advanced Detection Prevention Dynamic Ports Source Routed Packets Connections Page Page CHAPTER 41 Firewall > TCP Settings TCP Traffic Statistics TCP Settings Working with SYN/RST/FIN Flood Protection Understanding a TCP Handshake SYN Flood Protection Methods SYN Flood Protection Using Stateless Cookies Layer-Specific SYN Flood Protection Methods Understanding SYN Watchlists Working with SYN Flood Protection Features Working with SYN Flood Protection Modes Working with SYN Attack Threshold Working with SYN Proxy Options Working with SYN/RST/FIN Blacklisting SYN, RST, and FIN Flood Statistics Page Page Page Default Services Overview Custom Services Configuration Task List Supported Protocols Adding Custom Services for Predefined Service Types Page Adding Custom IP Type Services Example Page Editing Custom Services Deleting Custom Services Adding a Custom Services Group Editing Custom Services Groups Page Page CHAPTER 43 Firewall > Multicast Multicast Snooping Multicast Policies IGMP State Table Enabling Multicast on LAN-Dedicated Interfaces Enabling Multicast Through a VPN Page Page Viewing Connections Filtering Connections Viewed Page Page CHAPTER 45 Firewall > QoS Mapping Classification Marking Conditioning Example Scenario 802.1p and DSCP QoS Enabling 802.1p Page Example Scenario DSCP Marking DSCP Marking and Mixed VPN Traffic Configure for 802.1p CoS 4 Controlled load QoS Mapping Managing QoS Marking Page Page Bandwidth Management Page Declaration Limits Outbound Bandwidth Management Algorithm for Outbound Bandwidth Management Outbound BWM Packet Processing Path Guaranteed Bandwidth Processing Maximum Bandwidth Processing Example of Outbound BWM Inbound Bandwidth Management Algorithm for Inbound Bandwidth Management Ingress Rate Update Egress ACK monitor Process ACKs Credit-Based Processing Example of Inbound Bandwidth Management BWM with WAN load balancing Glossary Page Page Page CHAPTER 46 Firewall > SSL Control Overview of SSL Control Page Key Features of SSL Control Key Concepts to SSL Control Page Page Page Caveats and Advisories SSL Control Configuration Page Enabling SSL Control on Zones SSL Control Events Page Page PART 8 VoIP Page CHAPTER 47 VoIP VoIP Overview What is VoIP? VoIP Security Firewall Requirements for VoIP VoIP Protocols H.323 SIP SonicWALLs VoIP Capabilities VoIP Security VoIP Network VoIP Network Interoperability Supported VoIP Protocols H.323 SIP SonicWALL VoIP Vendor Interoperability CODECs VoIP Protocols that SonicOS Does Not Perform Deep Packet Inspection on How SonicOS Handles VoIP Calls Incoming Calls Local Calls Page Configuring SonicWALL VoIP Features Supported Interfaces Configuration Tasks General VoIP Configuration Configuring Consistent Network Address Translation (NAT) Configuring SIP Settings Configuring H.323 Transformations Configuring BWM and QoS Bandwidth Management Quality of Service Configuring Bandwidth on the WAN Interface Configuring VoIP Access Rules Page Page Using the Public Server Wizard Page Page Configuring VoIP Logging VoIP Deployment Scenarios Generic Deployment Scenario Deployment Scenario 1: Point-to-Point VoIP Service page 245 Deployment Scenario 2: Public VoIP Service Wizard Deployment Scenario 3: Trusted VoIP Service Page PART 9 VPN Page Page VPN Types VPN Security IKE version 1 http://rfc.net/rfc2407.html http://rfc.net/rfc2408.html http://rfc.net/rfc2409.html IKEv2 http://rfc.net/rfc4306.html Configuring VPNs in SonicOS Enhanced Planning Your VPN GroupVPN Policy Planning Checklist Page Page Site-to-Site VPN Planning Checklist Page Page Page VPN Policy Wizard VPN Global Settings VPN Policies Navigating and Sorting the VPN Policies Entries Currently Active VPN Tunnels Viewing VPN Tunnel Statistics Configuring GroupVPN Policies Configuring GroupVPN with IKE using Preshared Secret on the WAN Zone Page Page Page Configuring GroupVPN with IKE using 3rd Party Certificates Page Appliances section in the VPN > Settings section on page 537. Exporting a VPN Client Policy Site-to-Site VPN Configurations Creating Site-to-Site VPN Policies Configuring a VPN Policy with IKE using Preshared Secret Page Page Page Page Configuring a VPN Policy using Manual Key Configuring the Local SonicWALL Security Appliance Page Page Configuring the Remote SonicWALL Security Appliance Configuring a VPN Policy with IKE using a Third Party Certificate Page Page Page Appliances section in the VPN > Settings section on page 537. VPN Auto-Added Access Rule Control Page Page Page Page Using OCSP with SonicWALL Security Appliances About OCSP OpenCA OCSP Responder Loading Certificates to use with OCSP Using OCSP with VPN Policies Page CHAPTER 50 VPN > DHCP over VPN DHCP Relay Mode Configuring the Central Gateway for DHCP Over VPN Configuring DHCP over VPN Remote Gateway Page Devices Current DHCP over VPN Leases Page CHAPTER 51 VPN > L2TP Server Configuring the L2TP Server Currently Active L2TP Sessions Page PART 10 User Management Page CHAPTER 52 Settings User Management Introduction to User Management Using Local Users and Groups for Authentication Page Using RADIUS for Authentication Using LDAP / Active Directory / eDirectory Authentication LDAP Directory Services Supported in SonicOS Enhanced LDAP Terms Further Information on LDAP Schemas Single Sign-On Overview What Is Single Sign-On? Benefits Platforms Supported Standards How Does Single Sign-On Work? How Does SonicWALL SSO Agent Work? Logging Multiple Administrator Support Overview What is Multiple Administrators Support? Benefits How Does Multiple Administrators Support Work? Page Page Viewing Status on Users > Status Configuring Settings on Users > Settings User Login Settings User Session Settings Other Global User Settings Acceptable Use Policy Configuring Local Users Viewing, Editing and Deleting Local Users Adding Local Users Editing Local Users Configuring Local Groups Page Creating a Local Group Importing Local Groups from LDAP Configuring RADIUS Authentication RADIUS Servers RADIUS Users RADIUS Users Settings Creating a New User Group for RADIUS Users RADIUS with LDAP for user groups RADIUS Client Test Configuring LDAP Integration in SonicOS Enhanced Preparing Your LDAP Server for Integration Configuring the CA on the Active Directory Server Exporting the CA Certificate from the Active Directory Server Importing the CA Certificate onto the SonicWALL Configuring the SonicWALL Appliance for LDAP Page Page Page Page Page Page Page Configuring Single Sign-On Page Installing the SonicWALL SSO Agent Page Page Page Page Configuring the SonicWALL SSO Agent Page Page Page Page Adding a SonicWALL Security Appliance Editing Appliances in SonicWALL SSO Agent Deleting Appliances in SonicWALL SSO Agent Modifying Services in SonicWALL SSO Agent Configuring Your SonicWALL Security Appliance Page Page Page Page Page Advanced LDAP Configuration Page Page Page Page Page Page Page Configuring Firewall Access Rules Viewing User Status Configuring User Settings Configuring Multiple Administrator Support Configuring Additional Administrator User Profiles Configuring Administrators Locally when Using LDAP or RADIUS Preempting Administrators Page Page Verifying Multiple Administrators Support Configuration Viewing Multiple Administrator Related Log Messages Page Global Guest Settings Guest Profiles Users > Guest Accounts Viewing Guest Account Statistics Adding Guest Accounts To Add an Individual Account: To Generate Multiple Accounts Enabling Guest Accounts Enabling Auto-prune for Guest Accounts Printing Account Details. Users > Guest Status Logging Accounts off the Appliance PART 11 Security Services Page CHAPTER 54 Services SonicWALL Security Services Security Services Summary mySonicWALL.com Managing Security Services Online Security Services Settings Security Services Information Update Signature Manually Page Activating Security Services Page Page SonicWALL Content Filtering Service Content Filter Status Activating SonicWALL CFS Activating a SonicWALL CFS FREE TRIAL Content Filter Type Restrict Web Features Trusted Domains CFS Exclusion List Message to Display when Blocking Configuring SonicWALL Filter Properties Custom List Enable Keyword Blocking Disable all Web traffic except for Allowed Domains Consent Mandatory Filtered IP Addresses Adding a New Address Configuring N2H2 Internet Filtering N2H2 Properties N2H2 Server Status Settings URL Cache Configuring SonicWALL Blocking Features Restrict Web Features Trusted Domains Message to Display when Blocking Configuring Websense Enterprise Content Filtering Websense Properties Websense Server Status Settings URL Cache Configuring SonicWALL Blocking Features Restrict Web Features Trusted Domains Message to Display when Blocking Page CHAPTER 56 Security Services > Anti-Virus Activating SonicWALL Client Anti-Virus Page Activating a SonicWALL Client Anti-Virus FREE TRIAL Configuring Client Anti-Virus Service Anti-Virus Policies Anti-Virus Enforcement Security Services > E-mail Filter CHAPTER 57 Virus Service Security Services > Gateway Anti-Virus SonicWALL GAV Multi-Layered Approach Remote Site Protection Internal Network Protection HTTP File Downloads Server Protection SonicWALL GAV Architecture Page Page Activating the Gateway Anti-Virus, Anti-Spyware, and IPS License Page Setting Up SonicWALL Gateway Anti-Virus Protection Page Applying SonicWALL GAV Protection on Zones Viewing SonicWALL GAV Status Information Updating SonicWALL GAV Signatures Specifying Protocol Filtering Enabling Inbound Inspection Page Configuring Gateway AV Settings Configuring HTTP Clientless Notification Configuring a SonicWALL GAV Exclusion List Viewing SonicWALL GAV Signatures Displaying Signatures Navigating the Gateway Anti-Virus Signatures Table Page Page CHAPTER 58 Security Services > Intrusion Prevention Service SonicWALL Deep Packet Inspection How SonicWALLs Deep Packet Inspection Works SonicWALL IPS Terminology SonicWALL Gateway Anti-Virus, Anti-Spyware, and IPS Activation Page Page Activating the Gateway Anti-Virus, Anti-Spyware, and IPS License Page Setting Up SonicWALL Intrusion Prevention Service Protection Enabling SonicWALL IPS Specifying Global Attack Level Protection Applying SonicWALL IPS Protection on Zones Page CHAPTER 59 Security Services > Anti-Spyware Service SonicWALL Gateway Anti-Virus, Anti-Spyware, and IPS Activation Page Page Activating the Gateway Anti-Virus, Anti-Spyware, and IPS License Setting Up SonicWALL Anti-Spyware Service Protection Applying SonicWALL Anti-Spyware Protection on Zones Page CHAPTER 60 Blacklist SMTP Real-Time Black List Filtering Security Services > RBL Filter Adding RBL Services User-Defined SMTP Server Lists Page CHAPTER 61 Security Client Security Services > Global Security Client Global Security Client Features How SonicWALL Global Security Client Works Global Security Client Licensing Activating Global Security Client Licenses on Your SonicWALL Page Page PART 12 Log Page Page Log View Table Navigating and Sorting Log View Table Entries Refresh Clear Log Export Log E-mail Log Filtering Log Records Viewed Log Event Messages Page Log Priority Logging Level Alert Level Log Redundancy Filter Alert Redundancy Filter Log Categories Page Managing Log Categories Page Page Syslog Settings Syslog Facility Syslog Servers Adding a Syslog Server Page Page E-mail Log Automation Mail Server Settings CHAPTER 66 Log > Name Resolution Selecting Name Resolution Settings Specifying the DNS Server Page Data Collection View Data Web Site Hits Page Page CHAPTER 68 Log > ViewPoint Activating ViewPoint Enabling ViewPoint Settings Page PART 13 Wizards Page CHAPTER 69 the Setup Wizard Wizards > Setup Wizard Using the Setup Wizard Page Configuring a Static IP Address with NAT Enabled Start the Setup Wizard Change Password Change Time Zone WAN Network Mode WAN Network Mode: NAT Enabled LAN DHCP Settings SonicWALL Configuration Summary Setup Wizard Complete Configuring DHCP Networking Mode Page Page LAN Settings DHCP Settings SonicWALL Configuration Summary Setup Wizard Complete Configuring NAT Enabled with PPPoE Page Page DHCP Server Page Configuring PPTP Network Mode Page Page DHCP Server Page Page Page Page Page Page Page Page Page Page Page Page Page Page Using the VPN Policy Wizard Page Page Connecting the Global VPN Clients Page Using the VPN Wizard to Configure Preshared Secret Page Page Page Index