SONICWALL SonicOS 7.1 Device Settings Administration Guide User Guide

June 15, 2024
SONICWALL

SONICWALL SonicOS 7.1 Device Settings Administration Guide

SONICWALL-SonicOS-7.1-Device-Settings-Administration

Product Information: SonicOS 7.1 Device Settings

Specifications

  • Version: SonicOS 7.1
  • Administration Guide: Included

Product Usage Instructions

About SonicOS
SonicOS is a software operating system designed for SonicWall appliances. It provides a range of features and settings to configure and manage your device.

Working with SonicOS
SonicOS offers a user-friendly interface for easy navigation and configuration of your SonicWall appliance.

SonicOS Workflow
The SonicOS workflow guides you through the necessary steps to set up and manage your device effectively.

How to Use the SonicOS Administration Guides
The SonicOS Administration Guides provide detailed instructions on how to configure and manage specific settings and features of your device.

Guide Conventions

The guide uses specific conventions to help you understand and follow the instructions easily.

About Device Settings

The Device Settings section allows you to manage various aspects of your SonicWall appliance, including licenses, security services, system administration, firmware settings, and more.

Managing SonicWall Licenses

You can manage your SonicWall licenses in this section, including activating licenses, managing security services, and enabling free trials.

Managing Security Services
This subsection provides a summary of available security services and guides you on how to manage them online or perform manual upgrades for closed environments.

System Administration

This subsection covers various system administration tasks, such as configuring firewall name, enabling wireless LAN and IPv6, changing administrator name and password, configuring login security, password compliance, login constraints, multiple administrators support, enhanced audit logging support, wireless LAN controller, SonicOS API, GMS management, and management interface configuration.

Managing Certificates
This subsection explains the management of digital certificates, including importing certificates, deleting certificates, generating certificate signing requests, and configuring Simple Certificate Enrollment Protocol.

Administering SNMP
This subsection provides information on setting up SNMP access, enabling and configuring SNMP access, setting up SNMPv3 groups and access, and configuring SNMP as a service.

Firmware Settings

This subsection covers firmware management and backup, including searching the table, creating backup firmware images (local or cloud), scheduling firmware image backups, updating firmware manually or using SafeMode, and importing/exporting settings.

Boot Settings
This subsection allows you to configure one-touch configuration overrides for specific boot settings.

FAQ (Frequently Asked Questions)

Q: How can I activate licenses for my SonicWall appliance?
A: To activate licenses, navigate to the Device Settings section, select “Managing SonicWall Licenses,” and follow the instructions provided.

Q: How do I change the administrator name and password?
A: In the System Administration subsection of Device Settings, there are instructions on how to change the administrator name and password.

Q: Can I import certificates into my SonicWall appliance?
A: Yes, you can import certificates by following the instructions in the “Managing Certificates” subsection of Device Settings.

About SonicOS

This guide is a part of the SonicOS collection of administrative guides that describes how to administer and monitor the SonicWall family of firewalls. SonicOS provides network administrators the management interface, API (Application Program Interface), and the Command Line Interface (CLI) for firewall configuration by setting objects to secure and protect the network services, to manage traffic, and to provide the desired level of network service. This guide focuses on
Topics:
l Working with SonicOS l SonicOS Workflow l How to Use the SonicOS Administration Guides l Guide Conventions
Working with SonicOS
SonicOS provides a web management interface for configuring, managing, and monitoring the features, policies, security services, connected devices, and threats to your network. SonicOS runs on top of SonicCore, SonicWall’s secure underlying operating system. The SonicOS management interface facilitates:
l Setting up and configuring your firewall l Configuring external devices like access points or switches l Configuring networks and external system options that connect to your firewall l Defining objects and policies for protection l Monitoring the health and status of the security appliance, network, users, and connections l Monitoring traffic, users, and threats l Investigating events SonicWall offers two different modes of operation in SonicOS; the modes differ mainly in the areas of policy, object configuration and diagnostics.

SonicOS 7.1 Device Settings Administration Guide

5

About SonicOS

l Policy Mode provides a unified policy configuration work flow. It combines Layer 3 to Layer 7 policy enforcement for security policies and optimizes the work flow for other policy types. This unified policy work flow gathers many security settings into one place, which were previously configured on different pages of the management interface.
l Classic Mode is more consistent with earlier releases of SonicOS; you need to develop individual policies and actions for specific security services. The Classic Mode has a redesigned interface.
This table identifies which modes can be used on the different SonicWall firewalls:

Firewall Type TZ Series
NSa Series
NSsp 10700, NSsp 11700, NSsp 13700 NSsp 15700
NSv Series

Classic Mode yes yes
yes no
yes

Policy Mode Comments

no

The entry level TZ Series, also known as desktop

firewalls, deliver revamped features such as 5G

readiness, better connectivity options, improved

threat, SSL and decryption performance that

address HTPPS bandwidth issues; built-in SD-

WAN, and lawful TLS 1.3 decryption support.

no

NSa firewalls provide your mid sized network with

enhanced security . They are designed

specifically for businesses with 250 and up. it can

provide cloud-based and on-box capabilities like

TLS/SSL decryption and inspection, application

intelligence and control, SD-WAN, real-time

visualization, and WLAN management.

no

The NSsp platforms high-end firewalls that

deliver the advanced threat protection and fast

speeds that large enterprises, data centers, and

service providers need.

yes

The NSsp 15700 is designed for large distributed

enterprises, data centers, government agencies

and services providers. It provides advanced

threat protection like Real-Time Deep Memory

Inspection, multi-instance firewall configuration,

and unified policy creation and modification, with

scalability and availability.

yes

The NSv series firewalls offers all the security

advantages of a physical firewall with the

operational and economic benefits of

virtualization. The NSv firewalls can operate in

either Policy Mode or Classic Mode. You can

switch between modes, but some configuration

information from extra interfaces is removed.

In addition to the management interface, SonicOS also has a full-featured API and a CLI to manage the firewalls. For more information, refer to:
l SonicOS 7.1 API Reference Guide

SonicOS 7.1 Device Settings Administration Guide

6

About SonicOS

l SonicOS Command Line Interface Reference Guide
SonicOS Workflow
When working with SonicWall products, you can use the following workflow as a guide for setting up your security solution.
You begin your planning as you start making your purchasing decisions. Your sales partners can help you assess your network and make recommendations based on the kinds of security services you need. You can learn more about SonicWall products by reviewing product information and solutions. After selecting the solution, you can schedule your implementation. After planning and scheduling your solution, you begin setting up the firewalls. The Getting Started Guides for your products can help you begin setting up the pieces to your solution. The getting started guides are designed to help you install the firewall to a minimal level of operation. Before performing any detailed configuration tasks described in the SonicOS Administration Guides, you should have your firewall set up and basic operation validated. The configuration block of the workflow refers to the many tasks that combine to define how your firewall is integrated into your security solution and how it behaves when protecting your environment. Depending on the features of your security solution, this task can be quite complex. The System Administration Guides are broken into the key command sets and features. Some documents may be used for all solutions, but others may be used use only if you integrated that feature into your solution. For example, High Availability or Wireless Access Points are not necessarily used by all customers. More information about a feature’s workflow is presented in the feature administration guide. Refer to the specific Administration Guide for a SonicOS feature for more information. Configuration tends to be a one-time activity, although you might make minor adjustments after monitoring performance or after diagnosing an issue. The configuration activity can be broken down into the more detailed flow as the following figure shows. This also mirrors the key functions that are listed across the top of the management interface.

SonicOS 7.1 Device Settings Administration Guide

7

About SonicOS

There is some flexibility in the order in which you do things, but this is the general work-flow you would follow when configuring your firewall. Start by defining the settings on the firewall. Next you set up the system and other devices that your firewall is connected to, and you can choose to implement High Availability when done. After your device, network, and system is configured, you should define the objects that you want to monitor. Then you use those objects to define the policies that protect your network. The final step to preparing your setup is to validate the user authentication.
How to Use the SonicOS Administration Guides
The SonicOS Administration Guide is a collection of guides that detail the features represented by each of the main menu items in the management interface. Within each guide, you can find topics covering commands in that menu group, along with procedures and in-depth information. The exceptions are the SonicOS 7.1 Monitor Guide and the SonicOS 7.1 Objects Guide which combine the topics for each of those functions into a single book.
To help you understand how the books align with the features and commands, the following figure shows the books organized like the SonicWall management interface.

The SonicOS Administration Guides, along with related documentation, such as the getting started guides, are available on the https://www.sonicwall.com/support/technical-documentation/.

SonicOS 7.1 Device Settings Administration Guide

8

About SonicOS

Guide Conventions
These text conventions are used in this guide:
NOTE: A NOTE icon indicates supporting information. IMPORTANT: An IMPORTANT icon indicates supporting information. TIP: A TIP icon indicates helpful information. CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.

Convention Bold text
Function | Menu group > Menu item
Code
Italics

Description

Used in procedures to identify elements in the management interface like dialog boxes, windows, screen names, messages, and buttons. Also used for file names and text or values you are being instructed to select or type into the interface.
Indicates a multiple step menu choice on the user interface. For example, NETWORK | System > Interfaces means to select the NETWORK functions at the top of the window, then click on System in the left navigation menu to open the menu group (if needed) and select Interfaces to display the page.
Indicates sample computer programming code. If bold, it represents text to be typed in the command line interface.
Represents a variable name. The variable name and angle brackets need to be replaced with an actual value. For example in the segment serialnumber=<your serial number>, replace the variable and brackets with the serial number from your device, such as serialnumber=2CB8ED000004.
Indicates the name of a technical manual. Also indicates emphasis on certain words in a sentence, such as the first instance of a significant term or concept.

SonicOS 7.1 Device Settings Administration Guide

9

About SonicOS

About Device Settings
The web-based SonicOS Management Interface enables you to configure SonicWall network security appliances (firewalls). This document provides information on:
l Managing SonicWall Licenses l System Administration l Configuring Time Settings l Managing Certificates l Administering SNMP l Firmware Settings l Restarting the System
SonicOS 7.1 Device Settings Administration Guide 10 About Device Settings

Managing SonicWall Licenses

IMPORTANT: By design, the SonicWall License Manager cannot be configured to use a third-party proxy server. Networks that direct all HTTP and HTTPS traffic through a third-party proxy server may experience License Manager issues. Topics: l Licenses l Managing Security Services l Registering Your SonicWall Appliance l Activating the Gateway Anti-Virus, Anti-Spyware, and IPS License l Activating FREE TRIALs
Licenses
Device | Settings > Licenses page in the SonicOS management interface provides links to activate, upgrade, or renew SonicWall Security Services licenses. From this page, you can manage all the licenses for your SonicWall security appliance. The information listed in the Services table is updated from your mysonicwall.com account. The Licenses page also includes links to FREE trials of SonicWall Security Services.
SonicOS 7.1 Device Settings Administration Guide 11 Managing SonicWall Licenses

Managing Security Services
When you have established your Internet connection, it is recommended you register your SonicWall security appliance, which provides the following benefits:
l Try a FREE 30-day trial of SonicWallGateway Anti-Virus, Anti-Spyware, and Intrusion Prevention, Content Filtering Service, and Client Anti-Virus
l Activate SonicWall Anti-Spam l Activate SonicWall security services and upgrades l Access SonicOS firmware updates l Get SonicWall technical support Topics: l Services Summary l Managing Security Services Online
Services Summary
The Device | Settings > Licenses page lists all the available and activated services on the SonicWall security appliance. The friendly name of the security appliance is displayed above the SERVICES table. Select appropriate option in the View drop-down box to list the services based on their activation status. The available options are:
l Licensed and Unlicensed l Licensed l Unlicensed
The table displays the following information: l SERVICES – lists all the available SonicWall Security Services and upgrades available for the SonicWall security appliance. l STATUS – indicates if the security service is activated (Licensed), available for activation (Not Licensed), or no longer active (Expired). l ACTION – displays options to upgrade, renew, try, or activate the service, depending on its license status.
SonicOS 7.1 Device Settings Administration Guide 12 Managing SonicWall Licenses

l Count – displays the number of nodes/users currently connected to your appliance. If your security appliance is licensed for unlimited nodes, the count is displayed as Unlimited.
l Max. Count – displays the maximum number of nodes/users allowed for the license. l EXPIRY DATE – displays the expiration date for any Licensed Security Service. The information listed in the Services table is updated from your mysonicwall.com account the next time the SonicWall security appliance automatically synchronizes with MySonicWall (once a day) or you can click the SYNCHRONIZE button on this page to update the table. For more information on SonicWall Security Services, see SonicOS 7.0 Security Services document available at https://www.sonicwall.com/support/technical-documentation/.
Managing Security Services Online
You can activate, upgrade or renew services using one of the following methods: l Performing service license updates in MySonicWall and synchronizing the changes in SonicOS management interface. 1. Navigate to Device | Settings

Licenses page. 2. Click MySonicWall above the Services table. 3. Log into your MySonicWall account and upgrade the licenses. See MSW online help. 4. Synchronize changes. See Synchronizing Changes. l Performing service license updates through SonicOS management interface. See Managing Services from SonicOS Management Interface.
Topics:
l Managing Services from SonicOS Management Interface l Synchronizing Changes
Managing Services from SonicOS Management Interface
You can activate, upgrade, or renew licenses for the Security Services on Device | Settings > Licenses page.
To activate, upgrade, or renew services: 1. Navigate to Device | Settings > Licenses. 2. Select the appropriate option in the View drop-down box above the SERVICES table. 3. Locate the service you want to activate / renew / upgrade. 4. Click any option listed in the ACTIONS column based on what you need to do with the service. The options listed for a service in the ACTIONS column depend on the status of the service. l To activate a FREE trial, click Try. l To activate a Security Service, click the Activate link. l To renew a Security Service, click the Renew link.
SonicOS 7.1 Device Settings Administration Guide 13 Managing SonicWall Licenses

l To upgrade a Security Service, click the Upgrade. 5. Follow the prompts to activate/renew/upgrade the service license. After completion, you are returned to
the Licenses page.
Synchronizing Changes
When you make changes to your Security Services in MySonicWall, you can synchronize them instead of waiting for the system to do it automatically. To synchronize your MySonicWall account with the Services table in SonicOS management interface:
1. Navigate to Device | Settings > Licenses . 2. Click Synchronize option above the SERVICES table.
Manual Upgrade for Closed Environments
If your SonicWall security appliance is deployed in a high-security environment that does not allow direct Internet connectivity from the SonicWall security appliance, you can enter the encrypted license key information from https://mysonicwall.com manually on the Device | Settings > Licenses page in the SonicOS management interface.
NOTE: Manual upgrade of the encrypted license keyset is only for closed environments. If your firewall is connected to the Internet, it is recommended you use the automatic registration and Security Services upgrade features of your appliance. You need to perform steps 1 through 4 from a computer connected to the internet and then continue the procedure in the SonicOS Management Interface of the security appliance that does not have internet connectivity. 1. Make sure you have an account at https://mysonicwall.com and your SonicWall security appliance is
registered to the account before proceeding. 2. After logging into MySonicWall, click on the serial number of your registered SonicWall security appliance
listed in Product Management > My Products.
SonicOS 7.1 Device Settings Administration Guide 14 Managing SonicWall Licenses

3. Click MANUAL UPGRADE and select Add keyset to your product. The scrambled text displayed is the License Keyset for the selected SonicWall security appliance and activated Security Services.
4. Click Copy Code to copy the Keyset text for pasting into the Settings | Licenses page. 5. Make sure your SonicWall appliance is running the latest version of SonicOS. 6. Navigate to Device | Settings > Licenses. 7. Click Manual License at the upper-right corner of the page. 8. Paste (or type) the Keyset (from the step 3) into the Enter Keyset field in the Manual License Upgrade
dialog.
9. Click APPLY to update your SonicWall security appliance. The status field at the bottom of the page displays The configuration has been updated.
10. You can generate the report from Device | Diagnostics > Tech Support Report to verify the upgrade details.
NOTE: After the manual upgrade, the Settings | Licenses page does not contain any registration and upgrade information.
Registering Your SonicWall Appliance
When you log in to your primary appliance for the first time, a Software Transaction Agreement (STA) form displays for your acceptance before you can proceed. If you are using a CLI, you must type (or select) Yes before proceeding. When you have accepted the STA, it is not shown for upgrades of either firmware or software.
NOTE: MySonicWall registration information is not sold or shared with any other company.
SonicOS 7.1 Device Settings Administration Guide 15 Managing SonicWall Licenses

See the Quick Start Guide for your security appliance for additional information on applying licenses manually, synchronizing licenses manually, and upgrading firmware.
Activating the Gateway Anti-Virus, AntiSpyware, and IPS License
Your security appliance must be registered on MySonicWall to use these security services. See Registering Your SonicWall Appliance or the Quick Start Guide for your security appliance. Because SonicWall Anti-Spyware is part of SonicWall Gateway Anti-Virus, Anti-Spyware, and Intrusion Prevention, the Activation Key you receive is for all three services on your SonicWall security appliance. If you do not have a SonicWall Gateway Anti-Virus , Anti- Spyware , and Intrusion Prevention license activated on your SonicWall security appliance, you must purchase it from a SonicWall reseller or through your MySonicWall account (limited to customers in the USA and Canada).
Activating FREE TRIALs
You can try FREE TRIAL versions of SonicWallGateway Anti-Virus, Anti-Spyware, and Intrusion Prevention. For information about activating a free trial of any or all of the Security Services, see the Quick Start Guide for your security appliance or Managing Security Services Online.
SonicOS 7.1 Device Settings Administration Guide 16 Managing SonicWall Licenses

System Administration

Configuring the Firewall Name
To configure the firewall name: 1. Navigate to Device | Settings > Administration. 2. Click Firewall Administrator.
3. Enter the hexadecimal serial number of the firewall in the Firewall Name field. This number uniquely identifies the SonicWall security appliance and defaults to the serial number of the firewall. The serial number is also the MAC address of the unit. To change the Firewall Name, enter a unique alphanumeric name in the Firewall Name field. It must be at least 8 characters in length and can be up to 63 characters long.
4. Enter a friendly name in the Firewall’s Domain Name field. The name can be private, for internal users, or an externally registered domain name. This domain name is used in conjunction with User Web Login Settings.
5. To facilitate recognition of the primary/secondary firewalls in the Event Logs, enable Auto-Append HA/Clustering suffix to Firewall Name. When this option is enabled, an appropriate suffix is appended automatically to the firewall name in the Monitor | Logs > System Logs page. This option is not selected by default. For more information about Event Logs, see the SonicOS 7.0 Logs (Monitor) document.
SonicOS 7.1 Device Settings Administration Guide 17 System Administration

Enabling Wireless LAN and IPv6
To enable the visibility of a wireless LAN and/or IPv6: 1. Navigate to Device | Settings > Administration > Firewall Administrator. 2. Click Enable Wireless LAN and/or Enable IPv6. These options are selected by default. A confirmation message is displayed. IMPORTANT: Enabling or disabling the Wireless LAN feature requires a restart of the firewall.
When WLAN is disabled: l All access point and wireless-related management interface pages do not display. l WLAN is not displayed as a zone type. l Any existing WLAN zones or objects become uneditable.
When IPv6 is disabled, all IPv6 packets are dropped by the firewall and the Monitor | Tools and Monitor > Packet Monitor page displays the log messages. 3. Click OK.
Changing the Administrator Name and Password
Each SonicWall security appliance has a default administrator name of admin and a password of password. To change the administrator name and/or password:
1. Navigate to Device | Settings > Administration. 2. Click Firewall Administrator.
3. Type the new name in the Administrator Login Name field.
SonicOS 7.1 Device Settings Administration Guide 18 System Administration

The Administrator Name can be changed from the default setting of admin to any word using alphanumeric characters up to 32 characters in length. 4. Perform the following steps to change password, otherwise skip to step 4:
a. Click Change Password. b. Type the old password in the Old Password field. c. Type the new password in the New Password field. The new password can be up to 32
alphanumeric and special characters. d. It is recommended you change the default password, password, to your own custom password.
Enter a strong password that cannot be easily guessed by others. A strong password should have at least one uppercase letter, one lowercase letter, one number, and one special character. For example, MyP@ssw0rd. e. Type the new password again in the Confirm Password field. f. Click Accept. 5. To enforce Two-factor Authentication, select TOTP from the One-time Passwords Method drop-down. You can now bind your mobile authentication application with your user account during the next login. 6. Click Accept.

Configuring Login Security
The internal SonicOS Web-server supports TLS 1.1 and above with strong ciphers (128 bits or greater) when negotiating HTTPS management sessions. SSL implementations are not supported. This heightened level of HTTPS security protects against potential SSLv2 rollback vulnerabilities and ensures compliance with the Payment Card Industry (PCI) and other security and risk- management standards.
TIP: SonicOS uses advanced browser technologies, such as HTML5, which are supported in most recent browsers. SonicWall recommends using the latest Chrome, Firefox, Internet Explorer, or Safari (does not operate on Windows platforms) browsers for administration of SonicOS. Mobile device browsers are not recommended for SonicWall system administration. Configuring SonicOS password constraint enforcement ensures that administrators and users are using secure passwords. This password constraint enforcement can satisfy the confidentiality requirements as defined by current information security management systems or compliance requirements, such as Common Criteria and the Payment Card Industry (PCI) standard.
SonicOS 7.1 Device Settings Administration Guide 19 System Administration

Topics: l Configuring Password Compliance l Configuring Login Constraints
Configuring Password Compliance
To configure password compliance: 1. Navigate to Device | Settings > Administration. 2. Click Login / Multiple Administrators. Configure the following settings in the LOGIN SECURITY section. 3. To require users to change their passwords after a designated number of days has elapsed: a. Select Password must be changed every (days). The field becomes active. This option is not selected by default. b. Enter the elapsed time in the field. The default number of days is 90, the minimum is 1 day, and the maximum is 9999. When a user attempts to login with an expired password, a popup window prompts the user to enter a new password. The User Login Status window now includes a Change Password button so users can change their passwords at any time. 4. To specify the minimum length of time, in hours, allowed between password changes: a. Select Change password after (hours) . The field becomes active. b. Enter the number of hours. The minimum ­ and default ­ time is 1 hour; the maximum is 9999 hours.
SonicOS 7.1 Device Settings Administration Guide 20 System Administration

5. To require users to use unique passwords for the specified number of password changes: a. Select Bar repeated passwords for this many changes. The field becomes active. b. Enter the number of changes. The default number is 4, the minimum number is 1, and the maximum number is 32.
6. To require users to change at least 8 alphanumeric/symbolic characters of their old password when creating a new one, select Apply password constrains. For how to specify what characters are allowed, see Step 7.
7. Specify the shortest allowed password, enter the minimum number of characters in the Enforce a minimum password length of field. The default number is 8, the minimum is 1, and the maximum is 99.
8. Choose how complex a user’s password must be to be accepted from the Enforce password complexity drop-down menu: l None (default) l Alphanumeric characters– Requires both alphabetic and numeric characters l Alphanumeric and symbolic characters– Requires alphabetic, numeric, and symbolic characters ­ for symbolic characters, only !, @, #, $, %, ^, &, *, (, and ) are allowed; all others are denied
9. When a password complexity option other than None is selected, the options under Complexity Requirement become active. Enter the minimum number of alphanumeric and symbolic characters required in a user’s password. The default number for each is 0, but the total number of characters for all options cannot exceed 99. l Upper Case Characters l Lower Case Characters l Number Characters l Symbolic Characters NOTE: The Symbolic Characters field becomes active only if Alphanumeric and symbolic characters is selected.
10. Select to which classes of users the password constraints are applied under Apply the above password constraints for. By default, all options are selected: l Admin ­ Refers to the default administrator with the username admin. l Other full admin l Limited admin l Guest admin l Other local users
SonicOS 7.1 Device Settings Administration Guide 21 System Administration

Configuring Login Constraints

To configure login constraints: 1. Navigate to Device | Settings > Administration. 2. Click Login/Multiple Administrators.
In the LOGIN SECURITY section, configure the following:
1. To specify the length of inactivity time that elapses before you are automatically logged out of the Management Interface, enter the time, in minutes, in the Log out the Admin after inactivity of (mins) field. By default, the SonicWall Security Appliance logs out the administrator after 5 minutes of inactivity. The inactivity timeout can range from 1 to 9999 minutes. TIP: If the Administrator Inactivity Timeout is extended beyond five minutes, you should end every management session by clicking Logout in the upper right corner of the view to prevent unauthorized access to the firewall’s Management Interface.
2. To configure the SonicWall Security Appliance to lockout an administrator or a user if the login credentials are incorrect, enable Admin/user lockout. Both administrators and users are locked out of accessing the firewall after the specified number of incorrect login attempts. This option is disabled by default. When this option is enabled, the following fields become active. CAUTION: If the administrator and a user are logging into the firewall using the same source IP address, the administrator is also locked out of the firewall. The lockout is based on the source IP address of the user or administrator. a. Select Enable local admin/user account lockout (uncheck for login IP address lockout). This option locks out user accounts and IP addresses when they have surpassed a specified number of incorrect login attempts. This option is only available when admin/user lockout is enabled. b. Select Log event only without lockout for SonicOS to log failed user login attempts that have reached the established threshold, but does not lock out the user or IP address. This option is only available when Admin/user lockout is enabled.
SonicOS 7.1 Device Settings Administration Guide 22 System Administration

After a user or IP address is locked out, a “User login denied – User is locked out” message displays on the login screen and the login is rejected.
NOTE: You can review and edit all locked out user accounts on the Active Users page when local admin/user account lockout is enabled. c. Enter the number of failed attempts within a specified time frame before the user is locked out in the Failed login attempts per minute before lockout field. The default number is 5, the minimum is 1, and the maximum is 99. Enter the maximum time in which failed attempts can be made. The default is 5 minutes, the minimum is 1 minute, and the maximum is 240 minutes (4 hours). d. Enter the length of time that must elapse before the user is allowed to attempt to log into the firewall again in the Lockout Period (mins) field. The default is 5 minutes, the minimum is 0 (permanent lockout), and the maximum is 60 minutes. 3. Enter the number of incorrect login attempts from the command line interface (CLI) that triggers a lockout in the Max login attempts through CLI field. The default is 5, the minimum is 3, and the maximum is 15. 4. Click Accept.
Multiple Administrators Support
SonicOS supports multiple concurrent administrators with full administrator privileges, read-only privileges, and limited privileges. The original version of SonicOS supported only a single administrator to log on to a firewall with full administrative privileges. Additional users can be granted “limited administrator” access, but only one administrator can have full access to modify all areas of the SonicOS GUI at one time. SonicOS provides support for multiple concurrent administrators. This feature allows for multiple users to log-in with full administrator privileges. In addition to using the default admin user name, additional administrator user names can be created. Because of the potential for conflicts caused by multiple administrators making configuration changes at the same time, only one administrator is allowed to make configuration changes. The additional administrators are given full access to the GUI, but they cannot make configuration changes. Multiple Administrators Support provides the following benefits:
l Improved productivity: Allowing multiple administrators to access a firewall simultaneously eliminates auto logout, a situation that occurs when two administrators require access to the appliance at the same time and one is automatically forced out of the system.
l Reduced configuration risk: The new read-only mode allows users to view the current configuration and status of a firewall without the risk of making unintentional changes to the configuration.
SonicOS 7.1 Device Settings Administration Guide 23 System Administration

Working of Multiple Administrators Support
Topics:
l Configuration Modes l User Groups l Priority for Preempting Administrators l GMS and Multiple Administrator Support

Configuration Modes
To allow multiple concurrent administrators, while also preventing potential conflicts caused by multiple administrators making configuration changes at the same time, these configuration modes have been defined:

Configuration mode
Read-only mode
Non-configuration mode

Administrator has full privileges to edit the configuration. If no administrator is already logged into the appliance, this is the default behavior for administrators with full and limited administrator privileges (but not read-only administrators).
NOTE: Administrators with full configuration privilege can also log in using the Command Line Interface (CLI; see the SonicOS 7.0 CLI Reference Guide).
Administrator cannot make any changes to the configuration, but can view the entire management UI and perform monitoring actions.
Only administrators who are members of the SonicWall Read-Only Admins user group are given read-only access, and it is the only configuration mode they can access.
Administrator can view the same information as members of the read-only group and they can also initiate management actions that do not have the potential to cause configuration conflicts.
Only administrators who are members of the SonicWall Administrators user group can access non-configuration mode. This mode can be entered when another administrator is already in configuration mode and the new administrator chooses not to preempt the existing administrator. By default, when an administrator is preempted out of configuration mode, he or she is converted to non-configuration mode. On the Device | Settings > Administration page, this behavior can be modified so that the original administrator is logged out.

Access rights available to configuration modes table provides a summary of the access rights available to the configuration modes. Access rights for limited administrators are included also, but note that this table does not include all functions available to limited administrators.

SonicOS 7.1 Device Settings Administration Guide 24 System Administration

ACCESS RIGHTS AVAILABLE TO CONFIGURATION MODES

Function Import certificates Generate certificate signing requests Export certificates Export appliance settings Download TSR Use other diagnostics Configure network Flush ARP cache Setup DHCP Server Renegotiate VPN tunnels Log users off
Unlock locked-out users Clear log Filter logs Export log Email log Configure log categories Configure log settings Generate log reports Browse the full UI Generate log reports

Full admin in config mode
X X X X X X X X X X X
X X X X X X X X X X

Full admin in

non-config Read-only

Limited

mode

administrator administrator

X

X

X

X

X

X

X

X

X

X

X

guest users

only

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

SonicOS 7.1 Device Settings Administration Guide 25 System Administration

User Groups
The Multiple Administrators Support feature supports two new default user groups:
l SonicWall Administrators: Members of this group have full administrator access to edit the configuration. l SonicWall Read-Only Admins: Members of this group have read-only access to view the full management
interface, but they cannot edit the configuration and they cannot switch to full configuration mode.
It is not recommended to include users in more than one of these user groups. If you do so, however, the following behavior applies:

If members of this user group Are

SonicWall Administrators

Also included in the Limited Administrators or SonicWall Read-Only Admins user groups, the members have full administrator rights.

Limited Administrators

Included in the SonicWall Read-Only Admins user group, the members have limited administrator rights.

Read-Only Admins

Later included in another administrative group, If this read-only admin group is used with other administrative groups option in the SonicWall Read-Only Admins group configuration determines whether the members are still restricted to read-only access or have the full administration capabilities set by their other group.

Priority for Preempting Administrators
These rules govern the priority levels that the various classes of administrators have for preempting administrators that are already logged into the appliance:
1. The admin user and SonicWall Global Management System (GMS) both have the highest priority and can preempt any users.
2. A user who is a member of the SonicWall Administrators user group can preempt any users except for the admin and SonicWall GMS.
3. A user who is a member of the Limited Administrators user group can only preempt other members of the Limited Administrators group.
GMS and Multiple Administrator Support
When using SonicWall GMS to manage a firewall, GMS frequently logs in to the appliance (for such activities as ensuring that GMS management IPSec tunnels have been created correctly). These frequent GMS log-ins can make local administration of the appliance difficult because the local administrator can be preempted by GMS.

SonicOS 7.1 Device Settings Administration Guide 26 System Administration

Configuring Multiple Administrator Access
To configure multiple administrator access: 1. Navigate to Device | Settings > Administration. Click Login / Multiple Administrators.
2. To configure what happens when one administrator preempts another administrator, from the On preemption by another admin option, select whether the preempted administrator can be converted to non-config mode or logged out: l Drop to non-config mode: More than one administrator to access the appliance in non-config mode without disrupting other administrators. This option is not selected by default. l Log out: The new administrator to preempt other sessions. NOTE: Selecting Log Out disables Non-Config mode and prevents entering Non-Config mode manually.
3. To allow a lower-priority administrator to preempt the current administrator after a specified time, enter the time, in minutes, in the Allow preemption by a lower priority administrator after inactivity of (mins) field. The default is 10 minutes, the minimum is 1 minute, and the maximum is 9999 minutes.
4. The SonicOS Management Interface allows administrators to send text messages through the Management Interface to other administrators logged into the appliance. The message appears in the browser’s status bar. To enable this option: a. Select Inter-administrator messaging. The Messaging polling interval (seconds) field becomes active. b. Specify how often an administrator’s browser checks for inter-administrator messages in the Messaging polling interval (secs) field. Specify a reasonably short interval to ensure timely delivery of messages, especially if there are likely to be multiple administrators who need to access the appliance. The default is 10 seconds, the minimum is 1 second, and the maximum is 99 seconds.
5. To enable access by System Administrators, Cryptographic (Crypto) Administrators, and Audit Administrators, select Multiple Admin Roles. When this option is disabled, these administrators cannot access the system, and all related user groups and information about them are hidden. This option is not selected by default.
SonicOS 7.1 Device Settings Administration Guide 27 System Administration

Enabling Enhanced Audit Logging Support
An enhanced log entry contains the parameter changed and user name in the Monitor| Logs > System Events page. To enable logging of all configuration changes in the Monitor| Logs > System Logs page:
1. Navigate to Device | Settings > Administration. 2. Click Audit / SonicOS API. 3. In the ENHANCED AUDIT LOGGING SUPPORT section, enable Enhanced Audit Logging
4. Click ACCEPT.
Configuring the Wireless LAN Controller
To enable wireless controller mode: IMPORTANT: You must reboot the firewall after changing Wireless Controller modes. 1. Navigate to Device | Settings > Administration. 2. Click Audit/SonicOS API. 3. In the Wireless LAN Controller section, select any one of the options from the Wireless Controller Mode drop- down menu: l Wireless-Controller-Only (default) This option enables wireless controller mode l Non-Wireless This option enables non-wireless controller mode l Full-Feature-Gateway This option enables normal firewall mode
SonicOS 7.1 Device Settings Administration Guide 28 System Administration

4. After you select the appropriate wireless controller mode, click OK in the warning message displayed. 5. Click Accept.
Enabling SonicOS API and Configuring Authentication Methods
You can use SonicOS API as an alternative to the SonicOS Command Line Interface (CLI) for configuring selected functions. To do so, you must first enable SonicOS API. For more information about SonicOS API, see the SonicOS 7.0 API document available at https://www.sonicwall.com/support/technical- documentation/.
To enable SonicOS API and configure client authentication: 1. Navigate to Device | Settings > Administration. 2. Click Audit / SonicOS API. 3. In the SONICOS API section, enable SonicOS API. 4. Select any of the authentication methods for initial client authentication: l RFC-7616 HTTP Digest Access authentication l Select the appropriate digest algorithms: SHA256 (default), MD5 l Integrity protection: Disabled (default), Allowed, or Enforced. l Session variant (password hashes in place of passwords):Disabled, Allowed (default), or Enforced l CHAP authentication. l RFC-2617 HTTP Basic Access authentication l Public Key Authentication l RSA modulus (key/cipher size in bits): 2014 is the default. l RSA padding type: PKCS#1 v1.5 or PKCS#1 v2.0 OAEP l OAEP hash method: SHA-1, SHA-256, or Other l OAEP mask (MGF1) method: SHA1, SHA-256, or Other l Session security using RFC-7616 Digest Access Authentication l Can hold user passwords received from the client. l Maximum nonce use: 10 by default l Two-Factor and Bearer Token Authentication 5. Click Accept.
SonicOS 7.1 Device Settings Administration Guide 29 System Administration

Enabling GMS Management
NOTE: For more information on SonicWall Global Management System, see the SonicWall GMS and SonicWall Management Services administration documentation, available at https://www.sonicwall.com/support/technical-documentation/. To configure the Security Appliance for GMS management: 1. Navigate to Device | Settings > Administration. 2. Click Audit / SonicOS API. 3. Scroll to the ADVANCED MANAGEMENT section.
4. Enable Management using GMS. The Configure button becomes available. 5. Click Configure. The GMS Settings screen in displayed.
6. Enter the host name or IP address of the GMS Console in the GMS Host Name or IP Address field. 7. Enter the port in the GMS Syslog Server Port field. The default value is 514. 8. To send only heartbeat status instead of log messages, select Send Heartbeat Status Messages Only. 9. If the GMS Console is placed behind a device using NAT on the network, select GMS behind NAT
Device. When you select GMS behind NAT Device, the NAT Device IP Address field becomes active. 10. Enter the IP address of the NAT device in the NAT Device IP Address field.
SonicOS 7.1 Device Settings Administration Guide 30 System Administration

11. Select one of the following GMS modes from the Management Mode drop-down menu:
l IPSEC Management Tunnel – Allows the firewall to be managed over an IPsec VPN tunnel to the GMS management console. If you selected this option, go to step 11.
l Existing Tunnel – Uses an existing VPN tunnel over the connection between the GMS server and the firewall. If you selected this option, go to step 13.
l HTTPS – Allows HTTPS management from two IP addresses: the GMS Primary Agent and the Standby Agent IP address. The SonicWall firewall also sends encrypted syslog packets and SNMP traps using 3DES and the firewall administrator’s password. Options for configuring the GMS reporting server display. If you selected this option, go to step 12.
12. The default IPsec VPN settings are displayed with values populated by SonicOS. Verify the settings.

a. From Encryption Algorithms, select the appropriate algorithm. b. Optionally, enter a new encryption key in the Encryption Key field:

For DES 3DES

The key must be 16 hexadecimal characters 48 hexadecimal characters

c. Optionally, enter a new authentication key in the Authentication Key field:

For MD5 SHA1

The key must be 32 hexadecimal characters 40 hexadecimal characters

d. Go to Step 13. 13. SonicOS needs to know the GMS reporting server.

a. Select Send Syslog Messages to a Distributed GMS Reporting Server. The GMS Reporting Server IP Address and GMS Reporting Server Port options become available.
SonicOS 7.1 Device Settings Administration Guide 31 System Administration

b. In the GMS Reporting Server IP Address field, enter the IP address of the GMS server. c. In the GMS Reporting Server Port field, enter the port of the GMS server. The default port is 514. 14. Click OK. 15. Click Accept.
Configuring the Management Interface
In this section, you configure: l How the Management Interface tables display. l Certificate usage. l Whether you are operating in Configuration or Non- Config mode. l Other management options.
SonicOS 7.1 Device Settings Administration Guide 32 System Administration

Topics:
l Managing through HTTP/HTTPS l Selecting a Security Certificate l Controlling the Management Interface Tables l Enforcing TLS Version l Switching Configuration Modes l Deleting Browser Cookies l Configuring SSH Management
Managing through HTTP/HTTPS
You can manage the SonicWall security appliance using HTTP or HTTPS and a Web browser. HTTP web-based management is disabled by default. Use HTTPS to log into the SonicOS Management Interface with factory default settings.
To manage through HTTP or HTTPS: 1. Navigate to Device | Settings > Administration. 2. Click Management. 3. To enable HTTP management globally, select Allow management via HTTP in the WEB MANAGEMENT SETTINGS section, This option is not selected by default. 4. The default port for HTTP is port 80, but you can configure access through another port. Enter the number of the desired port in the HTTP Port field. IMPORTANT: If you configure another port for HTTP management, you must include the port number when you use the IP address to log into the SonicWall Security Appliance. For example, if you configure the port to be 76, then you must type LAN IP Address:76 into the Web browser, for example, http://192.18.16.1:76. 5. The default port for HTTPS management is 443. To add another layer of security for logging into the SonicWall Security Appliance by changing the default port, enter the preferred port number into the HTTPS Port field. IMPORTANT: If you configure another port for HTTPS management Port, you must include the port number when you use the IP address to log into the SonicWall Security Appliance. For example, if you use 700 for the port, then you must log into the SonicWall using the port number as well as the IP address; for example, https://192.18.16.1:700.
Selecting a Security Certificate
Security certificates provide data encryption and a secure web site.
SonicOS 7.1 Device Settings Administration Guide 33 System Administration

To specify the type of security certificate: 1. Navigate to Device | Settings

Administration. 2. Click Management. 3. From Certificate Selection drop-down box, select the type of certificate for your website:
l Use Self-signed Certificate, which allows you to continue using a certificate without downloading a new one each time you log into the SonicWall Security Appliance. This option is selected by default. Go to Step 3.
l Import Certificate to select an imported certificate from the Device | Settings > Certificates page to use for authentication to the management interface. A confirmation message displays. a. Click OK. The Device | Settings Certificates page is displayed. b. See Managing Certificates section.
4. In the Certificate Common Name field, enter the IP address or common name for the firewall. If you choose Use Selfsigned Certificate, SonicOS populates the field with the firewall’s IP address.
5. Click Accept. To regenerate a Self-Signed Certificate:
1. Navigate to Device | System > Administration > Management. 2. In the WEB MANAGEMENT SETTINGS section, click Regenerate Certificate. 3. Click OK in the confirmation message that is displayed.
Controlling the Management Interface Tables
The SonicWall Management Interface allows you to control the display of large tables of information across all tables in the Management Interface by changing the:
SonicOS 7.1 Device Settings Administration Guide 34 System Administration

l Number of table entries displayed on a page. l Frequency of background automatic refresh of tables. Some tables have individual settings for items per page that are initialized at login to the value configured here. After these pages are viewed, their individual settings are maintained. Subsequent changes made here affect these pages only following a new login. To change the display and refresh of tables: 1. Navigate to Device | Settings > Administration. 2. Click Management. 3. In the WEB MANAGEMENT SETTINGS section:
a. Enter the desired number of items per page in the Default Table Size (items per page) field. The minimum is 1, the maximum is 5000, and the default is 50.
b. Enter the desired refresh interval, in seconds, in the Auto-updated Table Refresh Interval (secs) field. The minimum is 1 second, the maximum is 300 seconds, and the default is 10 seconds.
4. Click Accept.
Enforcing TLS Version
SonicOS supports versions 1.0, 1.1, and 1.2 of the Transport Layer Security (TLS) protocol. You can ensure that the more secure version 1.1 and above are used. To enforce use of TLS versions 1.1 and above:
1. Navigate to Device | Settings > Administration. 2. Click Management. 3. In the WEB MANAGEMENTS SETTINGS section, enable Enforce TLS 1.1 and Above.
4. Click Accept.
Switching Configuration Modes
Each appliance includes a Mode option that toggles the configuration mode of the Management Interface. If you are in Configuration Mode, you can switch to Non-Config Mode at any time, or if you are in Non-Config Mode. you
SonicOS 7.1 Device Settings Administration Guide 35 System Administration

can switch to Configuration Mode. TIP: This method is in addition to switching modes from the Mode setting on each view. For more information about modes, see the SonicOS 7.1 About SonicOS documentation.
To switch modes: 1. Navigate to Device | Settings > Administration. 2. Click Management. 3. In the WEB MANAGEMENT SETTINGS section, If you are in: l Configuration Mode, click End Config Mode, and click OK. The Mode indicator in the top right of the page displays Non-Config. l Non-Config Mode, click Configuration Mode. The Mode indicator in the top right of the page displays Configuration.
Deleting Browser Cookies
IMPORTANT: Deleting cookies causes you to lose any unsaved changes made in the Management Interface. To delete all browser cookies saved by the Security Appliance: 1. Navigate to Device | Settings > Administration. 2. Click Management. 3. Click Delete Cookies. 4. Click OK.
Configuring SSH Management
If you use SSH to manage the firewall, you can change the SSH port for additional security. To change the SSH port:
1. Navigate to Device | Settings > Administration. 2. Click Management. 3. Scroll to SSH MANAGEMENT SETTINGS.
SonicOS 7.1 Device Settings Administration Guide 36 System Administration

4. Enter the port in the SSH Port field. The default SSH port is 22. 5. Click Accept.
Client Certificate Verification
You can configure certificate verification with or without a Common Access Card (CAC). NOTE: None of the options is selected by default.
Topics: l About Common Access Card l Configuring Client Certificate Verification l Using the Client Certificate Check l Troubleshooting User Lock Out
About Common Access Card
A Common Access Card (CAC) is a United States Department of Defense (DoD) smart card used by military personnel and other government and non-government personnel who require highly secure access over the Internet. A CAC uses PKI authentication and encryption.
NOTE: Using a CAC requires an external card reader connected on a USB port. The Client Certificate Check was developed for use with a CAC; however, it is useful in any scenario that requires a client certificate on an HTTPS/SSL connection. CAC support is available for client certification only on HTTPS connections.
NOTE: CACs might not work with browsers other than Microsoft Internet Explorer.
SonicOS 7.1 Device Settings Administration Guide 37 System Administration

Configuring Client Certificate Verification
To configure Client Certificate Check: 1. Navigate to Device | Settings > Administration. 2. Click Certificate Check.
3. To enable client certificate checking and CAC support on the SonicWall Security Appliance, select Enable Client Certificate Check. If you enable this option, the other options become available. A warning confirmation message displays:
4. Click OK. 5. To activate the client certification cache, select Enable Client Certificate Cache.
NOTE: The cache expires 24 hours after being enabled. 6. To specify from which certificate field the user name is obtained, choose an option from User Name Field:
l Subject: Common Name (default) l Sub Alt: Email l Sub Alt: Microsoft Universal Principal Name 7. To select a Certification Authority (CA) certificate issuer, choose one from the Client Certificate Issuer drop-down menu. The default is thawte Primary Root CA – G3. NOTE: If the appropriate CA is not listed, you need to import that CA into the SonicWall Security Appliance. See Managing Certificates section. 8. To select how to obtain the CAC user group membership and, thus, determine the correct user privilege, choose from the CAC user group memberships retrieve method drop-down menu:
SonicOS 7.1 Device Settings Administration Guide 38 System Administration

l Local Configured (default) ­ If selected, you should create local user groups with proper memberships.
l From LDAP ­ If selected, you need to configure the LDAP server. (see Configuring the SonicWall for LDAP section in SonicOS 7.0 Users document available at https://www.sonicwall.com/support/technical-documentation/.
9. To enable the Online Certificate Status Protocol (OCSP) check to verify the client certificate is still valid and has not been revoked, select Enable OCSP Checking. When this option is enabled, the OCSP Responder URL field displays and the Enable periodic OCSP Check option displays.
Enter the URL of the OSCP server that verifies the status of the client certificate in the OCSP Responder URL field. The OCSP Responder URL is usually embedded inside the client certificate and does not need to be entered. If the client certificate does not have an OCSP link, you can enter the URL link. The link should point to the Common Gateway Interface (CGI) on the server side, which processes the OCSP checking. For example: http://10.103.63.251/ocsp. 10. To enable a periodic OCSP check for the client certificate for verifying that the certificate is still valid and has not been revoked:
a. Select Enable periodic OCSP Check. The OCSP check interval field becomes available. b. Enter the interval between OCSP checks, in hours, in the OCSP check interval 1~72 (in hours)
field. The minimum interval is 1 hour, the maximum is 72 hours, and the default is 24 hours. 11. Click Accept.
Using the Client Certificate Check
If you use the client certificate check without a CAC, you must manually import the client certificate into the browser. If you use the Client Certificate Check with a CAC, the client certificate is automatically installed on the browser by middleware. When you begin a management session through HTTPS, a certificate selection window asks you to confirm the certificate. After you select the client certificate from the drop-down menu, the HTTPS/SSL connection is resumed, and the SonicWall Security Appliance checks the Client Certificate Issuer to verify that the client certificate is signed by the CA. If a match is found, the administrator login page displays. If no match is found, the browser displays a standard browser connection fail message, such as:
SonicOS 7.1 Device Settings Administration Guide 39 System Administration

…..cannot display web page! If OCSP is enabled, before the administrator login page is displayed, the browser performs an OCSP check and displays the following message while it is checking. Client Certificate OCSP Checking….. If a match is found, the administrator login page is displayed, and you can use your administrator credentials to continue managing the SonicWall Security Appliance. If no match is found, the browser displays: OCSP Checking fail! Please contact system administrator!
Checking Certificate Expiration
To activate periodic checks of certificate’s expiration: 1. Navigate to Device | Settings > Administration > Certificate Check. 2. In the CHECK CERTIFICATE EXPIRATION SETTINGS section, select Enable periodic certificate expiration check. This option is selected by default. When enabled, the Certificate expiration alert interval field becomes available.
3. To set the interval between certificate checks, in hours, enter the interval in the Certificate expiration alert interval: 1 – 168 (in hours) field. The minimum time is 1 hour, the maximum is 168 hours, and the default is 168.
4. Click Accept.
Troubleshooting User Lock Out
When using the client certificate feature, these situations can lock the user out of the SonicWall Security Appliance:
l Enable Client Certificate Check is checked, but no client certificate is installed on the browser. l Enable Client Certificate Check is checked and a client certificate is installed on the browser, but either
no Client Certificate Issuer is selected or the wrong Client Certificate Issuer is selected. l Enable OSCP Checking is enabled, but either the OSCP server is not available or a network problem is
preventing the SonicWall Security Appliance from accessing the OSCP server. To restore access to a user who is locked out, the following CLI commands are provided:
SonicOS 7.1 Device Settings Administration Guide 40 System Administration

l web-management client-cert disable l web-management ocsp disable

Selecting a Language

If your firmware contains other languages besides English, one can be selected from Language Selection. NOTE: Changing the language of the SonicOS Management Interface requires that the SonicWall Security Appliance be rebooted.
To select a language for the Management Interface: 1. Navigate to Device | Settings > Administration. 2. Click Language.
3. In the LANGUAGE section, select the appropriate language from the Language Selection drop-down box.
4. Click Accept.
SonicOS 7.1 Device Settings Administration Guide 41 System Administration

5
Configuring Time Settings
The Device | Settings > Time page provides a way to define the time and date settings used to time stamp log events, to automatically update SonicWall Security Services, and for other internal purposes.
By default, the SonicWall security appliance uses an internal list of public NTP servers to update the time automatically. Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network of computers. NTP uses Coordinated Universal Time (UTC) to synchronize computer clock times to a millisecond, and sometimes to a fraction of a millisecond.
SonicOS 7.1 Device Settings Administration Guide 42 Configuring Time Settings

Setting System Time
You set the system time in the Settings screen of the Device | Settings > Time page.
To set the system time: 1. Navigate to Device | Settings > Time. 2. On the Settings screen, select the time zone you are in from the Time Zone drop-down list. 3. To set the time automatically, select Set time automatically using NTP to use NTP (Network Time Protocol) servers from an internal list. This option is selected by default. 4. To set the time manually: a. Clear Set time automatically using NTP. The Date/Time option becomes available. b. Click the calendar icon in the Date/Time field to display the calendar. c. Select the date, hour, minute, and seconds in the calendar. d. Click away from the calendar to accept the settings.
SonicOS 7.1 Device Settings Administration Guide 43 Configuring Time Settings

5. To enable automatic adjustments for daylight savings time, select Automatically adjust clock for daylight saving time. For those areas that observe daylight savings time, this option is selected by default.
6. To use universal time (UTC) rather than local time for log events, select Display UTC in logs (instead of local time). This option is not selected by default.
7. To display the date in International format, with the day preceding the month, select Display date in International format.
8. To use the manually entered list of NTP servers to set the firewall clock rather than the internal list of NTP servers, select Only use custom NTP servers. IMPORTANT: Select this option only if you have configured one or more NTP servers. For more information about NTP servers, see Configuring NTP Settings.
9. Click Accept.
Configuring NTP Settings
Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network of computers. NTP uses Coordinated Universal Time (UTC) to synchronize computer clock times to a millisecond, and sometimes, to a fraction of a millisecond.
TIP: The SonicWall security appliance uses an internal list of NTP servers, so manually entering a NTP server is optional.
SonicOS 7.1 Device Settings Administration Guide 44 Configuring Time Settings

Using a Custom NTP Server for Updating the Firewall Clock
To use a local server to set the firewall clock: 1. Navigate to Device | Settings > Time. 2. Add one or more NTP servers as described in Adding an NTP Server. 3. Select Only use custom NTP servers (see Setting System Time). This option is not selected by default. 4. To configure the frequency for the NTP server to update the firewall, enter the interval in Update Interval every (minutes). The default value is 60 minutes. The range is 5 to 99,999 minutes. 5. Click Accept.
Adding an NTP Server
To add an NTP server to the firewall configuration: 1. Click NTP Servers tab on Device | Settings > Time page. 2. Click the +Add button. The Add NTP Server dialog is displayed. 3. Type the IP address of the remote NTP server in the NTP Server field.
SonicOS 7.1 Device Settings Administration Guide 45 Configuring Time Settings

4. Select the authentication type from the NTP Auth Type drop-down list: a. No Auth – Authentication is not required and the following three options are dimmed. Go to Step 8. b. MD5 – Authentication is required and the following three options are active.
5. Enter the Trust Key number in the Trust Key No field. The minimum is 1 and the maximum is 65535. 6. Enter the Key number in the Key Number field. The minimum is 1 and the maximum is 65535. 7. Enter the password in the Password field. 8. Click Add. A Success message is displayed. 9. Click Close to return to the NTP Servers screen. The NTP Server table shows the added server.
Editing an NTP Server Entry
To edit an NTP server entry: 1. Navigate to the NTP Servers screen on Device | Settings > Time page. 2. In the NTP Server table, hover over the row with the NTP server and click the Edit icon. The Add NTP Server dialog opens, displaying the current settings for the server. 3. Make the changes. For more information, see Adding an NTP Server. 4. Click Edit.
Deleting NTP Server Entry
To delete an NTP server entry: 1. Navigate to the NTP Servers screen on Device | Settings > Time. 2. In the NTP Server table, hover over the row with the NTP server and click the Delete icon. 3. Click OK.
To delete multiple NTP servers: 1. Navigate to the NTP Servers screen on Device | Settings > Time. 2. Select the checkboxes next to the NTP servers that you want to delete. NOTE: To delete all the NTP servers, select the checkbox next to NTP Server table title.
SonicOS 7.1 Device Settings Administration Guide 46 Configuring Time Settings

3. Click the Delete button at the top right of the table. 4. Click OK.
SonicOS 7.1 Device Settings Administration Guide 47 Configuring Time Settings

6
Managing Certificates
To implement the use of certificates for VPN policies, you must locate a source for a valid CA certificate from a third-party CA service. When you have a valid CA certificate, you can import it into the firewall to validate your Local Certificates. You import the valid CA certificate into the firewall using the Device | Settings > Certificates page. After you import the valid CA certificate, you can use it to validate your local certificates. SonicOS provides a large number of certificates with the SonicWall network security appliance; these are built-in certificates and cannot be deleted or configured. SonicOS supports a local Certificate Revocation List (CRL), which is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their scheduled expiration date and should no longer be trusted. For further information about local CRL, contact Technical Support.
About Digital Certificates
A digital certificate is an electronic means to verify identity by a trusted third party known as a Certificate Authority (CA). The X.509 v3 certificate standard is a specification used with cryptographic certificates and allows you to define extensions that you can include with your certificate. SonicWall has implemented this standard in its thirdparty certificate support. You can use a certificate signed and verified by a third-party CA to use with an IKE (Internet Key Exchange) VPN policy. IKE is an important part of IPsec VPN solutions, and it can use digital certificates to authenticate peer devices before setting up Security Associations (SAs). Without digital certificates, VPN users must authenticate by manually exchanging shared secrets or symmetric keys. Devices or clients using digital signatures do not require configuration changes every time a new device or client is added to the network. A typical certificate consists of two sections: a data section and a signature section. The data section typically contains information such as the version of X.509 supported by the certificate, a certificate serial number, information about the user’s public key, the Distinguished Name (DN), validation period for the certificate, and optional information such as the target use of the certificate. The signature section includes the cryptographic algorithm used by the issuing CA, and the CA digital signature. SonicWall Security Appliances interoperate with any X.509v3-compliant provider of Certificates. SonicWall Security Appliance have been tested with the following vendors of Certificate Authority Certificates:
l Entrust l Microsoft
SonicOS 7.1 Device Settings Administration Guide 48 Managing Certificates

l OpenCA l OpenSSL and TLS l VeriSign Topics:
l About the Certificates Table l Importing Certificates l Deleting Certificates l Generating a Certificate Signing Request l Configuring Simple Certificate Enrollment Protocol
About the Certificates Table

The Certificates page provides all the settings for managing CA and Local Certificates. The table on the Certificates page displays this information about certificates:

Column CERTIFICATE TYPE

Information displayed
Name of the certificate. Type of certificate:
l CA certificate l Local certificate l Pending request

SonicOS 7.1 Device Settings Administration Guide 49 Managing Certificates

Column VALIDATED
Expires

Information displayed
Validation information:
l Blank l Self-signed l Expire in n days l Expired
Date and time the certificate expires.

About Certificate Details
Clicking on the certificate’s row in the table displays information about the certificate, which might include the following, depending on the type of certificate:

l Signature Algorithm l Certificate Issuer l Subject Distinguished Name l Public Key Algorithm l Certificate Serial Number l Valid from l Expires On l CRL Status (for Pending requests and local certificates) The details depend on the type of certificate Certificate Issuer, Certificate Serial Number, Valid from, and Expires On are not shown for Pending requests as this information is generated by the Certificate provider.
Importing Certificates
After your CA service has issued a Certificate for your Pending request, or has otherwise provided a Local Certificate, you can import it for use in VPN or Web Management authentication. CA Certificates might also be imported to verify local Certificates and peer Certificates used in IKE negotiation.
SonicOS 7.1 Device Settings Administration Guide 50 Managing Certificates

Topics: l Importing a Certificate Authority Certificate l Importing a Local Certificate l Creating a PKCS-12 Formatted Certificate File (Linux Systems Only)
Importing a Local Certificate
To import a certificate from a certificate authority: 1. Navigate to Device | Settings > Certificates. 2. Click Import. The IMPORT CERTIFICATE dialog is displayed.
3. Enter a certificate name in the Certificate Name field. 4. Enter the password used by your Certificate Authority to encrypt the PKCS#12 file in the Certificate
Management Password field. 5. Click Add File to locate the certificate file. 6. Select the certificate and click Open. 7. Click Import to import the certificate into the firewall. When it is imported, you can view the certificate entry
in the Certificates table. 8. Click the certificate displayed on the Certificates page, to know the status and other details.
SonicOS 7.1 Device Settings Administration Guide 51 Managing Certificates

Importing a Certificate Authority Certificate
To import a local certificate: 1. Navigate to Device | Settings > Certificates. 2. Click Import. The IMPORT CERTIFICATE dialog is displayed.
3. Choose Import a CA certificate from a PKCS#7 (*.p7b) or DER (.der or .cer) encoded file. The Import Certificate dialog settings change.
4. Click Add File and locate the certificate file. 5. Click Open. 6. Click Import to import the certificate into the firewall. When it is imported, you can view the certificate entry
in the Certificates table. 7. Click the certificate displayed on the Certificates page, to know the status and other details.
Creating a PKCS-12 Formatted Certificate File (Linux Systems Only)
A PKCS12-formatted certificate file can be created using Linux system with OpenSSL. To create a PKCS-12 formatted certificate file, one needs to have two main components of the certificate:
l Private key (typically a file with .key extension or the word key in the filename) l Certificate with a public key (typically a file with .crt extension or the word cert as part of filename).
SonicOS 7.1 Device Settings Administration Guide 52 Managing Certificates

For example, the Apache HTTP server on Linux has its private key and certificate in these locations: l /etc/httpd/conf/ssl.key/server.key l /etc/httpd/conf/ssl.crt/server.crt
With these two files available, run the following command: openssl pkcs12 -export -out out.p12 -inkey server.key -in server.crt In this example out.p12 become the PKCS-12 formatted certificate file and server.key and server.crt are the PEM-formatted private key and the certificate file respectively. After running the openssl command, you are prompted for the password to protect/encrypted the file. After choosing the password, the creation of the PKCS-12-formatted certificate file is complete, and it can be imported into the appliance.
SonicOS 7.1 Device Settings Administration Guide 53 Managing Certificates

Deleting Certificates
NOTE: Built-in certificates cannot be deleted. You can delete an imported certificate if it has expired or if you decide not to use third-party certificates for VPN authentication. You can always delete certificates you created. To delete a certificate:
1. Navigate to Device | Settings > Certificates. 2. Hover over the certificate and click the Delete icon. To delete multiple certificates: 1. Navigate to Device | Settings > Certificates. 2. Select the certificates that you want the delete by selecting the checkbox(es) next to the certificates.
TIP: To select all the certificates, select the checkbox next to the Certificate column in the header row. 3. Click the Delete icon at the top of the table.
SonicOS 7.1 Device Settings Administration Guide 54 Managing Certificates

Generating a Certificate Signing Request
You should create a Certificate Policy to be used in conjunction with local certificates. A Certificate Policy determines the authentication requirements and the authority limits required for the validation of a certificate. To generate a certificate signing request:
1. Navigate to Device | Settings > Certificates. 2. Click New Signing Request. The Certificate dialog is displayed.
3. Enter an alias name for the certificate in the Certificate Alias field. 4. Create a Distinguished Name (DN) using the drop-down menus shown in table below, then enter
information for the certificate in the associated fields.
SonicOS 7.1 Device Settings Administration Guide 55 Managing Certificates

NOTE: For each DN, you can select your country from the associated drop-down menu; for all other components, enter the information in the associated field.
SonicOS 7.1 Device Settings Administration Guide 56 Managing Certificates

Drop-down menu Country State
Locality, City, or County Company or Organization
Department
Group
Team Common Name

Select appropriate information
Country (default) State Locality or County Company or Organization
Country State (default) Locality, City, or County Company or Organization Department
Locality, City, or County (default) Company or Organization Department Group Team
Company or Organization (default) Department Group Team Common Name Serial Number E-Mail Address
Department (default) Group Team Common Name Serial Number E-Mail Address
Group (default) Team Common Name Serial Number E-Mail Address
Team (default) Common Name Serial Number E-Mail Address
Common Name (default) Serial Number E-Mail Address

SonicOS 7.1 Device Settings Administration Guide 57 Managing Certificates

As you enter information for the components, the Distinguished Name (DN) is created in the Subject Distinguished Name field.

5. Optionally, you can also attach a SUBJECT ALTERNATIVE NAME to the certificate after selecting the type from the drop-down menu:
l Domain Name l Email Address l IPv4 Address
6. Select a signature algorithm from the Signature Algorithm drop-down menu:
l SHA1 (default) l MD5 l SHA256 l SHA384 l SHA512
7. Select a subject key type from the Subject Key Type drop-down menu:

RSA (default) ECDSA

A public key cryptographic algorithm used for encrypting data,
Encrypts data using the Elliptic Curve Digital Signature Algorithm, which has a high strength-per-key-bit security.

8. Select a subject key size or curve from the Subject Key Size/Curve drop- down menu.
NOTE: Not all key sizes or curves are supported by a Certificate Authority, therefore, you should check with your CA for supported key sizes.

SonicOS 7.1 Device Settings Administration Guide 58 Managing Certificates

IF YOU SELECTED A KEY TYPE OF

RSA, select a key size
1024 bits (default) 1536 bits 2048 bits 4096 bits

ECDSA, select a curve prime256vi: X9.62.SECG curve over a 256 bit prime field (default) secp384r1: NIST/SECG curve over a 384 bit prime field secp521r1: NIST/SECG curve over a 521 bit prime field

9. Click Generate to create a certificate signing request file.
When the Certificate Signing Request is generated, a message describing the result is displayed and a new entry appears in the Certificates table with the type Pending request.

10. Click the Export icon. The Export Certificate Request dialog is displayed.

11. Click the Export icon to download the file to your computer. An Opening

dialog displays. 12\. Click OK to save the file to a directory on your computer. You have generated the Certificate Request that you can send to your Certificate Authority for validation. 13\. Click the Upload icon to upload the signed certificate for a signing request. The Upload Certificate dialog is displayed.

14. Click Choose File to select a file. 15. Select the file and click Open. 16. Click UPLOAD.

SonicOS 7.1 Device Settings Administration Guide 59 Managing Certificates

Configuring Simple Certificate Enrollment Protocol
The Simple Certificate Enrollment Protocol (SCEP) is designed to support the secure issuance of certificates to network devices in a scalable manner. There are two enrollment scenarios for SCEP:
l SCEP server CA automatically issues certificates. l SCEP request is set to PENDING and the CA administrator manually issues the certificate. More information about SCEP can be found at: http://tools.ietf.org/html/draft- nourse-scep-18 (Cisco Systems’ Simple Certificate Enrollment Protocol draft- nourse-scep-18). To use SCEP to issue certificates: 1. Generate a signing request as described in Generating a Certificate Signing Request. 2. On the Certificates page, Click SCEP.
The SCEP Configuration dialog is displayed.
3. From CSR List, SonicOS selects a default CSR list automatically. If you have multiple CSR lists configured, you can modify this.
4. In the CA URL field, enter the URL for the Certificate authority. 5. If the Challenge Password(optional) field, enter the password for the CA if one is required. 6. In the Request Count field, enter the number of requests. The default value is 256. 7. In the Polling Interval(S) field, you can modify the default value for duration of time, in seconds, between
the sending of polling messages. the default value is 30 seconds.
SonicOS 7.1 Device Settings Administration Guide 60 Managing Certificates

8. In the Max Polling Time(S) field, you can modify the default value for the duration of time, in seconds, the firewall waits for a response to a polling message before timing out. The default value is 28800 seconds (8 hours).
9. Click SCEP to submit the SCEP enrollment. The firewall contacts the CA to request the certificate. The time this takes depends on whether the CA issues certificates automatically or manually. After the certificate is issued, it is displayed in the list of available certificates on the Device | Settings > Certificates page, under the Imported certificates and requests or All certificates category.
SonicOS 7.1 Device Settings Administration Guide 61 Managing Certificates

7
Administering SNMP
You can manage the SonicWall security appliance using SNMP or SonicWall Global Management System (GMS). This section describes how to configure the SonicWall for management using SNMP. For information about managing the SonicWall appliance with GMS, see the SonicWall GMS and SonicWall Management Services administration documentation, available at https://www.sonicwall.com/support/technicaldocumentation.
Topics: l About SNMP l Setting Up SNMP Access l Configuring SNMP as a Service and Adding Rules
About SNMP
SNMP (Simple Network Management Protocol) is a network protocol used over User Datagram Protocol (UDP) that allows network administrators to monitor the status of the SonicWall Security Appliance and receive notification of critical events as they occur on the network. The SonicWall Security Appliance supports SNMP v1/v2c/v3 and all relevant Management Information Base II (MIB- II) groups except egp and at. SNMPv3 expands on earlier versions of SNMP and provides secure access to network devices by means of a combination of authenticating and encrypting packets. Packet security is provided through:
l Message Integrity: ensures a packet has not been tampered with in transit l Authentication: verifies a message comes from a valid source l Encryption: encodes packet contents to prevent its being viewed by an unauthorized source. SNMPv3 provides for both security models and security levels. A security model is an authentication strategy set up between a user and the group in which the user resides. The security level is the permitted level of security within a given security model. The security model and associated security level determine how an SNMP packet is handled. SNMPv3 provides extra levels of authentication and privacy, as well as additional authorization and access control.
SonicOS 7.1 Device Settings Administration Guide 62 Administering SNMP

Security Level, Authentication, and Encryption Based on SNMP Version shows how security levels, authentication, and encryption are handled by the different versions of SNMP.

SECURITY LEVEL, AUTHENTICATION, AND ENCRYPTION BASED ON SNMP VERSION

Version Level

v1

noAuthNoPriv

v2c

noAuthNoPriv

noAuthNoPriv

authNoPriv

v3

authPriv

Authentication Type Community String Community String Username MD5 or SHA
MD5 or SHA

Encryption Means of Authentication

No

Community string match

No

Community string match

No

Username match

No

Authentication is based on the HMAC-

MD5 or HMSC-SRA algorithms.

DES or AES Provides authentication is based on the HMAC-MD5 or HMSC-SRA algorithms. Provides DES 56-bit encryption in addition to authentication based on the CBC-DES (DES-56) standard, or AES 128-bit encryption, as well.

The SonicWall Security Appliance replies to SNMP Get commands for MIB-II, using any interface, and supports a custom SonicWall MIB for generating trap messages. The custom SonicWall MIB is available for download from the SonicWall Web site and can be loaded into third-party SNMP management software such as HP Openview, Tivoli, or SNMPC.
You can view and configure SNMP settings. Settings cannot be viewed or modified by the user. SNMPv3 can be modified at the User or Group level. Access Views can be read, write, or both, and can be assigned to users or groups. A single View can have multiple Object IDs (OIDs) associated with it.
SNMPv3 settings for the SNMPv3 Engine ID are configurable under the General menu of the Configure SNMP view dialog. The Engine ID is used to authorize a received SNMP packet. Only matching packet EngineIDs are processed.

Setting Up SNMP Access
Setting up SNMP consists of: l Enabling and Configuring SNMP Access l Setting Up SNMPv3 Groups and Access
Enabling and Configuring SNMP Access
You can use either SNMPv1/v2 for basic functionality or configure the SonicWall security appliance to use the more extensive SNMPv3 options. To use SNMP, you must first enable it.
SonicOS 7.1 Device Settings Administration Guide 63 Administering SNMP

Topics: l Configuring Basic Functionality l Configuring SNMPv3 Engine IDs l Configuring Object IDs for SNMPv3 Views l Creating Groups and Adding Users and Access l Adding Access
Configuring Basic Functionality
To enable SNMP: 1. Navigate to Device | Settings > SNMP. 2. Select Enable SNMP. By default, SNMP is disabled.
3. Click Accept. The SNMP information is populated on the SNMP page, and Configure becomes available. 4. To configure the SNMP interface, click Configure. The Configure SNMP View dialog is displayed.
SonicOS 7.1 Device Settings Administration Guide 64 Administering SNMP

5. On the General page, enter the host name of the SonicWall security appliance in the System Name field. 6. Optionally, enter the network administrator’s name in the System Contact field. 7. Optionally, enter an email address, telephone number, or pager number in the System Location field. 8. If the SNMPv3 configuration option is used, enter an asset number in the Asset Number field. Otherwise,
this field is optional. 9. Enter a name for a group or community of administrators who can view SNMP data in the Get
Community Name field. 10. Optionally, enter a name for a group or community of administrators who can view SNMP traps in the Trap
Community Name field. 11. Enter the IP address(es) or host name(s) of the SNMP management system receiving SNMP traps in the
Host 1 through Host n fields. You must configure at least one IP address or host name, but up to the maximum number of addresses or host names for your system can be used. 12. If you:
l Want to set up SNMPV3, go to Configuring SNMPv3 Engine IDs . l Finished setting up SNMP for now, click Add.
Configuring SNMPv3 Engine IDs
If SNMPv3 is used, you can configure the SNMPv3 Engine ID and SNMP priority. Configuring the SNMPv3 Engine ID provides maximum security for SNMP management.
SonicOS 7.1 Device Settings Administration Guide 65 Administering SNMP

To configure SNMPv3 engine IDs: 1. Navigate to Device | Settings > SNMP. 2. If you have not configured SNMP for your system, follow Step 1 through Step 11 in Configuring Basic Functionality. 3. Click Advanced.
4. Select Mandatory Require SNMPv3. This disables SNMPv1/v2 and allows only SNMPv3 access, which provides maximum security for SNMP management. IMPORTANT: If you select this option, you must specify an asset number on the General page before clicking OK.
5. Enter the hexadecimal Engine ID number in the Engine ID field. SonicOS automatically populates this field, but you can change it. This number is matched against received SNMP packets to authorize their processing; only packets whose Engine ID matches this number are processed.
6. Optionally, enable Increase SNMP subsystem priority. For efficient system operation, certain operations might take priority over responses to SNMP queries. Enabling this option causes the SNMP subsystem to always respond and operate at a higher system priority. IMPORTANT: Enabling this option might affect the performance of the overall system.
7. Click OK. The SNMPv3 security options are now used in processing packets.
Configuring Object IDs for SNMPv3 Views
The SNMPv3 View shows access settings for Users and Groups. You create settings for users and groups, and these security settings are not user- modifiable. The SNMPv3 View defines the Object IDs (OID) and Object ID Groups, and is sometimes known as the SNMPv3 Access Object.
SonicOS 7.1 Device Settings Administration Guide 66 Administering SNMP

The SNMP View defines a collection of OIDs and OID groups. The initial set of default views cannot be changed or deleted. The default views reflect the most often used views, such as the root view, system view, IP, interfaces. The OIDs for these views are pre-assigned. Additionally, you can create a custom view for specific users and groups. You can modify any views that you create. You cannot modify the ones the system creates. To configure OIDs for SNMPv3 views:
1. Navigate to Device | Settings > SNMP. 2. Click View.
3. In the View page, click + Add. The View Name dialog box is displayed.
4. Enter a meaningful name in the View Name field. 5. Click Add OID to add OID to the View being created. The Add SNMP OID dialog is displayed. 6. Enter name in the OID Name field and click OK.
The OIDs associated with the View Name is listed in the OID table. To delete an OID from the OID List, hover over the OID and click Delete. 7. Add any more OIDs to associate with the View. 8. Click OK. The new view is displayed in the View page.
SonicOS 7.1 Device Settings Administration Guide 67 Administering SNMP

Setting Up SNMPv3 Groups and Access
SNMPv3 allows you to set up and assign groups and access with differing levels of security. Object IDs are associated with various levels of permissions, and a single view can be assigned to multiple objects. SNMPv3 group and user access shows how access for groups and users are associated with these different permission levels.
Creating Groups and Adding Users and Access
Topics: l Creating a Group l Adding Users l Adding Access
Creating a Group
To create a group: 1. Navigate to Device | Settings > SNMP. 2. Click User/Group. 3. Click Add Group.
SonicOS 7.1 Device Settings Administration Guide 68 Administering SNMP

4. In the Add SNMP Group dialog, enter the name in the Group Name field. The group name can contain up to 32 alphanumeric characters.
5. Click OK The table in the User/Group page is updated to display the newly added group.
Adding Access
SNMPv3 Access is an object that: l Defines the read/write access rights of an SNMPv3 View. l Can be assigned to an SNMPv3 Group.
Multiple groups can be assigned to the same Access object. An Access object can also have multiple views assigned to it. To create an access object:
1. Navigate to Device | Settings > SNMP. 2. Click Access. 3. Click + Add.
The Access Name dialog is displayed.
4. Enter a friendly name in the Access Name field. 5. From Read View, select a view from the list of available views.
SonicOS 7.1 Device Settings Administration Guide 69 Administering SNMP

6. From Master SNMPv3 Group, select a group from the list of available groups. NOTE: Access can be assigned to only one SNMPv3 group, but a group can be associated with multiple Access objects.
7. From Access Security Level, select a security level: l None l Authentication Only l Authentication and Privacy
8. Click OK. The Access object is added to the table in the Access page.
Adding Users
To add users: 1. Navigate to Device | Settings > SNMP. 2. Click User/Group. 3. Click Add Name.
4. Enter the user name in the User Name field. 5. Select a security level from Security Level:
l None (default) l Authentication only ­ Two new options appear:
l Authentication Method ­ Select one of these authentication methods: MD5 or SHA1. l Authentication Key ­ Enter an authentication key in the field. The key can be any string of
8 to 32 printable characters
SonicOS 7.1 Device Settings Administration Guide 70 Administering SNMP

l Authentication and Privacy ­ More options appear: l Select an encryption method from the Encryption Method drop-down menu: AES or DES. l Enter the encryption key in the Privacy Key field. The key can be any string of 8 to 32 printable characters.
6. Select a group from Group dropdown box. 7. Click OK.The user is added to the User/Group table and added to the appropriate group.
Configuring SNMP as a Service and Adding Rules
By default, SNMP is disabled on the SonicWall Security Appliance. To enable SNMP, you must first enable SNMP on the Device | Settings > SNMP page, and then enable it for individual interfaces. To do this, go to the NETWORK |System > Interfaces page and edit the interface to enable SNMP. For more information about configuring SNMP as a service and adding rules, see Configuring Interfaces section in the SonicOS 7.0 System document. If your SNMP management system supports discovery, the SonicWall Security Appliance agent automatically discovers the SonicWall Security Appliance on the network. Otherwise, you must add the SonicWall Security Appliance to the list of SNMP- managed devices on the SNMP management system.
SonicOS 7.1 Device Settings Administration Guide 71 Administering SNMP

8
Firmware Settings
Topics: l Firmware Management and Backup l Creating a Backup Firmware Image l Updating Firmware l Importing and Exporting Settings l Configuring Firmware and Backup Settings
Firmware Management and Backup
The Device | Settings > Firmware and Settings page provides settings that allow for easy firmware upgrade and preferences management.
The Firmware & Backups page allows you to: l Create and schedule backups; see Creating a Backup Firmware Image. l View local, cloud backups; see Creating a Backup Firmware Image
SonicOS 7.1 Device Settings Administration Guide 72 Firmware Settings

l Search the listed backups; see Searching the Table. l Import and export configurations; see Importing Settings and Exporting Settings. l Upload firmware images and system settings; see Updating Firmware. l Configure settings; see Configuring Firmware and Backup Settings. l Boot to your choice of firmware and system settings; see Updating Firmware.
Firmware Management & Backup Tables
Topics: l Local Table l Cloud Table l Show Configuration Files Table
Local Table
The Local section of the Firmware Management & Backup table displays:
l FIRMWARE VERSION – firmware currently loaded on the firewall l FIRMWARE LOAD DATE – the date and time the firmware was installed on the appliance l FIRMWARE BUILD DATE – the date and time the firmware was created l CONFIGURATION DATE – the date and time when the configuration of the appliance was last updated l USERNAME- the user who installed or updated the firmware l COMMENTS – an Information icon that, when moused over, displays information about the firmware or
backup file. If you did not specify a comment when creating a backup, a default comment is displayed: l This is the current firmware l This is the local backup l Custom comment
l BOOT- clicking the Boot icon displays whether to reboot the firewall with the current or factory default configuration:
CAUTION: Clicking Boot next to any firmware image overwrites the existing current firmware image making it the Current Firmware image. CAUTION: When uploading firmware to the firewall, you must not interrupt the Web browser by closing the browser, clicking a link, or loading a new page. If the browser is interrupted, the firmware may become corrupted.
SonicOS 7.1 Device Settings Administration Guide 73 Firmware Settings

l FIRMWARE ACTIONS – displays the Download icon; clicking the icon saves the firmware to a new location on your computer or network. Only uploaded firmware can be saved to a different location
Cloud Table
The Cloud table of the Firmware and Settings page displays the: l Firmware Version – firmware backed up to the cloud. Up to 3 versions of each firmware are listed. l Firmware Load Date – the date and time the firmware was installed on the appliance l Firmware Build Date – the date and time the firmware was created l Username – the user who installed or updated the firmware l Comment – Displays information about the firmware or backup file. If you did not specify a comment when creating a backup, a default comment is displayed: l Automated backup l This is the cloud backup firmware l Custom comment
Show Configuration Files Table
Clicking the arrow mark next to firmware version displays information about the backup files on the cloud for that firmware version.

CONFIGURATION VERSION CONFIGURATION DATE BACKUP TYPE

Version number of the backup file. Date the backup file was created. Type of backup, Auto or Manual, as well as these icons:

SonicOS 7.1 Device Settings Administration Guide 74 Firmware Settings

COMMENTS USERNAME BOOT
Configuration Actions

l Retain Configuration File ­ selecting this icon prevents the backup file from being overwritten during an auto or manual backup.
l Gold Master ­ selecting this icon designates the backup file as the Gold Master backup file, that is, the combination prefs file and firmware image combination you can designate as the most stable configuration. When you designate an entry as a gold master, it cannot be deleted or unpinned until or unless you designate it as a non-gold, standard file. This protects your most stable version. Only one backup can be a gold standard.
Displays information about the firmware or backup file. If you did not specify a comment when creating a backup, a default comment is displayed:
l Automated backup l This is the cloud backup firmware l Custom comment
User who installed or updated the firmware.
Clicking the Boot icon displays whether to reboot the firewall with the current or factory default configuration:
CAUTION: Clicking Boot next to any firmware image overwrites the existing current firmware image making it the Current Firmware image.
CAUTION: When uploading firmware to the firewall, you must not interrupt the Web browser by closing the browser, clicking a link, or loading a new page. If the browser is interrupted, the firmware may become corrupted.
Displays icons:
l Download ­ Saves the firmware to a new location on your computer or network. Only uploaded firmware can be saved to a different location
l Edit Comment ­ Allows you to edit the default or custom comment.
l Delete ­ Deletes the backup file.

Searching the Table
You can search the backup tables with the Search function. Although the Search function applies to all tables, results are displayed only for visible tables. For example, to see the results of the various Show Configuration Files tables, you must display them one by one.

SonicOS 7.1 Device Settings Administration Guide 75 Firmware Settings

To search the tables: 1. Navigate to Device | Settings > Firmware and Settings. 2. Enter the search criterion in the Search field.
The results are highlighted in the table.
Creating a Backup Firmware Image
When you click Create Backup, the SonicWall security appliance takes a snapshot of your current system state, firmware, and configuration preferences, and makes the snapshot the new System Backup firmware image. You can save backups locally or on the cloud. You can also schedule backups to occur automatically.
IMPORTANT: Creating backup overwrites the existing Backup firmware image as necessary. Use the Backup file for saving good configurations and then booting them if upgrades or future configurations cause instability or other serious issues. The configuration file is conveniently saved onboard. The date and time the file was created as well as the firmware version in use at the time is displayed in the Firmware Management & Backup table. The dates for each item listed in the Firmware Management & Backup table are the build dates for the firmware images themselves. You can create a backup of your current configuration settings on the appliance to be used with the current firmware version or with a newly uploaded firmware version. Topics:
l Creating a Local Backup Firmware Image l Creating a Cloud Backup Firmware Image l Scheduling Firmware Image Backups
Creating a Local Backup Firmware Image
To create a local backup file: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Create Backup > Local Backup.
SonicOS 7.1 Device Settings Administration Guide 76 Firmware Settings

3. In the Local Backup dialog, do the following to create a backup:
a. Enabling Retain Local Backup option for local backup helps to retain configuration file so it is not overwritten during auto or local backup. To retain local backup, enable Retain Local Backup.
b. Enter comments in the Comments field. c. Click OK. The backup image created on local storage is listed under LOCAL section. NOTE: you must perform these steps each time for a local backup.
Creating a Cloud Backup Firmware Image
To create a cloud backup file: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Cloud Backups. 3. If Cloud Backup has never been enabled, enable Cloud Backup. 4. Click Create Backup > Cloud Backup.
5. Select Retain Cloud Backup if you want this backup configuration file saved and not overwritten when you create additional backup configuration files on the cloud.
SonicOS 7.1 Device Settings Administration Guide 77 Firmware Settings

6. You can use the Comment field to optionally create a comment associated with the backup configuration file to make it easier to identify later.
7. Click OK. It may take a few minutes to create the backup file.
Scheduling Firmware Image Backups
NOTE: Cloud Backup must be enabled before you can schedule backups of your firmware configuration file. This feature is not supported for Local Backup. To schedule a backup: 1. Navigate to Device | Settings > Firmware and Settings. 2. ClickCloud Backups. 3. If Cloud Backup has never been enabled, enableCloud Backup. 4. Click Create Backup > Schedule Backup.
The Schedule Backup dialog is displayed.
SonicOS 7.1 Device Settings Administration Guide 78 Firmware Settings

5. Set the options for the backup you want to create: l To schedule a one- time backup, see Scheduling a One-Time Backup l To schedule a recurring backup, see Scheduling Recurring Backups l To schedule a mixed backup schedule, select Mixed and configure the settings based on the procedure explained in Scheduling a One-Time Backup and Scheduling Recurring Backups. This schedule occurs repeatedly during the same configured hours and days of the week, between the configured start and end dates.
Scheduling a One-Time Backup
To schedule one-time backup: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Cloud Backups. 3. If Cloud Backup has never been enabled, enable Cloud Backup. 4. Click Create Backup > Schedule Backup. 5. In the Schedule Backup page, do the following: a. Select Once as Schedule Type. b. In ONCE section, click calendar icon in Select Range field and set the schedule. c. In the Once section, set the duration during which you want the backup to be created. Select the Year, Month, Day, Hour, and Minute from the drop-down menus to set the Start and End period for the backup.
SonicOS 7.1 Device Settings Administration Guide 79 Firmware Settings

d. Click Save.
Scheduling Recurring Backups
To schedule recurring backups: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Cloud Backups. 3. If Cloud Backup has never been enabled, enable Cloud Backup. 4. Click Create Backup > Schedule Backup. 5. Select Recurring as the Schedule Type. 6. Do the following in the Recurring section:
a. Select the days on which you want the backup created. Click Select All to select all the days at once.
b. Enter the Start Time and Stop Time for the report in 24-hour format (for example, 02:00 for 2:00am and 14:00 for 2:00pm).
SonicOS 7.1 Device Settings Administration Guide 80 Firmware Settings

c. Click Add to add that report to the Schedule List. d. Repeat these steps for each scheduled backup you want to create. 7. Click Save.
Deleting Scheduled Backups
To delete selected scheduled backups: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Cloud Backups. 3. Click Create Backup > Schedule Backup. The Schedule Backup dialog is displayed. 4. Click Delete icon on the scheduled backups listed in the Schedule List section. 5. To delete all the schedules at once, click Delete icon in the header row.
Updating Firmware
You can update firmware manually or use the Firmware Auto Update feature. CAUTION: Uploading new firmware will overwrite any existing uploaded firmware image. NOTE: Before uploading new firmware, it is recommended that you create a backup of your current settings. See Creating a Backup Firmware Image for more information on creating backups of your current configuration settings.
Topics: l Updating Firmware Manually l Firmware Auto Update l Using SafeMode to Upgrade Firmware
Updating Firmware Manually
To update firmware manually: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Upload Firmware. 3. Click OK to create a backup of your current settings before uploading new firmware. The Upload Firmware dialog displays.
SonicOS 7.1 Device Settings Administration Guide 81 Firmware Settings

4. Click Browse. The File Upload dialog displays. 5. Browse to the firmware file located on your local drive. 6. Click Open. 7. Click Upload to upload the new firmware to the SonicWall security appliance. A success message
displays in the Status bar, and the Firmware Management table displays the new firmware. 8. Click the Boot icon for the firmware you just downloaded. 9. Select whether you want to install the new firmware with your current configuration or a the default
configuration. 10. Click OK. A message about the time to boot the firmware displays. 11. Click OK. A message about the boot status displays in the Status bar. 12. After the restart, when you log in again, the Device | Settings > Firmware and Settings page reflects
the firmware update.
Firmware Auto Update
SonicOS supports the Firmware Auto Update feature, which helps ensure that your SonicWall security appliance has the latest firmware release.
To set the Firmware Auto Update options: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings. The Settings popup dialog displays 3. Click Firmware Auto Update. 4. Choose either: l Enable Firmware Auto-Update – Displays an Alert icon when a new firmware release is available. This option is selected by default.
SonicOS 7.1 Device Settings Administration Guide 82 Firmware Settings

l Download new firmware automatically when available – Downloads new firmware releases to the SonicWall security appliance when they become available. This option is not selected by default.
5. Click OK.
Using SafeMode to Upgrade Firmware
To Reviewers: Please verify this topic If you are unable to connect to the SonicOS management interface, you can restart the security appliance in SafeMode. The SafeMode feature allows you to recover quickly from uncertain configuration states with a simplified management interface.
To use SafeMode to upgrade firmware: 1. Connect your computer to the X0 port on the appliance and configure your computer with an IP address on the 192.168.168.0/24 subnet, such as 192.168.168.20. 2. To force the appliance into SafeMode, use a narrow, straight object, like a straightened paper clip or a toothpick, to press and hold the Reset button on the front of the SonicWall appliance for at least twenty seconds, until the Test light begins blinking. 3. The Test light begins to blink when the SonicWall security appliance has rebooted into SafeMode. 4. Enter 192.168.1.254 into your computer’s Web browser to access the SafeMode management interface. 5. Click Upload New Firmware. 6. Browse to the location where you saved the SonicOS firmware image. 7. Select the file and click Upload. 8. Select the Boot icon in the row for one of the following: l Uploaded Firmware – New! – Use this option to restart the appliance with your current configuration settings. l Uploaded Firmware with Factory Default Settings- New! – Use this option to restart the appliance with default configuration settings. 9. In the confirmation dialog, click OK to proceed.
10. To connect to SonicOS through the LAN or WAN interface of the firewall: a. Disconnect your computer from the MGMT port. b. Either: l Reconfigure it to automatically obtain an IP address and DNS server address. l Reset it to its normal static values.
11. Connect your computer to the local network. 12. Point your browser to the LAN or WAN IP address of the SonicWall appliance.
SonicOS 7.1 Device Settings Administration Guide 83 Firmware Settings

13. After successfully booting the firmware, the log-in screen displays. If you restarted with factory default settings, enter the default user name and password (admin/password) to access the SonicOS management interface.
Importing and Exporting Settings
You can choose to import and export firmware management configuration settings. Topics:
l Importing Settings l Exporting Settings
Importing Settings
NOTE: Before importing new configuration, it is recommended to export the current configuration or upload a copy to the cloud. To import a previously saved preferences file into the firewall: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Import/Export Configuration > Import Configuration.
IMPORTANT: It is recommended that you create a backup, either locally or to the cloud, before proceeding. See Creating a Local Backup Firmware Image or Creating a Cloud Backup Firmware Image for instructions on creating a firmware configuration backup. 3. In the Import Configuration dialog, click Browse to select the previously saved preference file with the configuration settings into firewall. NOTE: The file you choose should have .exp file name extension.
SonicOS 7.1 Device Settings Administration Guide 84 Firmware Settings

4. Click Import. The active configuration will be overwritten upon import of a new configuration file. Your SonicWall appliance will reboot automatically once the import has completed.
Exporting Settings
The exported preferences file can be imported into the security appliance if it is necessary to reset the firmware. To export configuration settings from the firewall:
1. Navigate to Device | Settings > Firmware and Settings. 2. Click Import/Export Configuration > Export Configuration.
3. In the Export Configuration window, click Export. IMPORTANT: The current configuration of your SonicWall appliance is exported to a .exp file and is available in your local system. The file can be imported by the same SonicWall or used to clone a configuration across multiple SonicWall systems.

4. Click Close.

SonicOS 7.1 Device Settings Administration Guide 85 Firmware Settings

Configuring Firmware and Backup Settings
To configure firmware and backup settings: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings. The Settings dialog is displayed.
Topics: l Send Settings or Reports by FTP l Sending Diagnostic Reports to Technical Support l Firmware Auto Update l One-Touch Configuration Overrides l Enabling FIPS Mode l Enabling NDPP mode
Send Settings or Reports by FTP
You can send configuration settings and/or tech support reports (TSRs, or detailed reports of security appliance configuration and status) to a specific FTP server on a one-time or scheduled basis. By scheduling when these reports are sent to the FTP server, you can create and manage schedule objects and enforce schedule times. To send diagnostic reports to Technical Support:
1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings.
SonicOS 7.1 Device Settings Administration Guide 86 Firmware Settings

3. Click Scheduled Reports.
4. To send TSRs by FTP, select the Send Tech Support Report by FTP. This option is not selected by default.
5. To send configuration settings by FTP, select Send Settings by FTP. This option is not selected by default.
6. When either or both of the Actions settings are selected, the server fields become available. Make changes as necessary. a. Enter the server’s IP address in the FTP Server field. The default is 0.0.0.0. b. Enter the user name associated with the server in the User Name field. c. Enter the password associated with the user name in the Password field. d. Enter the directory where the reports are to be sent in the Directory field.
7. Click Set Schedule. The Settings dialog displays.
SonicOS 7.1 Device Settings Administration Guide 87 Firmware Settings

The Schedule Name is TSR Report Hours and cannot be changed. 8. Configure the schedule. For how to configure a schedule, see Scheduling Firmware Image Backups
section. 9. Click Save.
Sending Diagnostic Reports to Technical Support
To help determine system problems, you can send system diagnostics to SonicWall Technical Support. To send diagnostic reports to Technical Support:
1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings. 3. Click DIAGNOSTICS . 4. Click Send Diagnostic Reports to Support. This can take up to a minute. While sending the report, the
status bar at the bottom of the screen displays:
SonicOS 7.1 Device Settings Administration Guide 88 Firmware Settings

5. Click OK.
Boot Settings
To Reviewers: Do we have this option? I don’t see this option in Settings dialog..
To boot your SonicWall network security appliance with diagnostics enabled: 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings. The Settings dialog displays. 3. Click Boot with firmware diagnostics enabled (if available). This option is not selected by default. 4. Click Apply.
One-Touch Configuration Overrides
NOTE: Be sure to export the configuration of you SonicWall security appliance before executing a configuration override, so the current configuration may be restored. Please refer to Exporting Settings. CAUTION: Be aware that the One- Touch Configuration Overrides may change the behavior of your SonicWall security appliance. Review the list of configurations before applying One- Touch Configuration Overrides. In particular, these configurations may affect your experience:
l Administrator password requirements on the Device | Settings page l Requiring HTTPS management l Disabling HTTP-to-HTTPS redirect l Disabling Ping management
The One-Touch Configuration Overrides feature is configured on the Settings dialog available from the Device | Settings > Firmware and Settings page. It can be thought of as a quick tune-up for your SonicWall network security appliance’s security settings. With a single click, One-Touch Configuration Overrides applies over sixty configuration settings to implement SonicWall’s recommended best practices. These settings ensure that your appliance is taking advantage of SonicWall’s security features.
To override the One-Touch Configuration settings: NOTE: A system restart is required for the updates to take full effect. 1. Navigate to Device | Settings

Firmware and Settings. 2. Click Settings. The Settings dialog is displayed.
SonicOS 7.1 Device Settings Administration Guide 89 Firmware Settings

3. Scroll to the ONE-TOUCH CONFIGURATION OVERRIDES section.
l DPI and Stateful Firewall Security – For network environments with Deep Packet Inspection (DPI) security services enabled, such as Gateway Anti-Virus, Intrusion Prevention, Anti-Spyware, and App Rules.
l Stateful Firewall Security – For network environments that do not have DPI security services enabled, but still want to employ SonicWall’s stateful firewall security best practices.
Both of the One-Touch Configuration Overrides deployments implement the following configurations: l Configure Administrator security best practices l Enforce HTTPS login and disables ping l Configure DNS Rebinding l Configure Access Rules best practices l Configure Firewall Settings best practices l Configure Firewall Flood Protection best practices l Configure VPN Advanced settings best practices l Configure Log levels l Enable Flow Reporting and Visualization
The DPI and Stateful Firewall Security deployment also configures the following DPI-related configurations:
l Enable DPI services on all applicable zones l Enable App Rules l Configure Gateway Anti-Virus best practices l Configure Intrusion Prevention best practices l Configure Anti-Spyware best practices To see exactly which settings are reconfigured, click on the Preview link next to each button. A page displays with a list of each setting and the value to which it will be set.
Enabling FIPS Mode
When operating in FIPS (Federal Information Processing Standard) Mode, the SonicWall security appliances support FIPS 140-2 Compliant security. Among the FIPS-compliant features of the son include PRNG-based on SHA-1 and support of only FIPS-approved algorithms (DES, 3DES, and AES with SHA-1).
To enable FIPs and see a list of which of your current configurations are not allowed or are not present:
NOTE: The Enable FIPS Mode option cannot be enabled at the same time as the Enable NDPP Mode option, which is also on the Firmware and Settings > Settings dialog.
SonicOS 7.1 Device Settings Administration Guide 90 Firmware Settings

1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings. 3. Click FIPS/NDPP. 4. Enable the Enable FIPS Mode option.
5. Click OK. The FIPS Mode SETTING COMPLIANCE CHECKLIST dialog appears with a list of your required and not allowed configurations.
6. If your SonicWall appliance: l Complies with the checklist, go to Step 7. l Does not comply with the checklist, manually change or disable settings to be compliant with FIPS mode setting compliance checklist. TIP: Leave the checklist dialog open while you make the configuration changes. If you click OK before all required changes are complete, the Enable FIPS Mode checkbox is cleared automatically upon closing the verification dialog. Select the checkbox again to see what configuration changes are still needed for FIPS compliance.
7. Click OK to reboot the security appliance in FIPS mode. A second warning displays. 8. Click Yes to continue rebooting. To return to normal operation, clear the Enable FIPS Mode checkbox
and reboot the firewall in non-FIPS mode. CAUTION: When using the SonicWall security appliance for FIPS-compliant operation, the tamper-evident sticker that is affixed to the SonicWall security appliance must remain in place and untouched.
SonicOS 7.1 Device Settings Administration Guide 91 Firmware Settings

Enabling NDPP mode
A SonicWall network security appliance can be enabled to be compliant with Network Device Protection Profile (NDPP), but certain security appliance configurations are either not allowed or are required.
NOTE: NDPP is a part of Common Criteria (CC) certification. However, NDPP in SonicOS is not currently certified. The security objectives for a device that claims compliance to a Protection Profile are defined as: Compliant TOEs (Targets Of Evaluation) will provide security functionality that address threats to the TOE and implement policies that are imposed by law or regulation. The security functionality provided includes protected communications to and between elements of the TOE; administrative access to the TOE and its configuration capabilities; system monitoring for detection of security relevant events; control of resource availability; and the ability to verify the source of updates to the TOE. When you enable NDPP, a popup message displays with the NDPP mode setting compliance checklist. The checklist displays every setting in your current SonicOS configuration that violates NDPP compliance so that you can change these settings. You need to navigate around the SonicOS management interface to make the changes. The checklist for an appliance with factory default settings is shown in the following procedure.
To enable NDPP and see a list of which of your current configurations are not allowed or are not present::
NOTE: The Enable NDPP Mode option cannot be enabled at the same time as the Enable FIPS Mode option, which is also on the Firmware & Backups > Settings dialog. 1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings. 3. Click FIPS / NDPP. 4. Select Enable NDPP Mode.
The NDPP MODE SETTING COMPLIANCE CHECKLIST appears with a list of your required and not allowed configurations. 5. If your SonicWall appliance:
l Complies with the checklist, go to Step 6. l Does not comply with the checklist, manually change or disable settings to be compliant with
NDPP mode requirement.
SonicOS 7.1 Device Settings Administration Guide 92 Firmware Settings

TIP: Leave the checklist dialog open while you make the configuration changes. If you click OK before all required changes are complete, the Enable NDPP Mode option is cleared automatically upon closing the checklist dialog. Select the option again to see what configuration changes are still needed for NDPP compliance. 6. Click OK.
SonicOS 7.1 Device Settings Administration Guide 93 Firmware Settings

9
Storage
The DEVICE | Settings > Storage > Overview page displays information for your network security appliance about:
l Primary storage l Secondary storage (if available for your network security appliance) l Both Primary and Secondary storages are available in NSa 4700 series and higher, all NSsp and TZ
series appliances.
l Local storage available only in NSv series appliances.

The advantages of Storage are:

SonicOS 7.1 Device Settings Administration Guide 94 Storage

l The Storage module stores diagnostic data, configuration backups, and logs from system logs, threat logs, Appflow Report data, and packet captures. Logs from 7.0.1 are preserved on the tab named Logs (Legacy),but no new logs are added.
l Storage allows logs to persist when firewall is rebooted. l The system logs, threat logs, and packet capture is allocated 10% of the total storage space each. l The Appflow Report also gets 10% allocation. Topics: l Storage Overview Tab l Storage File Tab
Storage Overview Tab
Only 4700 to 13700 modules allow selection of Primary or Secondary devices if the secondary device is available and valid. TZs, NSa 2700 and NSa 3700 only allows applications to write to secondary storage, primary storage is for System, diagnostic and configuration data only. For NSv, only one storage exists Local Storage, applications can write into this storage. You can change the storage option. It is required to reboot for the changing the storage device to take effect. Only Packet capture and Logs (Legacy) allows deletion of files. System Logs, Threat Logs and Appflow Report does not allow deletion of files. Storage is disabled if your security appliance does not have any available storage modules. Unlike Primary Storage, that is meant to be used by only one firewall, the Secondary Storage module is a shared device that can be used on multiple firewalls if successfully activated on each firewall. In the Secondary Storage module, a top-level directory is created with the firewall EPAID as the directory name. Applications creat subdirectories inside this top-level directory and store their data there. The Overview tab displays a pie chart representation of each storage module. It gives a high level representation of storage space used by each module and also the remaining available space. The log names in the chart are interactive-clicking on them redirects to specific storage tabs.
SonicOS 7.1 Device Settings Administration Guide 95 Storage

Each storage module is assigned with 10% of the total storage space.
Diagnostics Data
The Diagnostic Data tab displays diagnostics files stored on disk allowing users to download these files from this tab for further analysis. To view and download diagnostics data:
1. Navigate to Device | Settings > Storage > Files. 2. Click on Diagnostics Data tab.
This page displays all the created files. 3. Hover on the file that you need to download and click on the Download icon .
NOTE: The file downloaded are encrypted so use decryptor to view the contents.
SonicOS 7.1 Device Settings Administration Guide 96 Storage

Configuration Backup
The Configuration Backup tab lists firewall configuration files. This tab allows the administrators the ability to perform various operations similar to those available on the Device > Firmware > Settings page.
To create backup: 1. Navigate to Device | Settings > Storage > Files 2. Click on Configuration Backup tab.

3. Expand the required firmware version and you can do the following:

Icon

Definition
This icon helps to retain the selected configuration file so that it is not overwritten during auto or local backup.

This icon helps to make the selected configuration file as Gold Master.

This icon helps to boot the firmware with selected configuration file.

This icon helps to download the selected configuration file.

This icon helps to add/edit a comment to the selected configuration file.

This icon helps to delete the selected configuration file.

4. Click on Create Backup. 5. Enable or disable the Retain Local Backup option as per your requirement. 6. Add comment to the Comment text box. 7. Click OK.

SonicOS 7.1 Device Settings Administration Guide 97 Storage

NOTE: The backup created is stored in Primary storage only and cannot be changed.
System Logs
The System Logs tab displays the files containing system log events, allowing to export them in CSV format or download as an SQLite database file. To manage storage capacity, older files are rotated out when the disk is nearing full, ensuring space for new log entries. You can review system log events on the Monitor > Logs > System Logs page. To store System Logs to External Storage:
1. Navigate to DEVICE | Settings > Storage > Files. 2. Click on System Logs tab.
SonicOS 7.1 Device Settings Administration Guide 98 Storage

3. Click on Settings tab. Screen

Description
For NSa 4700 series and higher and all NSsp series appliances:
l Enable the Enable Logging to Storage for storing system logs, threat logs, audit logs, and AppFlow report data.
l Select Primary or Secondary from the Storage Device Type drop-down. NOTE: Requires a reboot for the changing the storage device to take effect. The Firewall displays files and data only from the active storage.
For TZ and NSvseries appliances:
l Enable the Enable Logging to Storage for storing system logs, threat logs, audit logs, and AppFlow report data.

NOTE: Enabling Enable Logging to Storage requires a reboot for the changes to take effect.

4. Click OK.
Threat Logs
The Threat Logs tab displays files containing app flow sessions marked with threats, viruses, instructions, spyware, and botnet activities. You can export these files in CSV format or download them as SQLite database files. To manage storage capacity, older files are rotated out when the disk is nearing full, ensuring space for new log entries. You can review the threat logs in Monitor

Logs > Threat Logs page. To export the threat logs:
1. Navigate to DEVICE | Settings > Storage > Files. 2. Click the Threat Logs tab. 3. Click the Download icon beside the selected threat log. 4. Select Export to CSV or Download File.
SonicOS 7.1 Device Settings Administration Guide 99 Storage

5. Click on Settings tab. Screen

Description

For NSa 4700 series and higher and all NSsp series appliances:
l Enable the Enable Logging to Storage for storing system logs, threat logs, audit logs, and AppFlow report data.
l Select Primary or Secondary from the Storage Device Type drop-down. NOTE: Requires a reboot for the changing the storage device to take effect. The Firewall displays files and data only from the active storage.
For TZ and NSvseries appliances:
l Enable the Enable Logging to Storage for storing system logs, threat logs, audit logs, and AppFlow report data.

NOTE: Enabling Enable Logging to Storage requires a reboot for the changes to take effect.

6. Click OK.
Packet Captures
The Packet Capture tab displays recorded packet files, exportable in PCAPNG format. As storage nears capacity, older files are rotated to accommodate new files. These files become available when packet capturing is activated, that is when the Enable logging to Storage option is enabled in Monitor > Packet Monitor settings page. The setting ensures the capture buffer is being utilized, triggering availability once it is full.
SonicOS 7.1 Device Settings Administration Guide 100 Storage

To enable packet capturing: 1. Navigate to Monitor | Tools & Monitors > Packet Monitor > General. 2. Enable the Enable logging to Storage.

3. Click Save.
To download, export and/or delete packet capture files from Storage: 1. Navigate to DEVICE | Settings > Storage > Files. 2. Click the Packet Captures tab.

3. Hover on the file to view the options.

Icon

Definition

This icon helps to download the selected file.

This icon helps to delete the selected file.

SonicOS 7.1 Device Settings Administration Guide 101 Storage

Logs (Legacy)
The Logs (Legacy) displays a list of stored event log files collected from a previous SonicOS version, retained for historical purposes. You can export or delete each file as needed. To export or delete the logs:
1. Navigate to Device | Settings > Storage > Files 2. Click on Logs (Legacy) tab.
3. Hover on the log file to view the options. Icon Definition
This icon helps to download (export) the selected file. This icon helps to delete the selected file.
SonicOS 7.1 Device Settings Administration Guide 102 Storage

10
Restarting the System
To restart the firewall: CAUTION: The restarting process takes few minutes. During the restart time, all users are disconnected. If you made any changes to the settings, apply them before you restart. 1

References

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals