SONICWALL SonicOS 7.1 Device Settings Administration Guide User Guide
- June 15, 2024
- SONICWALL
Table of Contents
- SONICWALL SonicOS 7.1 Device Settings Administration Guide
- Product Information: SonicOS 7.1 Device Settings
- Product Usage Instructions
- Guide Conventions
- About Device Settings
- Managing SonicWall Licenses
- System Administration
- Firmware Settings
- FAQ (Frequently Asked Questions)
- About SonicOS
- Description
- Managing SonicWall Licenses
- System Administration
- Configuring Login Constraints
- Selecting a Language
- Description
- References
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
SONICWALL SonicOS 7.1 Device Settings Administration Guide
Product Information: SonicOS 7.1 Device Settings
Specifications
- Version: SonicOS 7.1
- Administration Guide: Included
Product Usage Instructions
About SonicOS
SonicOS is a software operating system designed for SonicWall appliances.
It provides a range of features and settings to configure and manage your
device.
Working with SonicOS
SonicOS offers a user-friendly interface for easy navigation and
configuration of your SonicWall appliance.
SonicOS Workflow
The SonicOS workflow guides you through the necessary steps to set up and
manage your device effectively.
How to Use the SonicOS Administration Guides
The SonicOS Administration Guides provide detailed instructions on how to
configure and manage specific settings and features of your device.
Guide Conventions
The guide uses specific conventions to help you understand and follow the instructions easily.
About Device Settings
The Device Settings section allows you to manage various aspects of your SonicWall appliance, including licenses, security services, system administration, firmware settings, and more.
Managing SonicWall Licenses
You can manage your SonicWall licenses in this section, including activating licenses, managing security services, and enabling free trials.
Managing Security Services
This subsection provides a summary of available security services and
guides you on how to manage them online or perform manual upgrades for closed
environments.
System Administration
This subsection covers various system administration tasks, such as configuring firewall name, enabling wireless LAN and IPv6, changing administrator name and password, configuring login security, password compliance, login constraints, multiple administrators support, enhanced audit logging support, wireless LAN controller, SonicOS API, GMS management, and management interface configuration.
Managing Certificates
This subsection explains the management of digital certificates, including
importing certificates, deleting certificates, generating certificate signing
requests, and configuring Simple Certificate Enrollment Protocol.
Administering SNMP
This subsection provides information on setting up SNMP access, enabling
and configuring SNMP access, setting up SNMPv3 groups and access, and
configuring SNMP as a service.
Firmware Settings
This subsection covers firmware management and backup, including searching the table, creating backup firmware images (local or cloud), scheduling firmware image backups, updating firmware manually or using SafeMode, and importing/exporting settings.
Boot Settings
This subsection allows you to configure one-touch configuration overrides for
specific boot settings.
FAQ (Frequently Asked Questions)
Q: How can I activate licenses for my SonicWall appliance?
A: To activate licenses, navigate to the Device Settings section, select
“Managing SonicWall Licenses,” and follow the instructions provided.
Q: How do I change the administrator name and password?
A: In the System Administration subsection of Device Settings, there are
instructions on how to change the administrator name and password.
Q: Can I import certificates into my SonicWall appliance?
A: Yes, you can import certificates by following the instructions in the
“Managing Certificates” subsection of Device Settings.
About SonicOS
This guide is a part of the SonicOS collection of administrative guides that
describes how to administer and monitor the SonicWall family of firewalls.
SonicOS provides network administrators the management interface, API
(Application Program Interface), and the Command Line Interface (CLI) for
firewall configuration by setting objects to secure and protect the network
services, to manage traffic, and to provide the desired level of network
service. This guide focuses on
Topics:
l Working with SonicOS l SonicOS Workflow l How to Use the SonicOS
Administration Guides l Guide Conventions
Working with SonicOS
SonicOS provides a web management interface for configuring, managing, and
monitoring the features, policies, security services, connected devices, and
threats to your network. SonicOS runs on top of SonicCore, SonicWall’s secure
underlying operating system. The SonicOS management interface facilitates:
l Setting up and configuring your firewall l Configuring external devices like
access points or switches l Configuring networks and external system options
that connect to your firewall l Defining objects and policies for protection l
Monitoring the health and status of the security appliance, network, users,
and connections l Monitoring traffic, users, and threats l Investigating
events SonicWall offers two different modes of operation in SonicOS; the modes
differ mainly in the areas of policy, object configuration and diagnostics.
SonicOS 7.1 Device Settings Administration Guide
5
About SonicOS
l Policy Mode provides a unified policy configuration work flow. It combines
Layer 3 to Layer 7 policy enforcement for security policies and optimizes the
work flow for other policy types. This unified policy work flow gathers many
security settings into one place, which were previously configured on
different pages of the management interface.
l Classic Mode is more consistent with earlier releases of SonicOS; you need
to develop individual policies and actions for specific security services. The
Classic Mode has a redesigned interface.
This table identifies which modes can be used on the different SonicWall
firewalls:
Firewall Type TZ Series
NSa Series
NSsp 10700, NSsp 11700, NSsp 13700 NSsp 15700
NSv Series
Classic Mode yes yes
yes no
yes
Policy Mode Comments
no
The entry level TZ Series, also known as desktop
firewalls, deliver revamped features such as 5G
readiness, better connectivity options, improved
threat, SSL and decryption performance that
address HTPPS bandwidth issues; built-in SD-
WAN, and lawful TLS 1.3 decryption support.
no
NSa firewalls provide your mid sized network with
enhanced security . They are designed
specifically for businesses with 250 and up. it can
provide cloud-based and on-box capabilities like
TLS/SSL decryption and inspection, application
intelligence and control, SD-WAN, real-time
visualization, and WLAN management.
no
The NSsp platforms high-end firewalls that
deliver the advanced threat protection and fast
speeds that large enterprises, data centers, and
service providers need.
yes
The NSsp 15700 is designed for large distributed
enterprises, data centers, government agencies
and services providers. It provides advanced
threat protection like Real-Time Deep Memory
Inspection, multi-instance firewall configuration,
and unified policy creation and modification, with
scalability and availability.
yes
The NSv series firewalls offers all the security
advantages of a physical firewall with the
operational and economic benefits of
virtualization. The NSv firewalls can operate in
either Policy Mode or Classic Mode. You can
switch between modes, but some configuration
information from extra interfaces is removed.
In addition to the management interface, SonicOS also has a full-featured API
and a CLI to manage the firewalls. For more information, refer to:
l SonicOS 7.1 API Reference Guide
SonicOS 7.1 Device Settings Administration Guide
6
About SonicOS
l SonicOS Command Line Interface Reference Guide
SonicOS Workflow
When working with SonicWall products, you can use the following workflow as a
guide for setting up your security solution.
You begin your planning as you start making your purchasing decisions. Your
sales partners can help you assess your network and make recommendations based
on the kinds of security services you need. You can learn more about SonicWall
products by reviewing product information and solutions. After selecting the
solution, you can schedule your implementation. After planning and scheduling
your solution, you begin setting up the firewalls. The Getting Started Guides
for your products can help you begin setting up the pieces to your solution.
The getting started guides are designed to help you install the firewall to a
minimal level of operation. Before performing any detailed configuration tasks
described in the SonicOS Administration Guides, you should have your firewall
set up and basic operation validated. The configuration block of the workflow
refers to the many tasks that combine to define how your firewall is
integrated into your security solution and how it behaves when protecting your
environment. Depending on the features of your security solution, this task
can be quite complex. The System Administration Guides are broken into the key
command sets and features. Some documents may be used for all solutions, but
others may be used use only if you integrated that feature into your solution.
For example, High Availability or Wireless Access Points are not necessarily
used by all customers. More information about a feature’s workflow is
presented in the feature administration guide. Refer to the specific
Administration Guide for a SonicOS feature for more information. Configuration
tends to be a one-time activity, although you might make minor adjustments
after monitoring performance or after diagnosing an issue. The configuration
activity can be broken down into the more detailed flow as the following
figure shows. This also mirrors the key functions that are listed across the
top of the management interface.
SonicOS 7.1 Device Settings Administration Guide
7
About SonicOS
There is some flexibility in the order in which you do things, but this is the
general work-flow you would follow when configuring your firewall. Start by
defining the settings on the firewall. Next you set up the system and other
devices that your firewall is connected to, and you can choose to implement
High Availability when done. After your device, network, and system is
configured, you should define the objects that you want to monitor. Then you
use those objects to define the policies that protect your network. The final
step to preparing your setup is to validate the user authentication.
How to Use the SonicOS Administration Guides
The SonicOS Administration Guide is a collection of guides that detail the
features represented by each of the main menu items in the management
interface. Within each guide, you can find topics covering commands in that
menu group, along with procedures and in-depth information. The exceptions are
the SonicOS 7.1 Monitor Guide and the SonicOS 7.1 Objects Guide which combine
the topics for each of those functions into a single book.
To help you understand how the books align with the features and commands, the
following figure shows the books organized like the SonicWall management
interface.
The SonicOS Administration Guides, along with related documentation, such as the getting started guides, are available on the https://www.sonicwall.com/support/technical-documentation/.
SonicOS 7.1 Device Settings Administration Guide
8
About SonicOS
Guide Conventions
These text conventions are used in this guide:
NOTE: A NOTE icon indicates supporting information. IMPORTANT: An IMPORTANT
icon indicates supporting information. TIP: A TIP icon indicates helpful
information. CAUTION: A CAUTION icon indicates potential damage to hardware or
loss of data if instructions are not followed. WARNING: A WARNING icon
indicates a potential for property damage, personal injury, or death.
Convention Bold text
Function | Menu group > Menu item
Code
Italics
Description
Used in procedures to identify elements in the management interface like
dialog boxes, windows, screen names, messages, and buttons. Also used for file
names and text or values you are being instructed to select or type into the
interface.
Indicates a multiple step menu choice on the user interface. For example,
NETWORK | System > Interfaces means to select the NETWORK functions at the top
of the window, then click on System in the left navigation menu to open the
menu group (if needed) and select Interfaces to display the page.
Indicates sample computer programming code. If bold, it represents text to be
typed in the command line interface.
Represents a variable name. The variable name and angle brackets need to be
replaced with an actual value. For example in the segment serialnumber=<your
serial number>, replace the variable and brackets with the serial number from
your device, such as serialnumber=2CB8ED000004.
Indicates the name of a technical manual. Also indicates emphasis on certain
words in a sentence, such as the first instance of a significant term or
concept.
SonicOS 7.1 Device Settings Administration Guide
9
About SonicOS
About Device Settings
The web-based SonicOS Management Interface enables you to configure SonicWall
network security appliances (firewalls). This document provides information
on:
l Managing SonicWall Licenses l System Administration l Configuring Time
Settings l Managing Certificates l Administering SNMP l Firmware Settings l
Restarting the System
SonicOS 7.1 Device Settings Administration Guide 10 About Device Settings
Managing SonicWall Licenses
IMPORTANT: By design, the SonicWall License Manager cannot be configured
to use a third-party proxy server. Networks that direct all HTTP and HTTPS
traffic through a third-party proxy server may experience License Manager
issues. Topics: l Licenses l Managing Security Services l Registering Your
SonicWall Appliance l Activating the Gateway Anti-Virus, Anti-Spyware, and IPS
License l Activating FREE TRIALs
Licenses
Device | Settings > Licenses page in the SonicOS management interface provides
links to activate, upgrade, or renew SonicWall Security Services licenses.
From this page, you can manage all the licenses for your SonicWall security
appliance. The information listed in the Services table is updated from your
mysonicwall.com account. The Licenses page also includes links to FREE trials
of SonicWall Security Services.
SonicOS 7.1 Device Settings Administration Guide 11 Managing SonicWall
Licenses
Managing Security Services
When you have established your Internet connection, it is recommended you
register your SonicWall security appliance, which provides the following
benefits:
l Try a FREE 30-day trial of SonicWallGateway Anti-Virus, Anti-Spyware, and
Intrusion Prevention, Content Filtering Service, and Client Anti-Virus
l Activate SonicWall Anti-Spam l Activate SonicWall security services and
upgrades l Access SonicOS firmware updates l Get SonicWall technical support
Topics: l Services Summary l Managing Security Services Online
Services Summary
The Device | Settings > Licenses page lists all the available and activated
services on the SonicWall security appliance. The friendly name of the
security appliance is displayed above the SERVICES table. Select appropriate
option in the View drop-down box to list the services based on their
activation status. The available options are:
l Licensed and Unlicensed l Licensed l Unlicensed
The table displays the following information: l SERVICES – lists all the
available SonicWall Security Services and upgrades available for the SonicWall
security appliance. l STATUS – indicates if the security service is activated
(Licensed), available for activation (Not Licensed), or no longer active
(Expired). l ACTION – displays options to upgrade, renew, try, or activate the
service, depending on its license status.
SonicOS 7.1 Device Settings Administration Guide 12 Managing SonicWall
Licenses
l Count – displays the number of nodes/users currently connected to your
appliance. If your security appliance is licensed for unlimited nodes, the
count is displayed as Unlimited.
l Max. Count – displays the maximum number of nodes/users allowed for the
license. l EXPIRY DATE – displays the expiration date for any Licensed
Security Service. The information listed in the Services table is updated from
your mysonicwall.com account the next time the SonicWall security appliance
automatically synchronizes with MySonicWall (once a day) or you can click the
SYNCHRONIZE button on this page to update the table. For more information on
SonicWall Security Services, see SonicOS 7.0 Security Services document
available at https://www.sonicwall.com/support/technical-documentation/.
Managing Security Services Online
You can activate, upgrade or renew services using one of the following
methods: l Performing service license updates in MySonicWall and synchronizing
the changes in SonicOS management interface. 1. Navigate to Device | Settings
Licenses page. 2. Click MySonicWall above the Services table. 3. Log into your MySonicWall account and upgrade the licenses. See MSW online help. 4. Synchronize changes. See Synchronizing Changes. l Performing service license updates through SonicOS management interface. See Managing Services from SonicOS Management Interface.
Topics:
l Managing Services from SonicOS Management Interface l Synchronizing Changes
Managing Services from SonicOS Management Interface
You can activate, upgrade, or renew licenses for the Security Services on Device | Settings > Licenses page.
To activate, upgrade, or renew services: 1. Navigate to Device | Settings > Licenses. 2. Select the appropriate option in the View drop-down box above the SERVICES table. 3. Locate the service you want to activate / renew / upgrade. 4. Click any option listed in the ACTIONS column based on what you need to do with the service. The options listed for a service in the ACTIONS column depend on the status of the service. l To activate a FREE trial, click Try. l To activate a Security Service, click the Activate link. l To renew a Security Service, click the Renew link.
SonicOS 7.1 Device Settings Administration Guide 13 Managing SonicWall Licenses
l To upgrade a Security Service, click the Upgrade. 5. Follow the prompts to
activate/renew/upgrade the service license. After completion, you are returned
to
the Licenses page.
Synchronizing Changes
When you make changes to your Security Services in MySonicWall, you can
synchronize them instead of waiting for the system to do it automatically. To
synchronize your MySonicWall account with the Services table in SonicOS
management interface:
1. Navigate to Device | Settings > Licenses . 2. Click Synchronize option
above the SERVICES table.
Manual Upgrade for Closed Environments
If your SonicWall security appliance is deployed in a high-security
environment that does not allow direct Internet connectivity from the
SonicWall security appliance, you can enter the encrypted license key
information from https://mysonicwall.com manually on the Device | Settings >
Licenses page in the SonicOS management interface.
NOTE: Manual upgrade of the encrypted license keyset is only for closed
environments. If your firewall is connected to the Internet, it is recommended
you use the automatic registration and Security Services upgrade features of
your appliance. You need to perform steps 1 through 4 from a computer
connected to the internet and then continue the procedure in the SonicOS
Management Interface of the security appliance that does not have internet
connectivity. 1. Make sure you have an account at https://mysonicwall.com and
your SonicWall security appliance is
registered to the account before proceeding. 2. After logging into
MySonicWall, click on the serial number of your registered SonicWall security
appliance
listed in Product Management > My Products.
SonicOS 7.1 Device Settings Administration Guide 14 Managing SonicWall
Licenses
3. Click MANUAL UPGRADE and select Add keyset to your product. The scrambled
text displayed is the License Keyset for the selected SonicWall security
appliance and activated Security Services.
4. Click Copy Code to copy the Keyset text for pasting into the Settings |
Licenses page. 5. Make sure your SonicWall appliance is running the latest
version of SonicOS. 6. Navigate to Device | Settings > Licenses. 7. Click
Manual License at the upper-right corner of the page. 8. Paste (or type) the
Keyset (from the step 3) into the Enter Keyset field in the Manual License
Upgrade
dialog.
9. Click APPLY to update your SonicWall security appliance. The status field
at the bottom of the page displays The configuration has been updated.
10. You can generate the report from Device | Diagnostics > Tech Support
Report to verify the upgrade details.
NOTE: After the manual upgrade, the Settings | Licenses page does not contain
any registration and upgrade information.
Registering Your SonicWall Appliance
When you log in to your primary appliance for the first time, a Software
Transaction Agreement (STA) form displays for your acceptance before you can
proceed. If you are using a CLI, you must type (or select) Yes before
proceeding. When you have accepted the STA, it is not shown for upgrades of
either firmware or software.
NOTE: MySonicWall registration information is not sold or shared with any
other company.
SonicOS 7.1 Device Settings Administration Guide 15 Managing SonicWall
Licenses
See the Quick Start Guide for your security appliance for additional
information on applying licenses manually, synchronizing licenses manually,
and upgrading firmware.
Activating the Gateway Anti-Virus, AntiSpyware, and IPS License
Your security appliance must be registered on MySonicWall to use these
security services. See Registering Your SonicWall Appliance or the Quick Start
Guide for your security appliance. Because SonicWall Anti-Spyware is part of
SonicWall Gateway Anti-Virus, Anti-Spyware, and Intrusion Prevention, the
Activation Key you receive is for all three services on your SonicWall
security appliance. If you do not have a SonicWall Gateway Anti-Virus , Anti-
Spyware , and Intrusion Prevention license activated on your SonicWall
security appliance, you must purchase it from a SonicWall reseller or through
your MySonicWall account (limited to customers in the USA and Canada).
Activating FREE TRIALs
You can try FREE TRIAL versions of SonicWallGateway Anti-Virus, Anti-Spyware,
and Intrusion Prevention. For information about activating a free trial of any
or all of the Security Services, see the Quick Start Guide for your security
appliance or Managing Security Services Online.
SonicOS 7.1 Device Settings Administration Guide 16 Managing SonicWall
Licenses
System Administration
Configuring the Firewall Name
To configure the firewall name: 1. Navigate to Device | Settings >
Administration. 2. Click Firewall Administrator.
3. Enter the hexadecimal serial number of the firewall in the Firewall Name
field. This number uniquely identifies the SonicWall security appliance and
defaults to the serial number of the firewall. The serial number is also the
MAC address of the unit. To change the Firewall Name, enter a unique
alphanumeric name in the Firewall Name field. It must be at least 8 characters
in length and can be up to 63 characters long.
4. Enter a friendly name in the Firewall’s Domain Name field. The name can be
private, for internal users, or an externally registered domain name. This
domain name is used in conjunction with User Web Login Settings.
5. To facilitate recognition of the primary/secondary firewalls in the Event
Logs, enable Auto-Append HA/Clustering suffix to Firewall Name. When this
option is enabled, an appropriate suffix is appended automatically to the
firewall name in the Monitor | Logs > System Logs page. This option is not
selected by default. For more information about Event Logs, see the SonicOS
7.0 Logs (Monitor) document.
SonicOS 7.1 Device Settings Administration Guide 17 System Administration
Enabling Wireless LAN and IPv6
To enable the visibility of a wireless LAN and/or IPv6: 1. Navigate to Device
| Settings > Administration > Firewall Administrator. 2. Click Enable Wireless
LAN and/or Enable IPv6. These options are selected by default. A confirmation
message is displayed. IMPORTANT: Enabling or disabling the Wireless LAN
feature requires a restart of the firewall.
When WLAN is disabled: l All access point and wireless-related management
interface pages do not display. l WLAN is not displayed as a zone type. l Any
existing WLAN zones or objects become uneditable.
When IPv6 is disabled, all IPv6 packets are dropped by the firewall and the
Monitor | Tools and Monitor > Packet Monitor page displays the log messages.
3. Click OK.
Changing the Administrator Name and Password
Each SonicWall security appliance has a default administrator name of admin
and a password of password. To change the administrator name and/or password:
1. Navigate to Device | Settings > Administration. 2. Click Firewall
Administrator.
3. Type the new name in the Administrator Login Name field.
SonicOS 7.1 Device Settings Administration Guide 18 System Administration
The Administrator Name can be changed from the default setting of admin to any
word using alphanumeric characters up to 32 characters in length. 4. Perform
the following steps to change password, otherwise skip to step 4:
a. Click Change Password. b. Type the old password in the Old Password field.
c. Type the new password in the New Password field. The new password can be up
to 32
alphanumeric and special characters. d. It is recommended you change the
default password, password, to your own custom password.
Enter a strong password that cannot be easily guessed by others. A strong
password should have at least one uppercase letter, one lowercase letter, one
number, and one special character. For example, MyP@ssw0rd. e. Type the new
password again in the Confirm Password field. f. Click Accept. 5. To enforce
Two-factor Authentication, select TOTP from the One-time Passwords Method
drop-down. You can now bind your mobile authentication application with your
user account during the next login. 6. Click Accept.
Configuring Login Security
The internal SonicOS Web-server supports TLS 1.1 and above with strong ciphers
(128 bits or greater) when negotiating HTTPS management sessions. SSL
implementations are not supported. This heightened level of HTTPS security
protects against potential SSLv2 rollback vulnerabilities and ensures
compliance with the Payment Card Industry (PCI) and other security and risk-
management standards.
TIP: SonicOS uses advanced browser technologies, such as HTML5, which are
supported in most recent browsers. SonicWall recommends using the latest
Chrome, Firefox, Internet Explorer, or Safari (does not operate on Windows
platforms) browsers for administration of SonicOS. Mobile device browsers are
not recommended for SonicWall system administration. Configuring SonicOS
password constraint enforcement ensures that administrators and users are
using secure passwords. This password constraint enforcement can satisfy the
confidentiality requirements as defined by current information security
management systems or compliance requirements, such as Common Criteria and the
Payment Card Industry (PCI) standard.
SonicOS 7.1 Device Settings Administration Guide 19 System Administration
Topics: l Configuring Password Compliance l Configuring Login Constraints
Configuring Password Compliance
To configure password compliance: 1. Navigate to Device | Settings >
Administration. 2. Click Login / Multiple Administrators. Configure the
following settings in the LOGIN SECURITY section. 3. To require users to
change their passwords after a designated number of days has elapsed: a.
Select Password must be changed every (days). The field becomes active. This
option is not selected by default. b. Enter the elapsed time in the field. The
default number of days is 90, the minimum is 1 day, and the maximum is 9999.
When a user attempts to login with an expired password, a popup window prompts
the user to enter a new password. The User Login Status window now includes a
Change Password button so users can change their passwords at any time. 4. To
specify the minimum length of time, in hours, allowed between password
changes: a. Select Change password after (hours) . The field becomes active.
b. Enter the number of hours. The minimum and default time is 1 hour; the
maximum is 9999 hours.
SonicOS 7.1 Device Settings Administration Guide 20 System Administration
5. To require users to use unique passwords for the specified number of
password changes: a. Select Bar repeated passwords for this many changes. The
field becomes active. b. Enter the number of changes. The default number is 4,
the minimum number is 1, and the maximum number is 32.
6. To require users to change at least 8 alphanumeric/symbolic characters of
their old password when creating a new one, select Apply password constrains.
For how to specify what characters are allowed, see Step 7.
7. Specify the shortest allowed password, enter the minimum number of
characters in the Enforce a minimum password length of field. The default
number is 8, the minimum is 1, and the maximum is 99.
8. Choose how complex a user’s password must be to be accepted from the
Enforce password complexity drop-down menu: l None (default) l Alphanumeric
characters– Requires both alphabetic and numeric characters l Alphanumeric and
symbolic characters– Requires alphabetic, numeric, and symbolic characters
for symbolic characters, only !, @, #, $, %, ^, &, *, (, and ) are allowed;
all others are denied
9. When a password complexity option other than None is selected, the options
under Complexity Requirement become active. Enter the minimum number of
alphanumeric and symbolic characters required in a user’s password. The
default number for each is 0, but the total number of characters for all
options cannot exceed 99. l Upper Case Characters l Lower Case Characters l
Number Characters l Symbolic Characters NOTE: The Symbolic Characters field
becomes active only if Alphanumeric and symbolic characters is selected.
10. Select to which classes of users the password constraints are applied
under Apply the above password constraints for. By default, all options are
selected: l Admin Refers to the default administrator with the username
admin. l Other full admin l Limited admin l Guest admin l Other local users
SonicOS 7.1 Device Settings Administration Guide 21 System Administration
Configuring Login Constraints
To configure login constraints: 1. Navigate to Device | Settings >
Administration. 2. Click Login/Multiple Administrators.
In the LOGIN SECURITY section, configure the following:
1. To specify the length of inactivity time that elapses before you are
automatically logged out of the Management Interface, enter the time, in
minutes, in the Log out the Admin after inactivity of (mins) field. By
default, the SonicWall Security Appliance logs out the administrator after 5
minutes of inactivity. The inactivity timeout can range from 1 to 9999
minutes. TIP: If the Administrator Inactivity Timeout is extended beyond five
minutes, you should end every management session by clicking Logout in the
upper right corner of the view to prevent unauthorized access to the
firewall’s Management Interface.
2. To configure the SonicWall Security Appliance to lockout an administrator
or a user if the login credentials are incorrect, enable Admin/user lockout.
Both administrators and users are locked out of accessing the firewall after
the specified number of incorrect login attempts. This option is disabled by
default. When this option is enabled, the following fields become active.
CAUTION: If the administrator and a user are logging into the firewall using
the same source IP address, the administrator is also locked out of the
firewall. The lockout is based on the source IP address of the user or
administrator. a. Select Enable local admin/user account lockout (uncheck for
login IP address lockout). This option locks out user accounts and IP
addresses when they have surpassed a specified number of incorrect login
attempts. This option is only available when admin/user lockout is enabled. b.
Select Log event only without lockout for SonicOS to log failed user login
attempts that have reached the established threshold, but does not lock out
the user or IP address. This option is only available when Admin/user lockout
is enabled.
SonicOS 7.1 Device Settings Administration Guide 22 System Administration
After a user or IP address is locked out, a “User login denied – User is
locked out” message displays on the login screen and the login is rejected.
NOTE: You can review and edit all locked out user accounts on the Active Users
page when local admin/user account lockout is enabled. c. Enter the number of
failed attempts within a specified time frame before the user is locked out in
the Failed login attempts per minute before lockout field. The default number
is 5, the minimum is 1, and the maximum is 99. Enter the maximum time in which
failed attempts can be made. The default is 5 minutes, the minimum is 1
minute, and the maximum is 240 minutes (4 hours). d. Enter the length of time
that must elapse before the user is allowed to attempt to log into the
firewall again in the Lockout Period (mins) field. The default is 5 minutes,
the minimum is 0 (permanent lockout), and the maximum is 60 minutes. 3. Enter
the number of incorrect login attempts from the command line interface (CLI)
that triggers a lockout in the Max login attempts through CLI field. The
default is 5, the minimum is 3, and the maximum is 15. 4. Click Accept.
Multiple Administrators Support
SonicOS supports multiple concurrent administrators with full administrator
privileges, read-only privileges, and limited privileges. The original version
of SonicOS supported only a single administrator to log on to a firewall with
full administrative privileges. Additional users can be granted “limited
administrator” access, but only one administrator can have full access to
modify all areas of the SonicOS GUI at one time. SonicOS provides support for
multiple concurrent administrators. This feature allows for multiple users to
log-in with full administrator privileges. In addition to using the default
admin user name, additional administrator user names can be created. Because
of the potential for conflicts caused by multiple administrators making
configuration changes at the same time, only one administrator is allowed to
make configuration changes. The additional administrators are given full
access to the GUI, but they cannot make configuration changes. Multiple
Administrators Support provides the following benefits:
l Improved productivity: Allowing multiple administrators to access a firewall
simultaneously eliminates auto logout, a situation that occurs when two
administrators require access to the appliance at the same time and one is
automatically forced out of the system.
l Reduced configuration risk: The new read-only mode allows users to view the
current configuration and status of a firewall without the risk of making
unintentional changes to the configuration.
SonicOS 7.1 Device Settings Administration Guide 23 System Administration
Working of Multiple Administrators Support
Topics:
l Configuration Modes l User Groups l Priority for Preempting Administrators l
GMS and Multiple Administrator Support
Configuration Modes
To allow multiple concurrent administrators, while also preventing potential
conflicts caused by multiple administrators making configuration changes at
the same time, these configuration modes have been defined:
Configuration mode
Read-only mode
Non-configuration mode
Administrator has full privileges to edit the configuration. If no
administrator is already logged into the appliance, this is the default
behavior for administrators with full and limited administrator privileges
(but not read-only administrators).
NOTE: Administrators with full configuration privilege can also log in using
the Command Line Interface (CLI; see the SonicOS 7.0 CLI Reference Guide).
Administrator cannot make any changes to the configuration, but can view the
entire management UI and perform monitoring actions.
Only administrators who are members of the SonicWall Read-Only Admins user
group are given read-only access, and it is the only configuration mode they
can access.
Administrator can view the same information as members of the read-only group
and they can also initiate management actions that do not have the potential
to cause configuration conflicts.
Only administrators who are members of the SonicWall Administrators user group
can access non-configuration mode. This mode can be entered when another
administrator is already in configuration mode and the new administrator
chooses not to preempt the existing administrator. By default, when an
administrator is preempted out of configuration mode, he or she is converted
to non-configuration mode. On the Device | Settings > Administration page,
this behavior can be modified so that the original administrator is logged
out.
Access rights available to configuration modes table provides a summary of the access rights available to the configuration modes. Access rights for limited administrators are included also, but note that this table does not include all functions available to limited administrators.
SonicOS 7.1 Device Settings Administration Guide 24 System Administration
ACCESS RIGHTS AVAILABLE TO CONFIGURATION MODES
Function Import certificates Generate certificate signing requests Export
certificates Export appliance settings Download TSR Use other diagnostics
Configure network Flush ARP cache Setup DHCP Server Renegotiate VPN tunnels
Log users off
Unlock locked-out users Clear log Filter logs Export log Email log Configure
log categories Configure log settings Generate log reports Browse the full UI
Generate log reports
Full admin in config mode
X X X X X X X X X X X
X X X X X X X X X X
Full admin in
non-config Read-only
Limited
mode
administrator administrator
X
X
X
X
X
X
X
X
X
X
X
guest users
only
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
SonicOS 7.1 Device Settings Administration Guide 25 System Administration
User Groups
The Multiple Administrators Support feature supports two new default user
groups:
l SonicWall Administrators: Members of this group have full administrator
access to edit the configuration. l SonicWall Read-Only Admins: Members of
this group have read-only access to view the full management
interface, but they cannot edit the configuration and they cannot switch to
full configuration mode.
It is not recommended to include users in more than one of these user groups.
If you do so, however, the following behavior applies:
If members of this user group Are
SonicWall Administrators
Also included in the Limited Administrators or SonicWall Read-Only Admins user groups, the members have full administrator rights.
Limited Administrators
Included in the SonicWall Read-Only Admins user group, the members have limited administrator rights.
Read-Only Admins
Later included in another administrative group, If this read-only admin group is used with other administrative groups option in the SonicWall Read-Only Admins group configuration determines whether the members are still restricted to read-only access or have the full administration capabilities set by their other group.
Priority for Preempting Administrators
These rules govern the priority levels that the various classes of
administrators have for preempting administrators that are already logged into
the appliance:
1. The admin user and SonicWall Global Management System (GMS) both have the
highest priority and can preempt any users.
2. A user who is a member of the SonicWall Administrators user group can
preempt any users except for the admin and SonicWall GMS.
3. A user who is a member of the Limited Administrators user group can only
preempt other members of the Limited Administrators group.
GMS and Multiple Administrator Support
When using SonicWall GMS to manage a firewall, GMS frequently logs in to the
appliance (for such activities as ensuring that GMS management IPSec tunnels
have been created correctly). These frequent GMS log-ins can make local
administration of the appliance difficult because the local administrator can
be preempted by GMS.
SonicOS 7.1 Device Settings Administration Guide 26 System Administration
Configuring Multiple Administrator Access
To configure multiple administrator access: 1. Navigate to Device | Settings >
Administration. Click Login / Multiple Administrators.
2. To configure what happens when one administrator preempts another
administrator, from the On preemption by another admin option, select whether
the preempted administrator can be converted to non-config mode or logged out:
l Drop to non-config mode: More than one administrator to access the appliance
in non-config mode without disrupting other administrators. This option is not
selected by default. l Log out: The new administrator to preempt other
sessions. NOTE: Selecting Log Out disables Non-Config mode and prevents
entering Non-Config mode manually.
3. To allow a lower-priority administrator to preempt the current
administrator after a specified time, enter the time, in minutes, in the Allow
preemption by a lower priority administrator after inactivity of (mins) field.
The default is 10 minutes, the minimum is 1 minute, and the maximum is 9999
minutes.
4. The SonicOS Management Interface allows administrators to send text
messages through the Management Interface to other administrators logged into
the appliance. The message appears in the browser’s status bar. To enable this
option: a. Select Inter-administrator messaging. The Messaging polling
interval (seconds) field becomes active. b. Specify how often an
administrator’s browser checks for inter-administrator messages in the
Messaging polling interval (secs) field. Specify a reasonably short interval
to ensure timely delivery of messages, especially if there are likely to be
multiple administrators who need to access the appliance. The default is 10
seconds, the minimum is 1 second, and the maximum is 99 seconds.
5. To enable access by System Administrators, Cryptographic (Crypto)
Administrators, and Audit Administrators, select Multiple Admin Roles. When
this option is disabled, these administrators cannot access the system, and
all related user groups and information about them are hidden. This option is
not selected by default.
SonicOS 7.1 Device Settings Administration Guide 27 System Administration
Enabling Enhanced Audit Logging Support
An enhanced log entry contains the parameter changed and user name in the
Monitor| Logs > System Events page. To enable logging of all configuration
changes in the Monitor| Logs > System Logs page:
1. Navigate to Device | Settings > Administration. 2. Click Audit / SonicOS
API. 3. In the ENHANCED AUDIT LOGGING SUPPORT section, enable Enhanced Audit
Logging
4. Click ACCEPT.
Configuring the Wireless LAN Controller
To enable wireless controller mode: IMPORTANT: You must reboot the firewall
after changing Wireless Controller modes. 1. Navigate to Device | Settings >
Administration. 2. Click Audit/SonicOS API. 3. In the Wireless LAN Controller
section, select any one of the options from the Wireless Controller Mode drop-
down menu: l Wireless-Controller-Only (default) This option enables wireless
controller mode l Non-Wireless This option enables non-wireless controller
mode l Full-Feature-Gateway This option enables normal firewall mode
SonicOS 7.1 Device Settings Administration Guide 28 System Administration
4. After you select the appropriate wireless controller mode, click OK in the
warning message displayed. 5. Click Accept.
Enabling SonicOS API and Configuring Authentication Methods
You can use SonicOS API as an alternative to the SonicOS Command Line
Interface (CLI) for configuring selected functions. To do so, you must first
enable SonicOS API. For more information about SonicOS API, see the SonicOS
7.0 API document available at https://www.sonicwall.com/support/technical-
documentation/.
To enable SonicOS API and configure client authentication: 1. Navigate to
Device | Settings > Administration. 2. Click Audit / SonicOS API. 3. In the
SONICOS API section, enable SonicOS API. 4. Select any of the authentication
methods for initial client authentication: l RFC-7616 HTTP Digest Access
authentication l Select the appropriate digest algorithms: SHA256 (default),
MD5 l Integrity protection: Disabled (default), Allowed, or Enforced. l
Session variant (password hashes in place of passwords):Disabled, Allowed
(default), or Enforced l CHAP authentication. l RFC-2617 HTTP Basic Access
authentication l Public Key Authentication l RSA modulus (key/cipher size in
bits): 2014 is the default. l RSA padding type: PKCS#1 v1.5 or PKCS#1 v2.0
OAEP l OAEP hash method: SHA-1, SHA-256, or Other l OAEP mask (MGF1) method:
SHA1, SHA-256, or Other l Session security using RFC-7616 Digest Access
Authentication l Can hold user passwords received from the client. l Maximum
nonce use: 10 by default l Two-Factor and Bearer Token Authentication 5. Click
Accept.
SonicOS 7.1 Device Settings Administration Guide 29 System Administration
Enabling GMS Management
NOTE: For more information on SonicWall Global Management System, see the
SonicWall GMS and SonicWall Management Services administration documentation,
available at https://www.sonicwall.com/support/technical-documentation/. To
configure the Security Appliance for GMS management: 1. Navigate to Device |
Settings > Administration. 2. Click Audit / SonicOS API. 3. Scroll to the
ADVANCED MANAGEMENT section.
4. Enable Management using GMS. The Configure button becomes available. 5.
Click Configure. The GMS Settings screen in displayed.
6. Enter the host name or IP address of the GMS Console in the GMS Host Name
or IP Address field. 7. Enter the port in the GMS Syslog Server Port field.
The default value is 514. 8. To send only heartbeat status instead of log
messages, select Send Heartbeat Status Messages Only. 9. If the GMS Console is
placed behind a device using NAT on the network, select GMS behind NAT
Device. When you select GMS behind NAT Device, the NAT Device IP Address field
becomes active. 10. Enter the IP address of the NAT device in the NAT Device
IP Address field.
SonicOS 7.1 Device Settings Administration Guide 30 System Administration
11. Select one of the following GMS modes from the Management Mode drop-down
menu:
l IPSEC Management Tunnel – Allows the firewall to be managed over an IPsec
VPN tunnel to the GMS management console. If you selected this option, go to
step 11.
l Existing Tunnel – Uses an existing VPN tunnel over the connection between
the GMS server and the firewall. If you selected this option, go to step 13.
l HTTPS – Allows HTTPS management from two IP addresses: the GMS Primary Agent
and the Standby Agent IP address. The SonicWall firewall also sends encrypted
syslog packets and SNMP traps using 3DES and the firewall administrator’s
password. Options for configuring the GMS reporting server display. If you
selected this option, go to step 12.
12. The default IPsec VPN settings are displayed with values populated by
SonicOS. Verify the settings.
a. From Encryption Algorithms, select the appropriate algorithm. b. Optionally, enter a new encryption key in the Encryption Key field:
For DES 3DES
The key must be 16 hexadecimal characters 48 hexadecimal characters
c. Optionally, enter a new authentication key in the Authentication Key field:
For MD5 SHA1
The key must be 32 hexadecimal characters 40 hexadecimal characters
d. Go to Step 13. 13. SonicOS needs to know the GMS reporting server.
a. Select Send Syslog Messages to a Distributed GMS Reporting Server. The GMS
Reporting Server IP Address and GMS Reporting Server Port options become
available.
SonicOS 7.1 Device Settings Administration Guide 31 System Administration
b. In the GMS Reporting Server IP Address field, enter the IP address of the
GMS server. c. In the GMS Reporting Server Port field, enter the port of the
GMS server. The default port is 514. 14. Click OK. 15. Click Accept.
Configuring the Management Interface
In this section, you configure: l How the Management Interface tables display.
l Certificate usage. l Whether you are operating in Configuration or Non-
Config mode. l Other management options.
SonicOS 7.1 Device Settings Administration Guide 32 System Administration
Topics:
l Managing through HTTP/HTTPS l Selecting a Security Certificate l Controlling
the Management Interface Tables l Enforcing TLS Version l Switching
Configuration Modes l Deleting Browser Cookies l Configuring SSH Management
Managing through HTTP/HTTPS
You can manage the SonicWall security appliance using HTTP or HTTPS and a Web
browser. HTTP web-based management is disabled by default. Use HTTPS to log
into the SonicOS Management Interface with factory default settings.
To manage through HTTP or HTTPS: 1. Navigate to Device | Settings >
Administration. 2. Click Management. 3. To enable HTTP management globally,
select Allow management via HTTP in the WEB MANAGEMENT SETTINGS section, This
option is not selected by default. 4. The default port for HTTP is port 80,
but you can configure access through another port. Enter the number of the
desired port in the HTTP Port field. IMPORTANT: If you configure another port
for HTTP management, you must include the port number when you use the IP
address to log into the SonicWall Security Appliance. For example, if you
configure the port to be 76, then you must type LAN IP Address:76 into the Web
browser, for example, http://192.18.16.1:76. 5. The default port for HTTPS
management is 443. To add another layer of security for logging into the
SonicWall Security Appliance by changing the default port, enter the preferred
port number into the HTTPS Port field. IMPORTANT: If you configure another
port for HTTPS management Port, you must include the port number when you use
the IP address to log into the SonicWall Security Appliance. For example, if
you use 700 for the port, then you must log into the SonicWall using the port
number as well as the IP address; for example, https://192.18.16.1:700.
Selecting a Security Certificate
Security certificates provide data encryption and a secure web site.
SonicOS 7.1 Device Settings Administration Guide 33 System Administration
To specify the type of security certificate: 1. Navigate to Device | Settings
Administration. 2. Click Management. 3. From Certificate Selection drop-down box, select the type of certificate for your website:
l Use Self-signed Certificate, which allows you to continue using a certificate without downloading a new one each time you log into the SonicWall Security Appliance. This option is selected by default. Go to Step 3.
l Import Certificate to select an imported certificate from the Device | Settings > Certificates page to use for authentication to the management interface. A confirmation message displays. a. Click OK. The Device | Settings Certificates page is displayed. b. See Managing Certificates section.
4. In the Certificate Common Name field, enter the IP address or common name for the firewall. If you choose Use Selfsigned Certificate, SonicOS populates the field with the firewall’s IP address.
5. Click Accept. To regenerate a Self-Signed Certificate:
1. Navigate to Device | System > Administration > Management. 2. In the WEB MANAGEMENT SETTINGS section, click Regenerate Certificate. 3. Click OK in the confirmation message that is displayed.
Controlling the Management Interface Tables
The SonicWall Management Interface allows you to control the display of large tables of information across all tables in the Management Interface by changing the:
SonicOS 7.1 Device Settings Administration Guide 34 System Administration
l Number of table entries displayed on a page. l Frequency of background
automatic refresh of tables. Some tables have individual settings for items
per page that are initialized at login to the value configured here. After
these pages are viewed, their individual settings are maintained. Subsequent
changes made here affect these pages only following a new login. To change the
display and refresh of tables: 1. Navigate to Device | Settings >
Administration. 2. Click Management. 3. In the WEB MANAGEMENT SETTINGS
section:
a. Enter the desired number of items per page in the Default Table Size (items
per page) field. The minimum is 1, the maximum is 5000, and the default is 50.
b. Enter the desired refresh interval, in seconds, in the Auto-updated Table
Refresh Interval (secs) field. The minimum is 1 second, the maximum is 300
seconds, and the default is 10 seconds.
4. Click Accept.
Enforcing TLS Version
SonicOS supports versions 1.0, 1.1, and 1.2 of the Transport Layer Security
(TLS) protocol. You can ensure that the more secure version 1.1 and above are
used. To enforce use of TLS versions 1.1 and above:
1. Navigate to Device | Settings > Administration. 2. Click Management. 3. In
the WEB MANAGEMENTS SETTINGS section, enable Enforce TLS 1.1 and Above.
4. Click Accept.
Switching Configuration Modes
Each appliance includes a Mode option that toggles the configuration mode of
the Management Interface. If you are in Configuration Mode, you can switch to
Non-Config Mode at any time, or if you are in Non-Config Mode. you
SonicOS 7.1 Device Settings Administration Guide 35 System Administration
can switch to Configuration Mode. TIP: This method is in addition to switching
modes from the Mode setting on each view. For more information about modes,
see the SonicOS 7.1 About SonicOS documentation.
To switch modes: 1. Navigate to Device | Settings > Administration. 2. Click
Management. 3. In the WEB MANAGEMENT SETTINGS section, If you are in: l
Configuration Mode, click End Config Mode, and click OK. The Mode indicator in
the top right of the page displays Non-Config. l Non-Config Mode, click
Configuration Mode. The Mode indicator in the top right of the page displays
Configuration.
Deleting Browser Cookies
IMPORTANT: Deleting cookies causes you to lose any unsaved changes made in the
Management Interface. To delete all browser cookies saved by the Security
Appliance: 1. Navigate to Device | Settings > Administration. 2. Click
Management. 3. Click Delete Cookies. 4. Click OK.
Configuring SSH Management
If you use SSH to manage the firewall, you can change the SSH port for
additional security. To change the SSH port:
1. Navigate to Device | Settings > Administration. 2. Click Management. 3.
Scroll to SSH MANAGEMENT SETTINGS.
SonicOS 7.1 Device Settings Administration Guide 36 System Administration
4. Enter the port in the SSH Port field. The default SSH port is 22. 5. Click
Accept.
Client Certificate Verification
You can configure certificate verification with or without a Common Access
Card (CAC). NOTE: None of the options is selected by default.
Topics: l About Common Access Card l Configuring Client Certificate
Verification l Using the Client Certificate Check l Troubleshooting User Lock
Out
About Common Access Card
A Common Access Card (CAC) is a United States Department of Defense (DoD)
smart card used by military personnel and other government and non-government
personnel who require highly secure access over the Internet. A CAC uses PKI
authentication and encryption.
NOTE: Using a CAC requires an external card reader connected on a USB port.
The Client Certificate Check was developed for use with a CAC; however, it is
useful in any scenario that requires a client certificate on an HTTPS/SSL
connection. CAC support is available for client certification only on HTTPS
connections.
NOTE: CACs might not work with browsers other than Microsoft Internet
Explorer.
SonicOS 7.1 Device Settings Administration Guide 37 System Administration
Configuring Client Certificate Verification
To configure Client Certificate Check: 1. Navigate to Device | Settings >
Administration. 2. Click Certificate Check.
3. To enable client certificate checking and CAC support on the SonicWall
Security Appliance, select Enable Client Certificate Check. If you enable this
option, the other options become available. A warning confirmation message
displays:
4. Click OK. 5. To activate the client certification cache, select Enable
Client Certificate Cache.
NOTE: The cache expires 24 hours after being enabled. 6. To specify from which
certificate field the user name is obtained, choose an option from User Name
Field:
l Subject: Common Name (default) l Sub Alt: Email l Sub Alt: Microsoft
Universal Principal Name 7. To select a Certification Authority (CA)
certificate issuer, choose one from the Client Certificate Issuer drop-down
menu. The default is thawte Primary Root CA – G3. NOTE: If the appropriate CA
is not listed, you need to import that CA into the SonicWall Security
Appliance. See Managing Certificates section. 8. To select how to obtain the
CAC user group membership and, thus, determine the correct user privilege,
choose from the CAC user group memberships retrieve method drop-down menu:
SonicOS 7.1 Device Settings Administration Guide 38 System Administration
l Local Configured (default) If selected, you should create local user
groups with proper memberships.
l From LDAP If selected, you need to configure the LDAP server. (see
Configuring the SonicWall for LDAP section in SonicOS 7.0 Users document
available at https://www.sonicwall.com/support/technical-documentation/.
9. To enable the Online Certificate Status Protocol (OCSP) check to verify
the client certificate is still valid and has not been revoked, select Enable
OCSP Checking. When this option is enabled, the OCSP Responder URL field
displays and the Enable periodic OCSP Check option displays.
Enter the URL of the OSCP server that verifies the status of the client
certificate in the OCSP Responder URL field. The OCSP Responder URL is usually
embedded inside the client certificate and does not need to be entered. If the
client certificate does not have an OCSP link, you can enter the URL link. The
link should point to the Common Gateway Interface (CGI) on the server side,
which processes the OCSP checking. For example: http://10.103.63.251/ocsp. 10.
To enable a periodic OCSP check for the client certificate for verifying that
the certificate is still valid and has not been revoked:
a. Select Enable periodic OCSP Check. The OCSP check interval field becomes
available. b. Enter the interval between OCSP checks, in hours, in the OCSP
check interval 1~72 (in hours)
field. The minimum interval is 1 hour, the maximum is 72 hours, and the
default is 24 hours. 11. Click Accept.
Using the Client Certificate Check
If you use the client certificate check without a CAC, you must manually
import the client certificate into the browser. If you use the Client
Certificate Check with a CAC, the client certificate is automatically
installed on the browser by middleware. When you begin a management session
through HTTPS, a certificate selection window asks you to confirm the
certificate. After you select the client certificate from the drop-down menu,
the HTTPS/SSL connection is resumed, and the SonicWall Security Appliance
checks the Client Certificate Issuer to verify that the client certificate is
signed by the CA. If a match is found, the administrator login page displays.
If no match is found, the browser displays a standard browser connection fail
message, such as:
SonicOS 7.1 Device Settings Administration Guide 39 System Administration
…..cannot display web page! If OCSP is enabled, before the administrator login
page is displayed, the browser performs an OCSP check and displays the
following message while it is checking. Client Certificate OCSP Checking….. If
a match is found, the administrator login page is displayed, and you can use
your administrator credentials to continue managing the SonicWall Security
Appliance. If no match is found, the browser displays: OCSP Checking fail!
Please contact system administrator!
Checking Certificate Expiration
To activate periodic checks of certificate’s expiration: 1. Navigate to Device
| Settings > Administration > Certificate Check. 2. In the CHECK CERTIFICATE
EXPIRATION SETTINGS section, select Enable periodic certificate expiration
check. This option is selected by default. When enabled, the Certificate
expiration alert interval field becomes available.
3. To set the interval between certificate checks, in hours, enter the
interval in the Certificate expiration alert interval: 1 – 168 (in hours)
field. The minimum time is 1 hour, the maximum is 168 hours, and the default
is 168.
4. Click Accept.
Troubleshooting User Lock Out
When using the client certificate feature, these situations can lock the user
out of the SonicWall Security Appliance:
l Enable Client Certificate Check is checked, but no client certificate is
installed on the browser. l Enable Client Certificate Check is checked and a
client certificate is installed on the browser, but either
no Client Certificate Issuer is selected or the wrong Client Certificate
Issuer is selected. l Enable OSCP Checking is enabled, but either the OSCP
server is not available or a network problem is
preventing the SonicWall Security Appliance from accessing the OSCP server. To
restore access to a user who is locked out, the following CLI commands are
provided:
SonicOS 7.1 Device Settings Administration Guide 40 System Administration
l web-management client-cert disable l web-management ocsp disable
Selecting a Language
If your firmware contains other languages besides English, one can be selected
from Language Selection. NOTE: Changing the language of the SonicOS Management
Interface requires that the SonicWall Security Appliance be rebooted.
To select a language for the Management Interface: 1. Navigate to Device |
Settings > Administration. 2. Click Language.
3. In the LANGUAGE section, select the appropriate language from the Language
Selection drop-down box.
4. Click Accept.
SonicOS 7.1 Device Settings Administration Guide 41 System Administration
5
Configuring Time Settings
The Device | Settings > Time page provides a way to define the time and date
settings used to time stamp log events, to automatically update SonicWall
Security Services, and for other internal purposes.
By default, the SonicWall security appliance uses an internal list of public
NTP servers to update the time automatically. Network Time Protocol (NTP) is a
protocol used to synchronize computer clock times in a network of computers.
NTP uses Coordinated Universal Time (UTC) to synchronize computer clock times
to a millisecond, and sometimes to a fraction of a millisecond.
SonicOS 7.1 Device Settings Administration Guide 42 Configuring Time Settings
Setting System Time
You set the system time in the Settings screen of the Device | Settings > Time
page.
To set the system time: 1. Navigate to Device | Settings > Time. 2. On the
Settings screen, select the time zone you are in from the Time Zone drop-down
list. 3. To set the time automatically, select Set time automatically using
NTP to use NTP (Network Time Protocol) servers from an internal list. This
option is selected by default. 4. To set the time manually: a. Clear Set time
automatically using NTP. The Date/Time option becomes available. b. Click the
calendar icon in the Date/Time field to display the calendar. c. Select the
date, hour, minute, and seconds in the calendar. d. Click away from the
calendar to accept the settings.
SonicOS 7.1 Device Settings Administration Guide 43 Configuring Time Settings
5. To enable automatic adjustments for daylight savings time, select
Automatically adjust clock for daylight saving time. For those areas that
observe daylight savings time, this option is selected by default.
6. To use universal time (UTC) rather than local time for log events, select
Display UTC in logs (instead of local time). This option is not selected by
default.
7. To display the date in International format, with the day preceding the
month, select Display date in International format.
8. To use the manually entered list of NTP servers to set the firewall clock
rather than the internal list of NTP servers, select Only use custom NTP
servers. IMPORTANT: Select this option only if you have configured one or more
NTP servers. For more information about NTP servers, see Configuring NTP
Settings.
9. Click Accept.
Configuring NTP Settings
Network Time Protocol (NTP) is a protocol used to synchronize computer clock
times in a network of computers. NTP uses Coordinated Universal Time (UTC) to
synchronize computer clock times to a millisecond, and sometimes, to a
fraction of a millisecond.
TIP: The SonicWall security appliance uses an internal list of NTP servers, so
manually entering a NTP server is optional.
SonicOS 7.1 Device Settings Administration Guide 44 Configuring Time Settings
Using a Custom NTP Server for Updating the Firewall Clock
To use a local server to set the firewall clock: 1. Navigate to Device |
Settings > Time. 2. Add one or more NTP servers as described in Adding an NTP
Server. 3. Select Only use custom NTP servers (see Setting System Time). This
option is not selected by default. 4. To configure the frequency for the NTP
server to update the firewall, enter the interval in Update Interval every
(minutes). The default value is 60 minutes. The range is 5 to 99,999 minutes.
5. Click Accept.
Adding an NTP Server
To add an NTP server to the firewall configuration: 1. Click NTP Servers tab
on Device | Settings > Time page. 2. Click the +Add button. The Add NTP Server
dialog is displayed. 3. Type the IP address of the remote NTP server in the
NTP Server field.
SonicOS 7.1 Device Settings Administration Guide 45 Configuring Time Settings
4. Select the authentication type from the NTP Auth Type drop-down list: a.
No Auth – Authentication is not required and the following three options are
dimmed. Go to Step 8. b. MD5 – Authentication is required and the following
three options are active.
5. Enter the Trust Key number in the Trust Key No field. The minimum is 1 and
the maximum is 65535. 6. Enter the Key number in the Key Number field. The
minimum is 1 and the maximum is 65535. 7. Enter the password in the Password
field. 8. Click Add. A Success message is displayed. 9. Click Close to return
to the NTP Servers screen. The NTP Server table shows the added server.
Editing an NTP Server Entry
To edit an NTP server entry: 1. Navigate to the NTP Servers screen on Device |
Settings > Time page. 2. In the NTP Server table, hover over the row with the
NTP server and click the Edit icon. The Add NTP Server dialog opens,
displaying the current settings for the server. 3. Make the changes. For more
information, see Adding an NTP Server. 4. Click Edit.
Deleting NTP Server Entry
To delete an NTP server entry: 1. Navigate to the NTP Servers screen on Device
| Settings > Time. 2. In the NTP Server table, hover over the row with the NTP
server and click the Delete icon. 3. Click OK.
To delete multiple NTP servers: 1. Navigate to the NTP Servers screen on
Device | Settings > Time. 2. Select the checkboxes next to the NTP servers
that you want to delete. NOTE: To delete all the NTP servers, select the
checkbox next to NTP Server table title.
SonicOS 7.1 Device Settings Administration Guide 46 Configuring Time Settings
3. Click the Delete button at the top right of the table. 4. Click OK.
SonicOS 7.1 Device Settings Administration Guide 47 Configuring Time Settings
6
Managing Certificates
To implement the use of certificates for VPN policies, you must locate a
source for a valid CA certificate from a third-party CA service. When you have
a valid CA certificate, you can import it into the firewall to validate your
Local Certificates. You import the valid CA certificate into the firewall
using the Device | Settings > Certificates page. After you import the valid CA
certificate, you can use it to validate your local certificates. SonicOS
provides a large number of certificates with the SonicWall network security
appliance; these are built-in certificates and cannot be deleted or
configured. SonicOS supports a local Certificate Revocation List (CRL), which
is a list of digital certificates that have been revoked by the issuing
Certificate Authority (CA) before their scheduled expiration date and should
no longer be trusted. For further information about local CRL, contact
Technical Support.
About Digital Certificates
A digital certificate is an electronic means to verify identity by a trusted
third party known as a Certificate Authority (CA). The X.509 v3 certificate
standard is a specification used with cryptographic certificates and allows
you to define extensions that you can include with your certificate. SonicWall
has implemented this standard in its thirdparty certificate support. You can
use a certificate signed and verified by a third-party CA to use with an IKE
(Internet Key Exchange) VPN policy. IKE is an important part of IPsec VPN
solutions, and it can use digital certificates to authenticate peer devices
before setting up Security Associations (SAs). Without digital certificates,
VPN users must authenticate by manually exchanging shared secrets or symmetric
keys. Devices or clients using digital signatures do not require configuration
changes every time a new device or client is added to the network. A typical
certificate consists of two sections: a data section and a signature section.
The data section typically contains information such as the version of X.509
supported by the certificate, a certificate serial number, information about
the user’s public key, the Distinguished Name (DN), validation period for the
certificate, and optional information such as the target use of the
certificate. The signature section includes the cryptographic algorithm used
by the issuing CA, and the CA digital signature. SonicWall Security Appliances
interoperate with any X.509v3-compliant provider of Certificates. SonicWall
Security Appliance have been tested with the following vendors of Certificate
Authority Certificates:
l Entrust l Microsoft
SonicOS 7.1 Device Settings Administration Guide 48 Managing Certificates
l OpenCA l OpenSSL and TLS l VeriSign Topics:
l About the Certificates Table l Importing Certificates l Deleting
Certificates l Generating a Certificate Signing Request l Configuring Simple
Certificate Enrollment Protocol
About the Certificates Table
The Certificates page provides all the settings for managing CA and Local Certificates. The table on the Certificates page displays this information about certificates:
Column CERTIFICATE TYPE
Information displayed
Name of the certificate. Type of certificate:
l CA certificate l Local certificate l Pending request
SonicOS 7.1 Device Settings Administration Guide 49 Managing Certificates
Column VALIDATED
Expires
Information displayed
Validation information:
l Blank l Self-signed l Expire in n days l Expired
Date and time the certificate expires.
About Certificate Details
Clicking on the certificate’s row in the table displays information about the
certificate, which might include the following, depending on the type of
certificate:
l Signature Algorithm l Certificate Issuer l Subject Distinguished Name l
Public Key Algorithm l Certificate Serial Number l Valid from l Expires On l
CRL Status (for Pending requests and local certificates) The details depend on
the type of certificate Certificate Issuer, Certificate Serial Number, Valid
from, and Expires On are not shown for Pending requests as this information is
generated by the Certificate provider.
Importing Certificates
After your CA service has issued a Certificate for your Pending request, or
has otherwise provided a Local Certificate, you can import it for use in VPN
or Web Management authentication. CA Certificates might also be imported to
verify local Certificates and peer Certificates used in IKE negotiation.
SonicOS 7.1 Device Settings Administration Guide 50 Managing Certificates
Topics: l Importing a Certificate Authority Certificate l Importing a Local
Certificate l Creating a PKCS-12 Formatted Certificate File (Linux Systems
Only)
Importing a Local Certificate
To import a certificate from a certificate authority: 1. Navigate to Device |
Settings > Certificates. 2. Click Import. The IMPORT CERTIFICATE dialog is
displayed.
3. Enter a certificate name in the Certificate Name field. 4. Enter the
password used by your Certificate Authority to encrypt the PKCS#12 file in the
Certificate
Management Password field. 5. Click Add File to locate the certificate file.
6. Select the certificate and click Open. 7. Click Import to import the
certificate into the firewall. When it is imported, you can view the
certificate entry
in the Certificates table. 8. Click the certificate displayed on the
Certificates page, to know the status and other details.
SonicOS 7.1 Device Settings Administration Guide 51 Managing Certificates
Importing a Certificate Authority Certificate
To import a local certificate: 1. Navigate to Device | Settings >
Certificates. 2. Click Import. The IMPORT CERTIFICATE dialog is displayed.
3. Choose Import a CA certificate from a PKCS#7 (*.p7b) or DER (.der or .cer)
encoded file. The Import Certificate dialog settings change.
4. Click Add File and locate the certificate file. 5. Click Open. 6. Click
Import to import the certificate into the firewall. When it is imported, you
can view the certificate entry
in the Certificates table. 7. Click the certificate displayed on the
Certificates page, to know the status and other details.
Creating a PKCS-12 Formatted Certificate File (Linux Systems Only)
A PKCS12-formatted certificate file can be created using Linux system with
OpenSSL. To create a PKCS-12 formatted certificate file, one needs to have two
main components of the certificate:
l Private key (typically a file with .key extension or the word key in the
filename) l Certificate with a public key (typically a file with .crt
extension or the word cert as part of filename).
SonicOS 7.1 Device Settings Administration Guide 52 Managing Certificates
For example, the Apache HTTP server on Linux has its private key and
certificate in these locations: l /etc/httpd/conf/ssl.key/server.key l
/etc/httpd/conf/ssl.crt/server.crt
With these two files available, run the following command: openssl pkcs12
-export -out out.p12 -inkey server.key -in server.crt In this example out.p12
become the PKCS-12 formatted certificate file and server.key and server.crt
are the PEM-formatted private key and the certificate file respectively. After
running the openssl command, you are prompted for the password to
protect/encrypted the file. After choosing the password, the creation of the
PKCS-12-formatted certificate file is complete, and it can be imported into
the appliance.
SonicOS 7.1 Device Settings Administration Guide 53 Managing Certificates
Deleting Certificates
NOTE: Built-in certificates cannot be deleted. You can delete an imported
certificate if it has expired or if you decide not to use third-party
certificates for VPN authentication. You can always delete certificates you
created. To delete a certificate:
1. Navigate to Device | Settings > Certificates. 2. Hover over the
certificate and click the Delete icon. To delete multiple certificates: 1.
Navigate to Device | Settings > Certificates. 2. Select the certificates that
you want the delete by selecting the checkbox(es) next to the certificates.
TIP: To select all the certificates, select the checkbox next to the
Certificate column in the header row. 3. Click the Delete icon at the top of
the table.
SonicOS 7.1 Device Settings Administration Guide 54 Managing Certificates
Generating a Certificate Signing Request
You should create a Certificate Policy to be used in conjunction with local
certificates. A Certificate Policy determines the authentication requirements
and the authority limits required for the validation of a certificate. To
generate a certificate signing request:
1. Navigate to Device | Settings > Certificates. 2. Click New Signing
Request. The Certificate dialog is displayed.
3. Enter an alias name for the certificate in the Certificate Alias field. 4.
Create a Distinguished Name (DN) using the drop-down menus shown in table
below, then enter
information for the certificate in the associated fields.
SonicOS 7.1 Device Settings Administration Guide 55 Managing Certificates
NOTE: For each DN, you can select your country from the associated drop-down
menu; for all other components, enter the information in the associated field.
SonicOS 7.1 Device Settings Administration Guide 56 Managing Certificates
Drop-down menu Country State
Locality, City, or County Company or Organization
Department
Group
Team Common Name
Select appropriate information
Country (default) State Locality or County Company or Organization
Country State (default) Locality, City, or County Company or Organization
Department
Locality, City, or County (default) Company or Organization Department Group
Team
Company or Organization (default) Department Group Team Common Name Serial
Number E-Mail Address
Department (default) Group Team Common Name Serial Number E-Mail Address
Group (default) Team Common Name Serial Number E-Mail Address
Team (default) Common Name Serial Number E-Mail Address
Common Name (default) Serial Number E-Mail Address
SonicOS 7.1 Device Settings Administration Guide 57 Managing Certificates
As you enter information for the components, the Distinguished Name (DN) is created in the Subject Distinguished Name field.
5. Optionally, you can also attach a SUBJECT ALTERNATIVE NAME to the
certificate after selecting the type from the drop-down menu:
l Domain Name l Email Address l IPv4 Address
6. Select a signature algorithm from the Signature Algorithm drop-down menu:
l SHA1 (default) l MD5 l SHA256 l SHA384 l SHA512
7. Select a subject key type from the Subject Key Type drop-down menu:
RSA (default) ECDSA
A public key cryptographic algorithm used for encrypting data,
Encrypts data using the Elliptic Curve Digital Signature Algorithm, which has
a high strength-per-key-bit security.
8. Select a subject key size or curve from the Subject Key Size/Curve drop-
down menu.
NOTE: Not all key sizes or curves are supported by a Certificate Authority,
therefore, you should check with your CA for supported key sizes.
SonicOS 7.1 Device Settings Administration Guide 58 Managing Certificates
IF YOU SELECTED A KEY TYPE OF
RSA, select a key size
1024 bits (default) 1536 bits 2048 bits 4096 bits
ECDSA, select a curve prime256vi: X9.62.SECG curve over a 256 bit prime field (default) secp384r1: NIST/SECG curve over a 384 bit prime field secp521r1: NIST/SECG curve over a 521 bit prime field
9. Click Generate to create a certificate signing request file.
When the Certificate Signing Request is generated, a message describing the
result is displayed and a new entry appears in the Certificates table with the
type Pending request.
10. Click the Export icon. The Export Certificate Request dialog is displayed.
11. Click the Export icon to download the file to your computer. An Opening
14. Click Choose File to select a file. 15. Select the file and click Open. 16. Click UPLOAD.
SonicOS 7.1 Device Settings Administration Guide 59 Managing Certificates
Configuring Simple Certificate Enrollment Protocol
The Simple Certificate Enrollment Protocol (SCEP) is designed to support the
secure issuance of certificates to network devices in a scalable manner. There
are two enrollment scenarios for SCEP:
l SCEP server CA automatically issues certificates. l SCEP request is set to
PENDING and the CA administrator manually issues the certificate. More
information about SCEP can be found at: http://tools.ietf.org/html/draft-
nourse-scep-18 (Cisco Systems’ Simple Certificate Enrollment Protocol draft-
nourse-scep-18). To use SCEP to issue certificates: 1. Generate a signing
request as described in Generating a Certificate Signing Request. 2. On the
Certificates page, Click SCEP.
The SCEP Configuration dialog is displayed.
3. From CSR List, SonicOS selects a default CSR list automatically. If you
have multiple CSR lists configured, you can modify this.
4. In the CA URL field, enter the URL for the Certificate authority. 5. If
the Challenge Password(optional) field, enter the password for the CA if one
is required. 6. In the Request Count field, enter the number of requests. The
default value is 256. 7. In the Polling Interval(S) field, you can modify the
default value for duration of time, in seconds, between
the sending of polling messages. the default value is 30 seconds.
SonicOS 7.1 Device Settings Administration Guide 60 Managing Certificates
8. In the Max Polling Time(S) field, you can modify the default value for the
duration of time, in seconds, the firewall waits for a response to a polling
message before timing out. The default value is 28800 seconds (8 hours).
9. Click SCEP to submit the SCEP enrollment. The firewall contacts the CA to
request the certificate. The time this takes depends on whether the CA issues
certificates automatically or manually. After the certificate is issued, it is
displayed in the list of available certificates on the Device | Settings >
Certificates page, under the Imported certificates and requests or All
certificates category.
SonicOS 7.1 Device Settings Administration Guide 61 Managing Certificates
7
Administering SNMP
You can manage the SonicWall security appliance using SNMP or SonicWall Global
Management System (GMS). This section describes how to configure the SonicWall
for management using SNMP. For information about managing the SonicWall
appliance with GMS, see the SonicWall GMS and SonicWall Management Services
administration documentation, available at
https://www.sonicwall.com/support/technicaldocumentation.
Topics: l About SNMP l Setting Up SNMP Access l Configuring SNMP as a Service
and Adding Rules
About SNMP
SNMP (Simple Network Management Protocol) is a network protocol used over User
Datagram Protocol (UDP) that allows network administrators to monitor the
status of the SonicWall Security Appliance and receive notification of
critical events as they occur on the network. The SonicWall Security Appliance
supports SNMP v1/v2c/v3 and all relevant Management Information Base II (MIB-
II) groups except egp and at. SNMPv3 expands on earlier versions of SNMP and
provides secure access to network devices by means of a combination of
authenticating and encrypting packets. Packet security is provided through:
l Message Integrity: ensures a packet has not been tampered with in transit l
Authentication: verifies a message comes from a valid source l Encryption:
encodes packet contents to prevent its being viewed by an unauthorized source.
SNMPv3 provides for both security models and security levels. A security model
is an authentication strategy set up between a user and the group in which the
user resides. The security level is the permitted level of security within a
given security model. The security model and associated security level
determine how an SNMP packet is handled. SNMPv3 provides extra levels of
authentication and privacy, as well as additional authorization and access
control.
SonicOS 7.1 Device Settings Administration Guide 62 Administering SNMP
Security Level, Authentication, and Encryption Based on SNMP Version shows how security levels, authentication, and encryption are handled by the different versions of SNMP.
SECURITY LEVEL, AUTHENTICATION, AND ENCRYPTION BASED ON SNMP VERSION
Version Level
v1
noAuthNoPriv
v2c
noAuthNoPriv
noAuthNoPriv
authNoPriv
v3
authPriv
Authentication Type Community String Community String Username MD5 or SHA
MD5 or SHA
Encryption Means of Authentication
No
Community string match
No
Community string match
No
Username match
No
Authentication is based on the HMAC-
MD5 or HMSC-SRA algorithms.
DES or AES Provides authentication is based on the HMAC-MD5 or HMSC-SRA algorithms. Provides DES 56-bit encryption in addition to authentication based on the CBC-DES (DES-56) standard, or AES 128-bit encryption, as well.
The SonicWall Security Appliance replies to SNMP Get commands for MIB-II,
using any interface, and supports a custom SonicWall MIB for generating trap
messages. The custom SonicWall MIB is available for download from the
SonicWall Web site and can be loaded into third-party SNMP management software
such as HP Openview, Tivoli, or SNMPC.
You can view and configure SNMP settings. Settings cannot be viewed or
modified by the user. SNMPv3 can be modified at the User or Group level.
Access Views can be read, write, or both, and can be assigned to users or
groups. A single View can have multiple Object IDs (OIDs) associated with it.
SNMPv3 settings for the SNMPv3 Engine ID are configurable under the General
menu of the Configure SNMP view dialog. The Engine ID is used to authorize a
received SNMP packet. Only matching packet EngineIDs are processed.
Setting Up SNMP Access
Setting up SNMP consists of: l Enabling and Configuring SNMP Access l Setting
Up SNMPv3 Groups and Access
Enabling and Configuring SNMP Access
You can use either SNMPv1/v2 for basic functionality or configure the
SonicWall security appliance to use the more extensive SNMPv3 options. To use
SNMP, you must first enable it.
SonicOS 7.1 Device Settings Administration Guide 63 Administering SNMP
Topics: l Configuring Basic Functionality l Configuring SNMPv3 Engine IDs l
Configuring Object IDs for SNMPv3 Views l Creating Groups and Adding Users and
Access l Adding Access
Configuring Basic Functionality
To enable SNMP: 1. Navigate to Device | Settings > SNMP. 2. Select Enable
SNMP. By default, SNMP is disabled.
3. Click Accept. The SNMP information is populated on the SNMP page, and
Configure becomes available. 4. To configure the SNMP interface, click
Configure. The Configure SNMP View dialog is displayed.
SonicOS 7.1 Device Settings Administration Guide 64 Administering SNMP
5. On the General page, enter the host name of the SonicWall security
appliance in the System Name field. 6. Optionally, enter the network
administrator’s name in the System Contact field. 7. Optionally, enter an
email address, telephone number, or pager number in the System Location field.
8. If the SNMPv3 configuration option is used, enter an asset number in the
Asset Number field. Otherwise,
this field is optional. 9. Enter a name for a group or community of
administrators who can view SNMP data in the Get
Community Name field. 10. Optionally, enter a name for a group or community of
administrators who can view SNMP traps in the Trap
Community Name field. 11. Enter the IP address(es) or host name(s) of the SNMP
management system receiving SNMP traps in the
Host 1 through Host n fields. You must configure at least one IP address or
host name, but up to the maximum number of addresses or host names for your
system can be used. 12. If you:
l Want to set up SNMPV3, go to Configuring SNMPv3 Engine IDs . l Finished
setting up SNMP for now, click Add.
Configuring SNMPv3 Engine IDs
If SNMPv3 is used, you can configure the SNMPv3 Engine ID and SNMP priority.
Configuring the SNMPv3 Engine ID provides maximum security for SNMP
management.
SonicOS 7.1 Device Settings Administration Guide 65 Administering SNMP
To configure SNMPv3 engine IDs: 1. Navigate to Device | Settings > SNMP. 2. If
you have not configured SNMP for your system, follow Step 1 through Step 11 in
Configuring Basic Functionality. 3. Click Advanced.
4. Select Mandatory Require SNMPv3. This disables SNMPv1/v2 and allows only
SNMPv3 access, which provides maximum security for SNMP management. IMPORTANT:
If you select this option, you must specify an asset number on the General
page before clicking OK.
5. Enter the hexadecimal Engine ID number in the Engine ID field. SonicOS
automatically populates this field, but you can change it. This number is
matched against received SNMP packets to authorize their processing; only
packets whose Engine ID matches this number are processed.
6. Optionally, enable Increase SNMP subsystem priority. For efficient system
operation, certain operations might take priority over responses to SNMP
queries. Enabling this option causes the SNMP subsystem to always respond and
operate at a higher system priority. IMPORTANT: Enabling this option might
affect the performance of the overall system.
7. Click OK. The SNMPv3 security options are now used in processing packets.
Configuring Object IDs for SNMPv3 Views
The SNMPv3 View shows access settings for Users and Groups. You create
settings for users and groups, and these security settings are not user-
modifiable. The SNMPv3 View defines the Object IDs (OID) and Object ID Groups,
and is sometimes known as the SNMPv3 Access Object.
SonicOS 7.1 Device Settings Administration Guide 66 Administering SNMP
The SNMP View defines a collection of OIDs and OID groups. The initial set of
default views cannot be changed or deleted. The default views reflect the most
often used views, such as the root view, system view, IP, interfaces. The OIDs
for these views are pre-assigned. Additionally, you can create a custom view
for specific users and groups. You can modify any views that you create. You
cannot modify the ones the system creates. To configure OIDs for SNMPv3 views:
1. Navigate to Device | Settings > SNMP. 2. Click View.
3. In the View page, click + Add. The View Name dialog box is displayed.
4. Enter a meaningful name in the View Name field. 5. Click Add OID to add
OID to the View being created. The Add SNMP OID dialog is displayed. 6. Enter
name in the OID Name field and click OK.
The OIDs associated with the View Name is listed in the OID table. To delete
an OID from the OID List, hover over the OID and click Delete. 7. Add any more
OIDs to associate with the View. 8. Click OK. The new view is displayed in the
View page.
SonicOS 7.1 Device Settings Administration Guide 67 Administering SNMP
Setting Up SNMPv3 Groups and Access
SNMPv3 allows you to set up and assign groups and access with differing levels
of security. Object IDs are associated with various levels of permissions, and
a single view can be assigned to multiple objects. SNMPv3 group and user
access shows how access for groups and users are associated with these
different permission levels.
Creating Groups and Adding Users and Access
Topics: l Creating a Group l Adding Users l Adding Access
Creating a Group
To create a group: 1. Navigate to Device | Settings > SNMP. 2. Click
User/Group. 3. Click Add Group.
SonicOS 7.1 Device Settings Administration Guide 68 Administering SNMP
4. In the Add SNMP Group dialog, enter the name in the Group Name field. The
group name can contain up to 32 alphanumeric characters.
5. Click OK The table in the User/Group page is updated to display the newly
added group.
Adding Access
SNMPv3 Access is an object that: l Defines the read/write access rights of an
SNMPv3 View. l Can be assigned to an SNMPv3 Group.
Multiple groups can be assigned to the same Access object. An Access object
can also have multiple views assigned to it. To create an access object:
1. Navigate to Device | Settings > SNMP. 2. Click Access. 3. Click + Add.
The Access Name dialog is displayed.
4. Enter a friendly name in the Access Name field. 5. From Read View, select
a view from the list of available views.
SonicOS 7.1 Device Settings Administration Guide 69 Administering SNMP
6. From Master SNMPv3 Group, select a group from the list of available
groups. NOTE: Access can be assigned to only one SNMPv3 group, but a group can
be associated with multiple Access objects.
7. From Access Security Level, select a security level: l None l
Authentication Only l Authentication and Privacy
8. Click OK. The Access object is added to the table in the Access page.
Adding Users
To add users: 1. Navigate to Device | Settings > SNMP. 2. Click User/Group. 3.
Click Add Name.
4. Enter the user name in the User Name field. 5. Select a security level
from Security Level:
l None (default) l Authentication only Two new options appear:
l Authentication Method Select one of these authentication methods: MD5 or
SHA1. l Authentication Key Enter an authentication key in the field. The key
can be any string of
8 to 32 printable characters
SonicOS 7.1 Device Settings Administration Guide 70 Administering SNMP
l Authentication and Privacy More options appear: l Select an encryption
method from the Encryption Method drop-down menu: AES or DES. l Enter the
encryption key in the Privacy Key field. The key can be any string of 8 to 32
printable characters.
6. Select a group from Group dropdown box. 7. Click OK.The user is added to
the User/Group table and added to the appropriate group.
Configuring SNMP as a Service and Adding Rules
By default, SNMP is disabled on the SonicWall Security Appliance. To enable
SNMP, you must first enable SNMP on the Device | Settings > SNMP page, and
then enable it for individual interfaces. To do this, go to the NETWORK
|System > Interfaces page and edit the interface to enable SNMP. For more
information about configuring SNMP as a service and adding rules, see
Configuring Interfaces section in the SonicOS 7.0 System document. If your
SNMP management system supports discovery, the SonicWall Security Appliance
agent automatically discovers the SonicWall Security Appliance on the network.
Otherwise, you must add the SonicWall Security Appliance to the list of SNMP-
managed devices on the SNMP management system.
SonicOS 7.1 Device Settings Administration Guide 71 Administering SNMP
8
Firmware Settings
Topics: l Firmware Management and Backup l Creating a Backup Firmware Image l
Updating Firmware l Importing and Exporting Settings l Configuring Firmware
and Backup Settings
Firmware Management and Backup
The Device | Settings > Firmware and Settings page provides settings that
allow for easy firmware upgrade and preferences management.
The Firmware & Backups page allows you to: l Create and schedule backups; see
Creating a Backup Firmware Image. l View local, cloud backups; see Creating a
Backup Firmware Image
SonicOS 7.1 Device Settings Administration Guide 72 Firmware Settings
l Search the listed backups; see Searching the Table. l Import and export
configurations; see Importing Settings and Exporting Settings. l Upload
firmware images and system settings; see Updating Firmware. l Configure
settings; see Configuring Firmware and Backup Settings. l Boot to your choice
of firmware and system settings; see Updating Firmware.
Firmware Management & Backup Tables
Topics: l Local Table l Cloud Table l Show Configuration Files Table
Local Table
The Local section of the Firmware Management & Backup table displays:
l FIRMWARE VERSION – firmware currently loaded on the firewall l FIRMWARE LOAD
DATE – the date and time the firmware was installed on the appliance l
FIRMWARE BUILD DATE – the date and time the firmware was created l
CONFIGURATION DATE – the date and time when the configuration of the appliance
was last updated l USERNAME- the user who installed or updated the firmware l
COMMENTS – an Information icon that, when moused over, displays information
about the firmware or
backup file. If you did not specify a comment when creating a backup, a
default comment is displayed: l This is the current firmware l This is the
local backup l Custom comment
l BOOT- clicking the Boot icon displays whether to reboot the firewall with
the current or factory default configuration:
CAUTION: Clicking Boot next to any firmware image overwrites the existing
current firmware image making it the Current Firmware image. CAUTION: When
uploading firmware to the firewall, you must not interrupt the Web browser by
closing the browser, clicking a link, or loading a new page. If the browser is
interrupted, the firmware may become corrupted.
SonicOS 7.1 Device Settings Administration Guide 73 Firmware Settings
l FIRMWARE ACTIONS – displays the Download icon; clicking the icon saves the
firmware to a new location on your computer or network. Only uploaded firmware
can be saved to a different location
Cloud Table
The Cloud table of the Firmware and Settings page displays the: l Firmware
Version – firmware backed up to the cloud. Up to 3 versions of each firmware
are listed. l Firmware Load Date – the date and time the firmware was
installed on the appliance l Firmware Build Date – the date and time the
firmware was created l Username – the user who installed or updated the
firmware l Comment – Displays information about the firmware or backup file.
If you did not specify a comment when creating a backup, a default comment is
displayed: l Automated backup l This is the cloud backup firmware l Custom
comment
Show Configuration Files Table
Clicking the arrow mark next to firmware version displays information about
the backup files on the cloud for that firmware version.
CONFIGURATION VERSION CONFIGURATION DATE BACKUP TYPE
Version number of the backup file. Date the backup file was created. Type of backup, Auto or Manual, as well as these icons:
SonicOS 7.1 Device Settings Administration Guide 74 Firmware Settings
COMMENTS USERNAME BOOT
Configuration Actions
l Retain Configuration File selecting this icon prevents the backup file
from being overwritten during an auto or manual backup.
l Gold Master selecting this icon designates the backup file as the Gold
Master backup file, that is, the combination prefs file and firmware image
combination you can designate as the most stable configuration. When you
designate an entry as a gold master, it cannot be deleted or unpinned until or
unless you designate it as a non-gold, standard file. This protects your most
stable version. Only one backup can be a gold standard.
Displays information about the firmware or backup file. If you did not specify
a comment when creating a backup, a default comment is displayed:
l Automated backup l This is the cloud backup firmware l Custom comment
User who installed or updated the firmware.
Clicking the Boot icon displays whether to reboot the firewall with the
current or factory default configuration:
CAUTION: Clicking Boot next to any firmware image overwrites the existing
current firmware image making it the Current Firmware image.
CAUTION: When uploading firmware to the firewall, you must not interrupt the
Web browser by closing the browser, clicking a link, or loading a new page. If
the browser is interrupted, the firmware may become corrupted.
Displays icons:
l Download Saves the firmware to a new location on your computer or network.
Only uploaded firmware can be saved to a different location
l Edit Comment Allows you to edit the default or custom comment.
l Delete Deletes the backup file.
Searching the Table
You can search the backup tables with the Search function. Although the Search
function applies to all tables, results are displayed only for visible tables.
For example, to see the results of the various Show Configuration Files
tables, you must display them one by one.
SonicOS 7.1 Device Settings Administration Guide 75 Firmware Settings
To search the tables: 1. Navigate to Device | Settings > Firmware and
Settings. 2. Enter the search criterion in the Search field.
The results are highlighted in the table.
Creating a Backup Firmware Image
When you click Create Backup, the SonicWall security appliance takes a
snapshot of your current system state, firmware, and configuration
preferences, and makes the snapshot the new System Backup firmware image. You
can save backups locally or on the cloud. You can also schedule backups to
occur automatically.
IMPORTANT: Creating backup overwrites the existing Backup firmware image as
necessary. Use the Backup file for saving good configurations and then booting
them if upgrades or future configurations cause instability or other serious
issues. The configuration file is conveniently saved onboard. The date and
time the file was created as well as the firmware version in use at the time
is displayed in the Firmware Management & Backup table. The dates for each
item listed in the Firmware Management & Backup table are the build dates for
the firmware images themselves. You can create a backup of your current
configuration settings on the appliance to be used with the current firmware
version or with a newly uploaded firmware version. Topics:
l Creating a Local Backup Firmware Image l Creating a Cloud Backup Firmware
Image l Scheduling Firmware Image Backups
Creating a Local Backup Firmware Image
To create a local backup file: 1. Navigate to Device | Settings > Firmware and
Settings. 2. Click Create Backup > Local Backup.
SonicOS 7.1 Device Settings Administration Guide 76 Firmware Settings
3. In the Local Backup dialog, do the following to create a backup:
a. Enabling Retain Local Backup option for local backup helps to retain
configuration file so it is not overwritten during auto or local backup. To
retain local backup, enable Retain Local Backup.
b. Enter comments in the Comments field. c. Click OK. The backup image created
on local storage is listed under LOCAL section. NOTE: you must perform these
steps each time for a local backup.
Creating a Cloud Backup Firmware Image
To create a cloud backup file: 1. Navigate to Device | Settings > Firmware and
Settings. 2. Click Cloud Backups. 3. If Cloud Backup has never been enabled,
enable Cloud Backup. 4. Click Create Backup > Cloud Backup.
5. Select Retain Cloud Backup if you want this backup configuration file
saved and not overwritten when you create additional backup configuration
files on the cloud.
SonicOS 7.1 Device Settings Administration Guide 77 Firmware Settings
6. You can use the Comment field to optionally create a comment associated
with the backup configuration file to make it easier to identify later.
7. Click OK. It may take a few minutes to create the backup file.
Scheduling Firmware Image Backups
NOTE: Cloud Backup must be enabled before you can schedule backups of your
firmware configuration file. This feature is not supported for Local Backup.
To schedule a backup: 1. Navigate to Device | Settings > Firmware and
Settings. 2. ClickCloud Backups. 3. If Cloud Backup has never been enabled,
enableCloud Backup. 4. Click Create Backup > Schedule Backup.
The Schedule Backup dialog is displayed.
SonicOS 7.1 Device Settings Administration Guide 78 Firmware Settings
5. Set the options for the backup you want to create: l To schedule a one-
time backup, see Scheduling a One-Time Backup l To schedule a recurring
backup, see Scheduling Recurring Backups l To schedule a mixed backup
schedule, select Mixed and configure the settings based on the procedure
explained in Scheduling a One-Time Backup and Scheduling Recurring Backups.
This schedule occurs repeatedly during the same configured hours and days of
the week, between the configured start and end dates.
Scheduling a One-Time Backup
To schedule one-time backup: 1. Navigate to Device | Settings > Firmware and
Settings. 2. Click Cloud Backups. 3. If Cloud Backup has never been enabled,
enable Cloud Backup. 4. Click Create Backup > Schedule Backup. 5. In the
Schedule Backup page, do the following: a. Select Once as Schedule Type. b. In
ONCE section, click calendar icon in Select Range field and set the schedule.
c. In the Once section, set the duration during which you want the backup to
be created. Select the Year, Month, Day, Hour, and Minute from the drop-down
menus to set the Start and End period for the backup.
SonicOS 7.1 Device Settings Administration Guide 79 Firmware Settings
d. Click Save.
Scheduling Recurring Backups
To schedule recurring backups: 1. Navigate to Device | Settings > Firmware and
Settings. 2. Click Cloud Backups. 3. If Cloud Backup has never been enabled,
enable Cloud Backup. 4. Click Create Backup > Schedule Backup. 5. Select
Recurring as the Schedule Type. 6. Do the following in the Recurring section:
a. Select the days on which you want the backup created. Click Select All to
select all the days at once.
b. Enter the Start Time and Stop Time for the report in 24-hour format (for
example, 02:00 for 2:00am and 14:00 for 2:00pm).
SonicOS 7.1 Device Settings Administration Guide 80 Firmware Settings
c. Click Add to add that report to the Schedule List. d. Repeat these steps
for each scheduled backup you want to create. 7. Click Save.
Deleting Scheduled Backups
To delete selected scheduled backups: 1. Navigate to Device | Settings >
Firmware and Settings. 2. Click Cloud Backups. 3. Click Create Backup >
Schedule Backup. The Schedule Backup dialog is displayed. 4. Click Delete icon
on the scheduled backups listed in the Schedule List section. 5. To delete all
the schedules at once, click Delete icon in the header row.
Updating Firmware
You can update firmware manually or use the Firmware Auto Update feature.
CAUTION: Uploading new firmware will overwrite any existing uploaded firmware
image. NOTE: Before uploading new firmware, it is recommended that you create
a backup of your current settings. See Creating a Backup Firmware Image for
more information on creating backups of your current configuration settings.
Topics: l Updating Firmware Manually l Firmware Auto Update l Using SafeMode
to Upgrade Firmware
Updating Firmware Manually
To update firmware manually: 1. Navigate to Device | Settings > Firmware and
Settings. 2. Click Upload Firmware. 3. Click OK to create a backup of your
current settings before uploading new firmware. The Upload Firmware dialog
displays.
SonicOS 7.1 Device Settings Administration Guide 81 Firmware Settings
4. Click Browse. The File Upload dialog displays. 5. Browse to the firmware
file located on your local drive. 6. Click Open. 7. Click Upload to upload the
new firmware to the SonicWall security appliance. A success message
displays in the Status bar, and the Firmware Management table displays the new
firmware. 8. Click the Boot icon for the firmware you just downloaded. 9.
Select whether you want to install the new firmware with your current
configuration or a the default
configuration. 10. Click OK. A message about the time to boot the firmware
displays. 11. Click OK. A message about the boot status displays in the Status
bar. 12. After the restart, when you log in again, the Device | Settings >
Firmware and Settings page reflects
the firmware update.
Firmware Auto Update
SonicOS supports the Firmware Auto Update feature, which helps ensure that
your SonicWall security appliance has the latest firmware release.
To set the Firmware Auto Update options: 1. Navigate to Device | Settings >
Firmware and Settings. 2. Click Settings. The Settings popup dialog displays
3. Click Firmware Auto Update. 4. Choose either: l Enable Firmware Auto-Update
– Displays an Alert icon when a new firmware release is available. This option
is selected by default.
SonicOS 7.1 Device Settings Administration Guide 82 Firmware Settings
l Download new firmware automatically when available – Downloads new firmware
releases to the SonicWall security appliance when they become available. This
option is not selected by default.
5. Click OK.
Using SafeMode to Upgrade Firmware
To Reviewers: Please verify this topic If you are unable to connect to the
SonicOS management interface, you can restart the security appliance in
SafeMode. The SafeMode feature allows you to recover quickly from uncertain
configuration states with a simplified management interface.
To use SafeMode to upgrade firmware: 1. Connect your computer to the X0 port
on the appliance and configure your computer with an IP address on the
192.168.168.0/24 subnet, such as 192.168.168.20. 2. To force the appliance
into SafeMode, use a narrow, straight object, like a straightened paper clip
or a toothpick, to press and hold the Reset button on the front of the
SonicWall appliance for at least twenty seconds, until the Test light begins
blinking. 3. The Test light begins to blink when the SonicWall security
appliance has rebooted into SafeMode. 4. Enter 192.168.1.254 into your
computer’s Web browser to access the SafeMode management interface. 5. Click
Upload New Firmware. 6. Browse to the location where you saved the SonicOS
firmware image. 7. Select the file and click Upload. 8. Select the Boot icon
in the row for one of the following: l Uploaded Firmware – New! – Use this
option to restart the appliance with your current configuration settings. l
Uploaded Firmware with Factory Default Settings- New! – Use this option to
restart the appliance with default configuration settings. 9. In the
confirmation dialog, click OK to proceed.
10. To connect to SonicOS through the LAN or WAN interface of the firewall:
a. Disconnect your computer from the MGMT port. b. Either: l Reconfigure it to
automatically obtain an IP address and DNS server address. l Reset it to its
normal static values.
11. Connect your computer to the local network. 12. Point your browser to the
LAN or WAN IP address of the SonicWall appliance.
SonicOS 7.1 Device Settings Administration Guide 83 Firmware Settings
13. After successfully booting the firmware, the log-in screen displays. If
you restarted with factory default settings, enter the default user name and
password (admin/password) to access the SonicOS management interface.
Importing and Exporting Settings
You can choose to import and export firmware management configuration
settings. Topics:
l Importing Settings l Exporting Settings
Importing Settings
NOTE: Before importing new configuration, it is recommended to export the
current configuration or upload a copy to the cloud. To import a previously
saved preferences file into the firewall: 1. Navigate to Device | Settings >
Firmware and Settings. 2. Click Import/Export Configuration > Import
Configuration.
IMPORTANT: It is recommended that you create a backup, either locally or to
the cloud, before proceeding. See Creating a Local Backup Firmware Image or
Creating a Cloud Backup Firmware Image for instructions on creating a firmware
configuration backup. 3. In the Import Configuration dialog, click Browse to
select the previously saved preference file with the configuration settings
into firewall. NOTE: The file you choose should have .exp file name extension.
SonicOS 7.1 Device Settings Administration Guide 84 Firmware Settings
4. Click Import. The active configuration will be overwritten upon import of
a new configuration file. Your SonicWall appliance will reboot automatically
once the import has completed.
Exporting Settings
The exported preferences file can be imported into the security appliance if
it is necessary to reset the firmware. To export configuration settings from
the firewall:
1. Navigate to Device | Settings > Firmware and Settings. 2. Click
Import/Export Configuration > Export Configuration.
3. In the Export Configuration window, click Export. IMPORTANT: The current
configuration of your SonicWall appliance is exported to a .exp file and is
available in your local system. The file can be imported by the same SonicWall
or used to clone a configuration across multiple SonicWall systems.
4. Click Close.
SonicOS 7.1 Device Settings Administration Guide 85 Firmware Settings
Configuring Firmware and Backup Settings
To configure firmware and backup settings: 1. Navigate to Device | Settings >
Firmware and Settings. 2. Click Settings. The Settings dialog is displayed.
Topics: l Send Settings or Reports by FTP l Sending Diagnostic Reports to
Technical Support l Firmware Auto Update l One-Touch Configuration Overrides l
Enabling FIPS Mode l Enabling NDPP mode
Send Settings or Reports by FTP
You can send configuration settings and/or tech support reports (TSRs, or
detailed reports of security appliance configuration and status) to a specific
FTP server on a one-time or scheduled basis. By scheduling when these reports
are sent to the FTP server, you can create and manage schedule objects and
enforce schedule times. To send diagnostic reports to Technical Support:
1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings.
SonicOS 7.1 Device Settings Administration Guide 86 Firmware Settings
3. Click Scheduled Reports.
4. To send TSRs by FTP, select the Send Tech Support Report by FTP. This
option is not selected by default.
5. To send configuration settings by FTP, select Send Settings by FTP. This
option is not selected by default.
6. When either or both of the Actions settings are selected, the server
fields become available. Make changes as necessary. a. Enter the server’s IP
address in the FTP Server field. The default is 0.0.0.0. b. Enter the user
name associated with the server in the User Name field. c. Enter the password
associated with the user name in the Password field. d. Enter the directory
where the reports are to be sent in the Directory field.
7. Click Set Schedule. The Settings dialog displays.
SonicOS 7.1 Device Settings Administration Guide 87 Firmware Settings
The Schedule Name is TSR Report Hours and cannot be changed. 8. Configure the
schedule. For how to configure a schedule, see Scheduling Firmware Image
Backups
section. 9. Click Save.
Sending Diagnostic Reports to Technical Support
To help determine system problems, you can send system diagnostics to
SonicWall Technical Support. To send diagnostic reports to Technical Support:
1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings.
3. Click DIAGNOSTICS . 4. Click Send Diagnostic Reports to Support. This can
take up to a minute. While sending the report, the
status bar at the bottom of the screen displays:
SonicOS 7.1 Device Settings Administration Guide 88 Firmware Settings
5. Click OK.
Boot Settings
To Reviewers: Do we have this option? I don’t see this option in Settings
dialog..
To boot your SonicWall network security appliance with diagnostics enabled: 1.
Navigate to Device | Settings > Firmware and Settings. 2. Click Settings. The
Settings dialog displays. 3. Click Boot with firmware diagnostics enabled (if
available). This option is not selected by default. 4. Click Apply.
One-Touch Configuration Overrides
NOTE: Be sure to export the configuration of you SonicWall security appliance
before executing a configuration override, so the current configuration may be
restored. Please refer to Exporting Settings. CAUTION: Be aware that the One-
Touch Configuration Overrides may change the behavior of your SonicWall
security appliance. Review the list of configurations before applying One-
Touch Configuration Overrides. In particular, these configurations may affect
your experience:
l Administrator password requirements on the Device | Settings page l
Requiring HTTPS management l Disabling HTTP-to-HTTPS redirect l Disabling Ping
management
The One-Touch Configuration Overrides feature is configured on the Settings
dialog available from the Device | Settings > Firmware and Settings page. It
can be thought of as a quick tune-up for your SonicWall network security
appliance’s security settings. With a single click, One-Touch Configuration
Overrides applies over sixty configuration settings to implement SonicWall’s
recommended best practices. These settings ensure that your appliance is
taking advantage of SonicWall’s security features.
To override the One-Touch Configuration settings: NOTE: A system restart is
required for the updates to take full effect. 1. Navigate to Device | Settings
Firmware and Settings. 2. Click Settings. The Settings dialog is displayed.
SonicOS 7.1 Device Settings Administration Guide 89 Firmware Settings
3. Scroll to the ONE-TOUCH CONFIGURATION OVERRIDES section.
l DPI and Stateful Firewall Security – For network environments with Deep
Packet Inspection (DPI) security services enabled, such as Gateway Anti-Virus,
Intrusion Prevention, Anti-Spyware, and App Rules.
l Stateful Firewall Security – For network environments that do not have DPI
security services enabled, but still want to employ SonicWall’s stateful
firewall security best practices.
Both of the One-Touch Configuration Overrides deployments implement the
following configurations: l Configure Administrator security best practices l
Enforce HTTPS login and disables ping l Configure DNS Rebinding l Configure
Access Rules best practices l Configure Firewall Settings best practices l
Configure Firewall Flood Protection best practices l Configure VPN Advanced
settings best practices l Configure Log levels l Enable Flow Reporting and
Visualization
The DPI and Stateful Firewall Security deployment also configures the
following DPI-related configurations:
l Enable DPI services on all applicable zones l Enable App Rules l Configure
Gateway Anti-Virus best practices l Configure Intrusion Prevention best
practices l Configure Anti-Spyware best practices To see exactly which
settings are reconfigured, click on the Preview link next to each button. A
page displays with a list of each setting and the value to which it will be
set.
Enabling FIPS Mode
When operating in FIPS (Federal Information Processing Standard) Mode, the
SonicWall security appliances support FIPS 140-2 Compliant security. Among the
FIPS-compliant features of the son include PRNG-based on SHA-1 and support of
only FIPS-approved algorithms (DES, 3DES, and AES with SHA-1).
To enable FIPs and see a list of which of your current configurations are not
allowed or are not present:
NOTE: The Enable FIPS Mode option cannot be enabled at the same time as the
Enable NDPP Mode option, which is also on the Firmware and Settings > Settings
dialog.
SonicOS 7.1 Device Settings Administration Guide 90 Firmware Settings
1. Navigate to Device | Settings > Firmware and Settings. 2. Click Settings.
3. Click FIPS/NDPP. 4. Enable the Enable FIPS Mode option.
5. Click OK. The FIPS Mode SETTING COMPLIANCE CHECKLIST dialog appears with a
list of your required and not allowed configurations.
6. If your SonicWall appliance: l Complies with the checklist, go to Step 7.
l Does not comply with the checklist, manually change or disable settings to
be compliant with FIPS mode setting compliance checklist. TIP: Leave the
checklist dialog open while you make the configuration changes. If you click
OK before all required changes are complete, the Enable FIPS Mode checkbox is
cleared automatically upon closing the verification dialog. Select the
checkbox again to see what configuration changes are still needed for FIPS
compliance.
7. Click OK to reboot the security appliance in FIPS mode. A second warning
displays. 8. Click Yes to continue rebooting. To return to normal operation,
clear the Enable FIPS Mode checkbox
and reboot the firewall in non-FIPS mode. CAUTION: When using the SonicWall
security appliance for FIPS-compliant operation, the tamper-evident sticker
that is affixed to the SonicWall security appliance must remain in place and
untouched.
SonicOS 7.1 Device Settings Administration Guide 91 Firmware Settings
Enabling NDPP mode
A SonicWall network security appliance can be enabled to be compliant with
Network Device Protection Profile (NDPP), but certain security appliance
configurations are either not allowed or are required.
NOTE: NDPP is a part of Common Criteria (CC) certification. However, NDPP in
SonicOS is not currently certified. The security objectives for a device that
claims compliance to a Protection Profile are defined as: Compliant TOEs
(Targets Of Evaluation) will provide security functionality that address
threats to the TOE and implement policies that are imposed by law or
regulation. The security functionality provided includes protected
communications to and between elements of the TOE; administrative access to
the TOE and its configuration capabilities; system monitoring for detection of
security relevant events; control of resource availability; and the ability to
verify the source of updates to the TOE. When you enable NDPP, a popup message
displays with the NDPP mode setting compliance checklist. The checklist
displays every setting in your current SonicOS configuration that violates
NDPP compliance so that you can change these settings. You need to navigate
around the SonicOS management interface to make the changes. The checklist for
an appliance with factory default settings is shown in the following
procedure.
To enable NDPP and see a list of which of your current configurations are not
allowed or are not present::
NOTE: The Enable NDPP Mode option cannot be enabled at the same time as the
Enable FIPS Mode option, which is also on the Firmware & Backups > Settings
dialog. 1. Navigate to Device | Settings > Firmware and Settings. 2. Click
Settings. 3. Click FIPS / NDPP. 4. Select Enable NDPP Mode.
The NDPP MODE SETTING COMPLIANCE CHECKLIST appears with a list of your
required and not allowed configurations. 5. If your SonicWall appliance:
l Complies with the checklist, go to Step 6. l Does not comply with the
checklist, manually change or disable settings to be compliant with
NDPP mode requirement.
SonicOS 7.1 Device Settings Administration Guide 92 Firmware Settings
TIP: Leave the checklist dialog open while you make the configuration changes.
If you click OK before all required changes are complete, the Enable NDPP Mode
option is cleared automatically upon closing the checklist dialog. Select the
option again to see what configuration changes are still needed for NDPP
compliance. 6. Click OK.
SonicOS 7.1 Device Settings Administration Guide 93 Firmware Settings
9
Storage
The DEVICE | Settings > Storage > Overview page displays information for your
network security appliance about:
l Primary storage l Secondary storage (if available for your network security
appliance) l Both Primary and Secondary storages are available in NSa 4700
series and higher, all NSsp and TZ
series appliances.
l Local storage available only in NSv series appliances.
The advantages of Storage are:
SonicOS 7.1 Device Settings Administration Guide 94 Storage
l The Storage module stores diagnostic data, configuration backups, and logs
from system logs, threat logs, Appflow Report data, and packet captures. Logs
from 7.0.1 are preserved on the tab named Logs (Legacy),but no new logs are
added.
l Storage allows logs to persist when firewall is rebooted. l The system logs,
threat logs, and packet capture is allocated 10% of the total storage space
each. l The Appflow Report also gets 10% allocation. Topics: l Storage
Overview Tab l Storage File Tab
Storage Overview Tab
Only 4700 to 13700 modules allow selection of Primary or Secondary devices if
the secondary device is available and valid. TZs, NSa 2700 and NSa 3700 only
allows applications to write to secondary storage, primary storage is for
System, diagnostic and configuration data only. For NSv, only one storage
exists Local Storage, applications can write into this storage. You can change
the storage option. It is required to reboot for the changing the storage
device to take effect. Only Packet capture and Logs (Legacy) allows deletion
of files. System Logs, Threat Logs and Appflow Report does not allow deletion
of files. Storage is disabled if your security appliance does not have any
available storage modules. Unlike Primary Storage, that is meant to be used by
only one firewall, the Secondary Storage module is a shared device that can be
used on multiple firewalls if successfully activated on each firewall. In the
Secondary Storage module, a top-level directory is created with the firewall
EPAID as the directory name. Applications creat subdirectories inside this
top-level directory and store their data there. The Overview tab displays a
pie chart representation of each storage module. It gives a high level
representation of storage space used by each module and also the remaining
available space. The log names in the chart are interactive-clicking on them
redirects to specific storage tabs.
SonicOS 7.1 Device Settings Administration Guide 95 Storage
Each storage module is assigned with 10% of the total storage space.
Diagnostics Data
The Diagnostic Data tab displays diagnostics files stored on disk allowing
users to download these files from this tab for further analysis. To view and
download diagnostics data:
1. Navigate to Device | Settings > Storage > Files. 2. Click on Diagnostics
Data tab.
This page displays all the created files. 3. Hover on the file that you need
to download and click on the Download icon .
NOTE: The file downloaded are encrypted so use decryptor to view the contents.
SonicOS 7.1 Device Settings Administration Guide 96 Storage
Configuration Backup
The Configuration Backup tab lists firewall configuration files. This tab
allows the administrators the ability to perform various operations similar to
those available on the Device > Firmware > Settings page.
To create backup: 1. Navigate to Device | Settings > Storage > Files 2. Click
on Configuration Backup tab.
3. Expand the required firmware version and you can do the following:
Icon
Definition
This icon helps to retain the selected configuration file so that it is not
overwritten during auto or local backup.
This icon helps to make the selected configuration file as Gold Master.
This icon helps to boot the firmware with selected configuration file.
This icon helps to download the selected configuration file.
This icon helps to add/edit a comment to the selected configuration file.
This icon helps to delete the selected configuration file.
4. Click on Create Backup. 5. Enable or disable the Retain Local Backup option as per your requirement. 6. Add comment to the Comment text box. 7. Click OK.
SonicOS 7.1 Device Settings Administration Guide 97 Storage
NOTE: The backup created is stored in Primary storage only and cannot be
changed.
System Logs
The System Logs tab displays the files containing system log events, allowing
to export them in CSV format or download as an SQLite database file. To manage
storage capacity, older files are rotated out when the disk is nearing full,
ensuring space for new log entries. You can review system log events on the
Monitor > Logs > System Logs page. To store System Logs to External Storage:
1. Navigate to DEVICE | Settings > Storage > Files. 2. Click on System Logs
tab.
SonicOS 7.1 Device Settings Administration Guide 98 Storage
3. Click on Settings tab. Screen
Description
For NSa 4700 series and higher and all NSsp series appliances:
l Enable the Enable Logging to Storage for storing system logs, threat logs,
audit logs, and AppFlow report data.
l Select Primary or Secondary from the Storage Device Type drop-down. NOTE:
Requires a reboot for the changing the storage device to take effect. The
Firewall displays files and data only from the active storage.
For TZ and NSvseries appliances:
l Enable the Enable Logging to Storage for storing system logs, threat logs,
audit logs, and AppFlow report data.
NOTE: Enabling Enable Logging to Storage requires a reboot for the changes to take effect.
4. Click OK.
Threat Logs
The Threat Logs tab displays files containing app flow sessions marked with
threats, viruses, instructions, spyware, and botnet activities. You can export
these files in CSV format or download them as SQLite database files. To manage
storage capacity, older files are rotated out when the disk is nearing full,
ensuring space for new log entries. You can review the threat logs in Monitor
Logs > Threat Logs page. To export the threat logs:
1. Navigate to DEVICE | Settings > Storage > Files. 2. Click the Threat Logs tab. 3. Click the Download icon beside the selected threat log. 4. Select Export to CSV or Download File.
SonicOS 7.1 Device Settings Administration Guide 99 Storage
5. Click on Settings tab. Screen
Description
For NSa 4700 series and higher and all NSsp series appliances:
l Enable the Enable Logging to Storage for storing system logs, threat logs,
audit logs, and AppFlow report data.
l Select Primary or Secondary from the Storage Device Type drop-down. NOTE:
Requires a reboot for the changing the storage device to take effect. The
Firewall displays files and data only from the active storage.
For TZ and NSvseries appliances:
l Enable the Enable Logging to Storage for storing system logs, threat logs,
audit logs, and AppFlow report data.
NOTE: Enabling Enable Logging to Storage requires a reboot for the changes to take effect.
6. Click OK.
Packet Captures
The Packet Capture tab displays recorded packet files, exportable in PCAPNG
format. As storage nears capacity, older files are rotated to accommodate new
files. These files become available when packet capturing is activated, that
is when the Enable logging to Storage option is enabled in Monitor > Packet
Monitor settings page. The setting ensures the capture buffer is being
utilized, triggering availability once it is full.
SonicOS 7.1 Device Settings Administration Guide 100 Storage
To enable packet capturing: 1. Navigate to Monitor | Tools & Monitors > Packet Monitor > General. 2. Enable the Enable logging to Storage.
3. Click Save.
To download, export and/or delete packet capture files from Storage: 1.
Navigate to DEVICE | Settings > Storage > Files. 2. Click the Packet Captures
tab.
3. Hover on the file to view the options.
Icon
Definition
This icon helps to download the selected file.
This icon helps to delete the selected file.
SonicOS 7.1 Device Settings Administration Guide 101 Storage
Logs (Legacy)
The Logs (Legacy) displays a list of stored event log files collected from a
previous SonicOS version, retained for historical purposes. You can export or
delete each file as needed. To export or delete the logs:
1. Navigate to Device | Settings > Storage > Files 2. Click on Logs (Legacy)
tab.
3. Hover on the log file to view the options. Icon Definition
This icon helps to download (export) the selected file. This icon helps to
delete the selected file.
SonicOS 7.1 Device Settings Administration Guide 102 Storage
10
Restarting the System
To restart the firewall: CAUTION: The restarting process takes few minutes.
During the restart time, all users are disconnected. If you made any changes
to the settings, apply them before you restart. 1
References
- MySonicWall
- draft-nourse-scep-18
- MySonicWall
- SonicWall Community | Technology and Support
- MySonicWall
- MySonicWall
- sonicwall.com/legal
- sonicwall.com/legal/end-user-product-agreements/
- sonicwall.com/support
- sonicwall.com/support/contact-support
- sonicwall.com/support/contact-support/
- sonicwall.com/support/technical-
- sonicwall.com/support/technical-documentation
- sonicwall.com/support/technical-documentation/
- sonicwall.com/support/technical-documentation/?language=English&category=Firewalls&resources=Administration%20Guide&version=7.1
- sonicwall.com/support/technical-documentation/?language=English&category=Firewalls&resources=Getting%20Started%20Guide
- sonicwall.com/support/technical-documentation/?q=sonicos%20api&language=English
- sonicwall.com/support/technical-documentation/sonicos-7-1-api
- sonicwall.com/support/technical-documentation/sonicos-7-1-monitor
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>