SONICWALL SonicOS 7.1 DNS Security User Guide
- June 15, 2024
- SONICWALL
Table of Contents
SonicOS 7.1
DNS Security
Administration Guide
About SonicOS
This guide is a part of the SonicOS collection of administrative guides that
describes how to administer and monitor the SonicWall family of firewalls.
SonicOS provides network administrators the management interface, API
(Application Program Interface), and the Command Line Interface (CLI) for
firewall configuration by setting objects to secure and protect the network
services, to manage traffic, and to provide the desired level of network
service. This guide focuses on how to configure the DNS settings, Dynamic DNS,
and DNS Proxy settings on the SonicWall security appliances
Working with SonicOS
SonicOS provides a web management interface for configuring, managing, and
monitoring the features, policies, security services, connected devices, and
threats to your network. SonicOS runs on top of SonicCore, SonicWall’s secure
underlying operating system.
The SonicOS management interface facilitates:
- Setting up and configuring your firewall
- Configuring external devices like access points or switches
- Configuring networks and external system options that connect to your firewall
- Defining objects and policies for protection
- Monitoring the health and status of the security appliance, network, users, and connections
- Monitoring traffic, users, and threats
- Investigating events
SonicWall offers two different modes of operation in SonicOS; the modes differ mainly in the areas of policy, object configuration and diagnostics.
- Policy Mode provides a unified policy configuration work flow. It combines Layer 3 to Layer 7 policy enforcement for security policies and optimizes the work flow for other policy types. This unified policy work flow gathers many security settings into one place, which were previously configured on different pages of the management interface.
- Classic Mode is more consistent with earlier releases of SonicOS; you need to develop individual policies and actions for specific security services. The Classic Mode has a redesigned interface.
This table identifies which modes can be used on the different SonicWall firewalls:
Firewall Type | Classic Mode | Policy Mode | Comments |
---|---|---|---|
TZ Series | yes | no | The entry level TZ Series, also known as desktop |
firewalls, deliver revamped features such as 5G readiness, better connectivity
options, improved threat, SSL and decryption performance that address HTPPS
bandwidth issues; built-in SDWAN, and lawful TLS 1.3 decryption support.
NSa Series| yes| no| NSa firewalls provide your mid sized network with
enhanced security . They are designed specifically for businesses with 250 and
up. it can provide cloud-based and on-box capabilities like TLS/SSL decryption
and inspection, application intelligence and control, SD-WAN, real-time
visualization, and WLAN management.
NSsp 10700, NSsp 11700,
NSsp 13700| yes| no| The NSsp platforms high-end firewalls that deliver the
advanced threat protection and fast speeds that large enterprises, data
centers, and service providers need.
NSsp 15700| no| yes| The NSsp 15700 is designed for large distributed
enterprises, data centers, government agencies and services providers. It
provides advanced threat protection like Real-Time Deep Memory Inspection,
multi-instance firewall configuration, and unified policy creation and
modification, with scalability and availability.
NSv Series| yes| yes| The NSv series firewalls offers all the security
advantages of a physical firewall with the operational and economic benefits
of virtualization. The NSv firewalls can operate in either Policy Mode or
Classic Mode. You can switch between modes, but some configuration information
from extra interfaces is removed.
In addition to the management interface, SonicOS also has a full-featured API
and a CLI to manage the firewalls.
For more information, refer to:
SonicOS Workflow
When working with SonicWall products, you can use the following workflow as
a guide for setting up your security solution.You begin your planning as you start making
your purchasing decisions. Your sales partners can help you assess your
network and make recommendations based on the kinds of security services you
need. You can learn more about SonicWall products by reviewing product
information and
solutions. After selecting the
solution, you can schedule your implementation.
After planning and scheduling your solution, you begin setting up the
firewalls. The Getting Started Guides
for 0your products can help you begin setting up the pieces to your solution.
The getting started guides are designed to help you install the firewall to a
minimal level of operation. Before performing any detailed configuration tasks
described in the SonicOS Administration Guides, you should have your firewall
set up and basic operation validated.
The configuration block of the workflow refers to the many tasks that combine
to define how your firewall is integrated into your security solution and how
it behaves when protecting your environment. Depending on the features of your
security solution, this task can be quite complex. The System Administration
Guides are broken into the key command sets and features. Some documents may
be used for all solutions, but others may be used use only if you integrated
that feature into your solution. For example, High Availability or Wireless
Access Points are not necessarily used by all customers. More information
about a feature’s workflow is presented in the feature administration guide.
Refer to the specific Administration Guide for a SonicOS
feature
for more information.
Configuration tends to be a one-time activity, although you might make minor
adjustments after monitoring performance or after diagnosing an issue. The
configuration activity can be broken down into the more detailed flow as the
following figure shows. This also mirrors the key functions that are listed
across the top of the management interface.There is some flexibility in the order in
which you do things, but this is the general work-flow you would follow when
configuring your firewall. Start by defining the settings on the firewall.
Next you set up the system and other devices that your firewall is connected
to, and you can choose to implement High Availability when done. After your
device, network, and system is configured, you should define the objects that
you want to monitor. Then you use those objects to define the policies that
protect your network. The final step to preparing your setup is to validate
the user authentication.
How to Use the SonicOS Administration Guides
The SonicOS Administration Guide is a collection of guides that detail the
features represented by each of the main menu items in the management
interface. Within each guide, you can find topics covering commands in that
menu group, along with procedures and in-depth information. The exceptions are
the SonicOS 7.1 Monitor Guide and the SonicOS 7.1 Objects Guide which
combine the topics for each of those functions into a single book. To help you
understand how the books align with the features and commands, the following
figure shows the books organized like the SonicWall management interface. The
SonicOS Administration Guides, along with related documentation, such as the
getting started guides, are available on the
https://www.sonicwall.com/support/technical-documentation/.
Guide Conventions
These text conventions are used in this guide:
NOTE: A NOTE icon indicates supporting information.
IMPORTANT: An IMPORTANT icon indicates supporting information.
TIP: A TIP icon indicates helpful information.
CAUTION: A CAUTION icon indicates potential damage to hardware or loss of
data if instructions are not followed.
WARNING: A WARNING icon indicates a potential for property damage,
personal injury, or death.
Convention | Description |
---|---|
Bold text | Used in procedures to identify elements in the management interface |
like dialog boxes, windows, screen names, messages, and buttons. Also used for
file names and text or values you are being instructed to select or type into
the interface.
Function | Menu group > Menu item| Indicates a multiple step menu choice on
the user interface. For example, NETWORK | System > Interfaces means to select
the ETWORK functions at the top of the window, then click on System in the
left navigation menu to open the menu group (if needed) and select Interfaces
to display the page.
Code| Indicates sample computer programming code. If bold, it represents text
to be typed in the command line interface.
About Policy
SonicOS comes equipped with several features to configure policy. The other policy configuration tools are group under the POLICY option as follows.
- Rules and Policies – To configure the setting rules and policies.
- DPI-SSL – DPI-SSL is a separate, licensed feature that provides inspection of encrypted HTTPS traffic and other SSL-based IPv4 and IPv6 traffic.
- DPI-SSH – To configure the decryption DPI-SSH.
- Security Services – Security Services settings allow a choice of operating for maximum security, or accepting less than the highest security level but with higher network performance levels.
- Anti-Spam – Anti-Spam is a separate, licensed feature that provides a quick, efficient, and effective way to add anti-spam, anti-phishing, and anti-virus capabilities to your existing firewall.
- Capture ATP – Capture Advanced Threat Protection (ATP) helps a firewall identify whether a file is malicious by transmitting the file to the cloud where the SonicWall Capture ATP service analyzes the file to determine if it contains a virus or other malicious elements.
- DNS Security – The Domain Name System (DNS) Security is a domain categorization service by integrating with public DNS Server Neustar.
- Endpoint Security – Manage logs for your product subscriptions and licensed security products in one location. Security products include Capture Client, Content Filtering, Intrusion Prevention, App Control, Botnet/GeoIP Filtering, and Gateway Anti-Virus/Anti Spyware/Capture ATP.
DNS Security Introduction
The Domain Name System (DNS) Security is a domain categorization service by
integrating with public DNS Server Neustar. The following are the features of
DNS Security:
- Provide central DNS management by leveraging SonicOS DNS proxy
- Support DNS Filtering enforcement in both UPE and Global mode
- Support EDNS packet process and DNS category processing report
- Inspect and deny domains associated with malicious activity over 19 pre-defined categories
- Early Malware detection with out decryption
The DNS tools are group under the POLICY | DNS Security options allows you to configure DNS Security.
DNS Filtering Dashboard
The Dashboard is the default view when you log in to SonicOS for the first
time. The navigation path is HOME > Dashboard > System. It provides several
sections and tabs for viewing the status of your SonicOS firewall and shows a
graphical representation of key firewall features and performance. The
Dashboard can be your starting place for monitoring performance. Symbols and
colors are used to indicate whether things are operational, need attention, or
if a problem needs to be resolved.
Click the DNS Filtering tab in HOME > Dashboard > System to view the DNS
Filtering status.
Configuring DNS Security Settings
The POLICY | DNS Security page allows you to manually configure your DNS
security settings at the unit and group levels.
About DNS Filtering
Before SonicOS 7.x, SonicOS doesn’t have the domain categorization service
SonicOS 7.1 onwards, SonicOS has central DNS management by leveraging DNS
proxy, and DNS security features like DNS Filtering, DNS Sinkhole service ,and
DNS Tunnel Detection.
The following are the configuration change reference.
Before 7.x | After 7.x |
---|---|
Global Enable DNS Proxy | No longer needed |
Enable DNS Proxy per interface | In each DNS Policy, configure the source |
interface
DNS Proxy Mode| Configured in each DNS Policy
Enforce DNS Proxy For All DNS Requests| As origin
Enable DNS Proxy Cache| As origin
Neustar is a public DNS Server which has intelligence of domain name
categorization. By integrating Neustar DNS service with SonicWall firewall, we
obtain domain categorization service along with DNS for SonicWall
customers.SonicWall support profiles to take different actions on different
categories, then the DNS Packet will process according to the action. Neustar
support 19 pre-defined categories and SonicWall support 4 actions.
Configuring DNS Filtering
Prerequisite:
To use DNS Filtering, user has to do the following configurations:
- Ensure DNS Filtering is licensed under Gateway Services in the license page
- Add/Edit/Delete DNS policy manually in the Policy > Rules and Polices > DNS Rules. For more information on adding DNS policy, refer to the SonicOS Rules and Policies guide
- Add/Edit/Delete DNS Profile in the Object > Profile Objects> DNS Filtering. For more information on adding DNS policy, refer to the SonicOS Objects guide
- Set the DHCP DNS Server Lease Scopes interface as the interface IP of firewall in the Dynamic Range Configuration. For more information on adding Dynamic, refer to the SonicOS system guide
- Enable Enforce DNS Proxy For All DNS Requests at DNS Proxy settings in the Network > DNS > DNS Proxy
To configure Global settings:
-
Navigate to POLICY | DNS Security > Settings.
-
Hover over to the DNS Filtering tab.
-
Click the Global Settings tab. Enable the option Enable White List.
NOTE: White List can be used for both DNS Sinkhole Service and DNS Filtering. -
Configure both Forged IPv4 Address and Forged IPv6 Address.
-
Click Accept.
To configure Custom Domain:
- Navigate to POLICY | DNS Security > Settings.
- Hover over to the DNS Filtering tab.
- Click the Custom Domain tab.
- Under Category Information, you can find the different type of categories and the categories explanation.
- For each domain name you want to add as a custom domain name under the Config Custom Domain section:
a. Click +Add. The Add DNS filter Custom Domain dialog displays.
b. Enter the custom domain name in the Domain Name field.
c. Select the category type from the drop-down in the Category field.
d. Click Save.
Configuring DNS Sinkhole Service
A DNS sinkhole also known as a sinkhole server, Internet sinkhole, or
Blackhole DNS — is a DNS server that gives out false information to prevent
the use of the domain names it represents. DNS sinkholes are effective at
detecting and blocking malicious traffic, and used to combat bots and other
unwanted traffic.
SonicOS provides the ability to configure a sinkhole with black and white
lists.
To configure DNS Sinkhole settings:
-
Navigate to POLICY | DNS Security > Settings.
-
Hover over to the DNS Sinkhole Service tab.
-
Select Enable DNS Sinkhole Service under the Settings tab. This option is not selected by default.
-
Click the Global Settings tab. Enable the option Enable White List.
-
From the Action drop-down menu, select what the service should do:
• Dropping with Logs
• Dropping with Negative DNS reply to Source
• Dropping with DNS reply of Forged IP -
Ensure the IPv4 address and IPv6 address, Current Detection, and Malicious Domain in the fields.
-
Click Accept.
To configure Custom Malicious Domain Name List:
- Navigate to POLICY | DNS Security > Settings.
- Hover over to the DNS Sinkhole Service tab.
- Click the Custom Malicious Domain Name tab.
- For each domain name you want to add as a malicious domain name:
a. Click +Add. The Add One Domain Name dialog displays.
b. Enter the malicious domain name in the Domain Name field.
c. Click Save.
Deleting Entries in the Custom Malicious Domain Name List
To delete the entries in a list:
- Navigate to POLICY | DNS Security > Settings.
- Hover over to the DNS Sinkhole Service tab.
- Click the Custom Malicious Domain Name tab.
- Select an entry to delete or select the top checkbox next to the Domain Name column to select all of the items in the list.
- Click Delete.
Configuring DNS Tunnel Detection
DNS tunneling is a method of bypassing security controls and exfiltrating data
from a targeted organization. A DNS tunnel can be used as a full remote-
control channel for a compromised internal host. Capabilities include
Operating System (OS) commands, file transfers, or even a full IP tunnel.
SonicOS provides the ability to detect DNS tunneling attacks, displays
suspicious clients, and allows you to create white lists for DNS tunnel
detection.
When DNS tunneling detection is enabled, SonicOS logs whenever suspicious DNS
packets are dropped.
NOTE: DNS Tunneling settings can be made at the group or unit level.
Configuring DNS Tunnel Detection
To configure DNS tunnel detection:
- Navigate to POLICY | DNS Security > Settings.
- Click the DNS Tunnel Detection tab.
- Under Settings, select Enable DNS Tunnel Detection to enable DNS tunnel detection.
- To block all the DNS traffic from the detected clients, select Block All The Clients DNS Traffic.
- Click Accept.
Detected Suspicious Client Information
SonicOS displays information about all hosts that have established a DNS
tunnel in the Detected Suspicious Clients Info table.
To view detected suspicious client Information:
- Navigate to POLICY | DNS Security > Settings.
- Hover over to the DNS Tunnel Detection tab.
- Click on the Detected Suspicious Clients Info tab.
This table is populated only if DNS tunnel detection is enabled. Hosts are dropped only if blocking clients DNS traffic is enabled. For more information, refer to Configuring DNS Tunnel Detection.
IP Address | IP address of the suspicious client |
---|---|
MAC Address | MAC address of the suspicious client |
Detection Method | DNS type used to detect suspicious clients: |
• Normal DNS Type: A, AAAA, CNAME
• Corner DNS Type: such as TXT, NULL, SRV, PRIVATE, and MX
Interface| Interface on which the host establishing the DNS tunnel was
detected
Block| Indicates whether the host was blocked
Creating White list for DNS Tunnel Detection
You can create white lists for IP address you consider safe. If a detected DNS
tunnel IP address matches an address in the white list, DNS tunnel detection
is bypassed.
To create a DNS white list:
- Navigate to POLICY | DNS Security > Settings.
- Hover over to the DNS Tunnel Detection tab.
- Click on the White List for DNS Tunnel Detection tab.
- For each IP address you want to add to the white list:
a. Click +Add. The Add One White Entry dialog displays.
b. In the IP Address field, enter the IP address of the domain to be added to the whitelist.
c. Click Save.
Deleting White List Entries for DNS Tunnel Detection
To delete all white list entries for DNS tunnel detection:
- Navigate to POLICY | DNS Security > Settings.
- Hover over to the DNS Tunnel Detection tab.
- Click on the White List for DNS Tunnel Detection tab.
- Select an entry to delete or select the top checkbox next to the IP Address column to select all of the items.
- Click Delete.
White List
You can create white lists for IP address you consider safe.
NOTE: The default URLs on White List is deleted by design. Now its
displays No data as default.
To create a white list:
- Navigate to POLICY | DNS Security > Settings.
- Click the White List tab.
- For each domain name you want to add to the white list:
a. Click +Add. The Domain Name dialog displays.
b. In the Domain Name field, enter the white list domain name.
c. Click Save.
To delete all white list:
- Navigate to POLICY | DNS Security > Settings.
- Click the White List tab.
- Select an entry to delete or select the top checkbox next to the IP Address column to select all of the items.
- Click Delete.
Reports
Navigation to HOME > Dashboard > System.to view the overview of DNS Filtering
data and reports. The POLICY | DNS Security > Reports page allows you to view
the different types of reports and to export data.
Statistic
Navigate to Policy > DNS Security > Reports and click Statistic tab, this page
allows you to view these categories of statistic reports.
-
Security – You can view the total number of reports under the following categories.
• Malware
• Phishing
• Anonymous Proxies
• Spyware
• Parked Domains
• Hacking/Warez/P2P
• Ransomware
• Bots/C2 -
Mature – You can view the total number of reports under the following categories
• Adult
• Gambling
• Pornography
• Violence
• Dating
• Drugs
• Alcohol
• Discrimination/Hate -
Enterprise – You can view the total number of reports under the following categories
• Gaming
• Social
• Sports
Domain
Navigate to Policy > DNS Security > Reports and click Domain tab, this page
allows you to view the list of domains, number of count, percentage, and
categories.
-
You can select All Domains or the Blocked Domains only from the drop-down menu.
-
You can select All Categories or a specific category from the drop-down menu.
-
You can view the list of domains based on the time frame hovering your mouse pointer over one of the following options on the time frame button.
• 30 Minutes
• 60 Minutes
• 12 Hours
• 24 Hours
• 7 Days
• 15 Days
• 30 Days
• All -
You can limit the number of domains entries by selecting one of the following options from the drop-down menu.
• 10 Entries
• 50 Entries
• 100 Entries
• 500 Entries
• 1000 Entries
• Unlimited Entries -
You can view the license status of DNS Filtering and availability of External Storage status.
Host
Navigate to Policy > DNS Security > Reports and click Host tab, this page
allows you to view the list of Hosts, number of count, percentage, and
categories.
-
You can select All Hosts or the Blocked Hosts only from the drop-down menu.
-
You can view the list of hosts based on the time frame hovering your mouse pointer over one of the following options from the time frame button.
• 30 Minutes
• 60 Minutes
• 12 Hours
• 24 Hours
• 7 Days
• 15 Days
• 30 Days
• All -
You can limit the number of hosts entries by selecting one of the following options from the drop-down menu.
• 10 Entries
• 50 Entries
• 100 Entries
• 500 Entries
• 1000 Entries
• Unlimited Entries -
You can view the license status of DNS Filtering and availability of External Storage Status.
Database
Navigate to Policy > DNS Security > Reports and click Database tab, this page
allows you to view the status of database storage and to export the database:
-
You can view the following status under the Status of Database Storage section.
• Memory Storage Size
• External Storage Status
• Percentage of External Storage Usage -
Click Export Database under Action section to export the database.
A pop-up appears for the export confirmation.
Click OK. -
Click Refresh to view the up to date status of database storage.
SonicWall Support
Technical support is available to customers who have purchased SonicWall
products with a valid maintenance contract.
The Support Portal provides self-help tools you can use to solve problems
quickly and independently, 24 hours a day, 365 days a year. To access the
Support Portal, go to https://www.sonicwall.com/support.
The Support Portal enables you to:
- View knowledge base articles and technical documentation
- View and participate in the Community forum discussions at https://community.sonicwall.com/technology-and-support.
- View video tutorials
- Access https://mysonicwall.com
- Learn about SonicWall Professional Services at https://sonicwall.com/pes.
- Review SonicWall Support services and warranty information
- Register for training and certification
- Request technical support or customer service
To contact SonicWall Support, visit https://www.sonicwall.com/support
/contact-support.
About This Document
SonicOS DNS Security Administration Guide
Updated – December 2023
Software Version – 7.1
232-005884-00 Rev A
Copyright © 2023 SonicWall Inc. All rights reserved.
The information in this document is provided in connection with SonicWall
and/or its affiliates’ products. No license, express or implied, by estoppel
or otherwise, to any intellectual property right is granted by this document
or in connection with the sale of products.
EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE
AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR ITS AFFILIATES ASSUME NO
LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY
RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN
NO EVENT SHALL SONICWALL AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT,
INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS
OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN
IF SONICWALL AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. SonicWall and/or its affiliates make no representations or
warranties with respect to the accuracy or completeness of the contents of
this document and reserves the right to make changes to specifications and
product descriptions at any time without notice. and/or its affiliates do not
make any commitment to update the information contained in this document.
For more information, visit https://www.sonicwall.com/legal.
End User Product Agreement
To view the SonicWall End User Product Agreement, go to:
https://www.sonicwall.com/legal/end-user-product-agreements/.
Open Source Code
SonicWall Inc. is able to provide a machine-readable copy of open source code
with restrictive licenses such as GPL, LGPL, AGPL when applicable per license
requirements. To obtain a complete machine-readable copy, send your written
requests, along with certified check or money order in the amount of USD 25.00
payable to “SonicWall Inc.”, to:
General Public License Source Code Request
Attn: Jennifer Anderson
1033 McCarthy Blvd
Milpitas, CA 95035
References
- SonicWall Community | Technology and Support
- MySonicWall
- sonicwall.com/pes
- MySonicWall
- sonicwall.com/legal
- sonicwall.com/legal/end-user-product-agreements/
- sonicwall.com/support
- sonicwall.com/support/contact-support
- sonicwall.com/support/technical-documentation/
- sonicwall.com/support/technical-documentation/?language=English&category=Firewalls&resources=Administration%20Guide&version=7.1
- sonicwall.com/support/technical-documentation/?language=English&category=Firewalls&resources=Getting%20Started%20Guide
- sonicwall.com/support/technical-documentation/?q=sonicos%20api&language=English
- sonicwall.com/support/technical-documentation/sonicos-7-1-api
- sonicwall.com/support/technical-documentation/sonicos-7-1-monitor
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>