Enabling and Configuring SNMP Access53
Setting Up SNMPv3 Groups and Access57
Configuring SNMP as a Service and Adding Rules60
Firmware Settings61
Firmware Management and Backup61
Firmware Management & Backup Tables62
Searching the Table64
Creating a Backup Firmware Image65
Creating a Local Backup Firmware Image65
Creating a Cloud Backup Firmware Image66
Scheduling Firmware Image Backups66
Updating Firmware69
Updating Firmware Manually69
Firmware Auto Update70
Using SafeMode to Upgrade Firmware70
Importing and Exporting Settings71
Importing Settings71
Exporting Settings72
Configuring Firmware and Backup Settings72
SonicOS 7 Device SettingsAdministration Guide
Contents
3
Send Settings or Reports by FTP73
Sending Diagnostic Reports to Technical Support75
Boot Settings75
One-Touch Configuration Overrides75
Enabling FIPS Mode76
Enabling NDPP mode78
Storage79
Installing or Replacing Storage Modules80
Setting Storage Options80
Configuring the Storage Module for Log File Storage80
Purging a Storage Module81
Viewing Trace Logs81
Restarting the System82
SonicWall Support83
About This Document84
SonicOS 7 Device SettingsAdministration Guide
Contents
4
About Device Settings
The web‐based SonicOS Management Interface enables you to configure SonicWall network security
appliances (firewalls).
This document provides information on:
l Managing SonicWall Licenses
l System Administration
l Configuring Time Settings
l Managing Certificates
l Administering SNMP
l Firmware Settings
l Restarting the System
1
SonicOS 7 Device SettingsAdministration Guide
About Device Settings
5
Managing SonicWall Licenses
IMPORTANT: By design, the SonicWall License Manager cannot be configured to use a third-party
proxy server. Networks that direct all HTTP and HTTPS traffic through a third-party proxy server may
experience License Manager issues.
Topics:
l Licenses
l Managing Security Services
l Registering Your SonicWall Appliance
l Activating the Gateway Anti-Virus, Anti-Spyware, and IPS License
l Activating FREE TRIALs
2
Licenses
Device | Settings > Licenses page in the SonicOS management interface provides links to activate,
upgrade, or renew SonicWall Security Services licenses. From this page, you can manage all the licenses for
your SonicWall security appliance. The information listed in the Services table is updated from your
mysonicwall.com account. The Licenses page also includes links to FREE trials of SonicWall Security
Services.
SonicOS 7 Device SettingsAdministration Guide
Managing SonicWallLicenses
6
Managing Security Services
When you have established your Internet connection, it is recommended you register your SonicWall
security appliance, which provides the following benefits:
l Try a FREE 30-day trial of SonicWallGateway Anti-Virus, Anti-Spyware, and Intrusion Prevention,
Content Filtering Service, and Client Anti-Virus
l Activate SonicWall Anti-Spam
l Activate SonicWall security services and upgrades
l Access SonicOS firmware updates
l Get SonicWall technical support
Topics:
l Services Summary
l Managing Security Services Online
Services Summary
The Device | Settings > Licenses page lists all the available and activated services on the SonicWall
security appliance. The friendly name of the security appliance is displayed above the SERVICES table.
Select appropriate option in the View drop-down box to list the services based on their activation status. The
available options are:
l Licensed and Unlicensed
l Licensed
l Unlicensed
The table displays the following information:
l SERVICES — lists all the available SonicWall Security Services and upgrades available for the
SonicWall security appliance.
l STATUS— indicates if the security service is activated (Licensed), available for activation (Not
Licensed), or no longer active (Expired).
l ACTION —displays options to upgrade, renew, try, or activate the service, depending on its license
status.
l Count — displays the number of nodes/users currently connected to your appliance. If your security
appliance is licensed for unlimited nodes, the count is displayed as Unlimited.
SonicOS 7 Device SettingsAdministration Guide
Managing SonicWallLicenses
7
l Max. Count — displays the maximum number of nodes/users allowed for the license.
l EXPIRY DATE — displays the expiration date for any Licensed Security Service.
The information listed in the Services table is updated from your mysonicwall.com account the next time
the SonicWall security appliance automatically synchronizes with MySonicWall (once a day) or you can click
the SYNCHRONIZE button on this page to update the table.
For more information on SonicWall Security Services, see SonicOS 7.0 Security Services document
available at https://www.sonicwall.com/support/technical-documentation/.
Managing Security Services Online
You can activate, upgrade or renew services using one of the following methods:
l Performing service license updates in MySonicWall and synchronizing the changes in SonicOS
management interface.
1.
Navigate to Device | Settings > Licenses page.
2.
Click MySonicWall above the Services table.
3.
Log into your MySonicWall account and upgrade the licenses. See MSW online help.
4.
Synchronize changes. See Synchronizing Changes.
l Performing service license updates through SonicOS management interface. See Managing Services
from SonicOS Management Interface.
Topics:
l Managing Services from SonicOS Management Interface
l Synchronizing Changes
Managing Services from SonicOS Management Interface
You can activate, upgrade, or renew licenses for the Security Services on Device | Settings > Licenses
page.
To activate, upgrade, or renew services:
1. Navigate to Device | Settings > Licenses.
2.
Select the appropriate option in the View drop-down box above the SERVICES table.
3.
Locate the service you want to activate / renew / upgrade.
4.
Click any option listed in the ACTIONS column based on what you need to do with the service.
The options listed for a service in the ACTIONS column depend on the status of the service.
l To activate a FREE trial, click Try.
l To activate a Security Service, click the Activate link.
l To renew a Security Service, click the Renew link.
l To upgrade a Security Service, click the Upgrade.
5.
Follow the prompts to activate/renew/upgrade the service license. After completion, you are returned
to the Licenses page.
SonicOS 7 Device SettingsAdministration Guide
Managing SonicWallLicenses
8
Synchronizing Changes
When you make changes to your Security Services in MySonicWall, you can synchronize them instead of
waiting for the system to do it automatically.
To synchronize your MySonicWall account with the Services table in SonicOS management
interface:
1.
Navigate to Device | Settings > Licenses .
2.
Click Synchronize option above the SERVICES table.
Manual Upgrade for Closed Environments
If your SonicWall security appliance is deployed in a high-security environment that does not allow direct
Internet connectivity from the SonicWall security appliance, you can enter the encrypted license key
information from https://mysonicwall.com manually on the Device | Settings > Licenses page in the
SonicOS management interface.
NOTE: Manual upgrade of the encrypted license keyset is only for closed environments. If your firewall
is connected to the Internet, it is recommended you use the automatic registration and Security Services
upgrade features of your appliance.
You need to perform steps 1 through 4 from a computer connected to the internet and then continue the
procedure in the SonicOS Management Interface of the security appliance that does not have internet
connectivity.
1.
Make sure you have an account at https://mysonicwall.com and your SonicWall security appliance is
registered to the account before proceeding.
2.
After logging into MySonicWall, click on the serial number of your registered SonicWall security
appliance listed in Product Management > My Products.
SonicOS 7 Device SettingsAdministration Guide
Managing SonicWallLicenses
9
3.
Click MANUAL UPGRADE and select Add keyset to your product. The scrambled text displayed
is the License Keyset for the selected SonicWall security appliance and activated Security Services.
4.
Click Copy Code to copy the Keyset text for pasting into the Settings | Licenses page.
5.
Make sure your SonicWall appliance is running the latest version of SonicOS.
6.
Navigate to Device | Settings > Licenses.
7.
Click Manual License at the upper-right corner of the page.
8.
Paste (or type) the Keyset (from the step 3) into the Enter Keyset field in the Manual LicenseUpgrade dialog.
9.
Click APPLY to update your SonicWall security appliance. The status field at the bottom of the page
displays The configuration has been updated.
10.
You can generate the report from Device | Diagnostics > Tech Support Report to verify the
upgrade details.
NOTE: After the manual upgrade, the Settings | Licenses page does not contain any registration and
upgrade information.
Registering Your SonicWall Appliance
When you log in to your primary appliance for the first time, a Software Transaction Agreement (STA) form
displays for your acceptance before you can proceed. If you are using a CLI, you must type (or select) Yes
before proceeding. When you have accepted the STA, it is not shown for upgrades of either firmware or
software.
NOTE: MySonicWall registration information is not sold or shared with any other company.
See the Quick Start Guide for your security appliance for additional information on applying licenses
manually, synchronizing licenses manually, and upgrading firmware.
SonicOS 7 Device SettingsAdministration Guide
Managing SonicWallLicenses
10
Activating the Gateway Anti-Virus, AntiSpyware, and IPS License
Your security appliance must be registered on MySonicWall to use these security services. See Registering
Your SonicWall Appliance or the Quick Start Guide for your security appliance.
Because SonicWall Anti-Spyware is part of SonicWall Gateway Anti-Virus, Anti-Spyware, and Intrusion
Prevention, the Activation Key you receive is for all three services on your SonicWall security appliance.
If you do not have a SonicWall Gateway Anti-Virus , Anti-Spyware , and Intrusion Prevention license
activated on your SonicWall security appliance, you must purchase it from a SonicWall reseller or through
your MySonicWall account (limited to customers in the USA and Canada).
Activating FREE TRIALs
You can try FREE TRIAL versions of SonicWallGateway Anti-Virus, Anti-Spyware, and Intrusion Prevention.
For information about activating a free trial of any or all of the Security Services, see the Quick Start Guide
for your security appliance or Managing Security Services Online.
SonicOS 7 Device SettingsAdministration Guide
Managing SonicWallLicenses
11
System Administration
Configuring the Firewall Name
To configure the firewall name:
1.
Navigate to Device | Settings > Administration.
2.
Click Firewall Administrator.
3
3.
Enter the hexadecimal serial number of the firewall in the Firewall Name field. This number
uniquely identifies the SonicWall security appliance and defaults to the serial number of the firewall.
The serial number is also the MAC address of the unit. To change the Firewall Name, enter a unique
alphanumeric name in the Firewall Name field. It must be at least 8 characters in length and can be
up to 63 characters long.
4.
Enter a friendly name in the Firewall’s Domain Name field. The name can be private, for internal
users, or an externally registered domain name. This domain name is used in conjunction with User
Web Login Settings.
5.
To facilitate recognition of the primary/secondary firewalls in the Event Logs, enable Auto-AppendHA/Clustering suffix to Firewall Name. When this option is enabled, an appropriate suffix is
appended automatically to the firewall name in the Monitor | Logs > System Logs page.
This option is not selected by default. For more information about Event Logs, see the SonicOS 7.0Logs (Monitor) document.
SonicOS 7 Device SettingsAdministration Guide
System Administration
12
Enabling Wireless LAN and IPv6
To enable the visibility of a wireless LAN and/or IPv6:
1.
Navigate to Device | Settings > Administration > Firewall Administrator.
2.
Click Enable Wireless LAN and/or Enable IPv6. These options are selected by default. A
confirmation message is displayed.
IMPORTANT: Enabling or disabling the Wireless LAN feature requires a restart of the firewall.
When WLAN is disabled:
l All access point and wireless-related management interface pages do not display.
l WLAN is not displayed as a zone type.
l Any existing WLAN zones or objects become uneditable.
When IPv6 is disabled, all IPv6 packets are dropped by the firewall and the Monitor | Tools and
Monitor > Packet Monitor page displays the log messages.
3.
Click OK.
Changing the Administrator Name and
Password
Each SonicWall security appliance has a default administrator name of admin and a password of password.
To change the administrator name and/or password:
1.
Navigate to Device | Settings > Administration.
2.
Click Firewall Administrator.
3.
Type the new name in the Administrator Login Name field.
The Administrator Name can be changed from the default setting of admin to any word using
alphanumeric characters up to 32 characters in length.
4.
Perform the following steps to change password, otherwise skip to step 4:
a.
Click Change Password.
b.
Type the old password in the Old Password field.
SonicOS 7 Device SettingsAdministration Guide
System Administration
13
c.
Type the new password in the New Password field. The new password can be up to 32
alphanumeric and special characters.
d.
It is recommended you change the default password, password, to your own custom
password. Enter a strong password that cannot be easily guessed by others. A strong
password should have at least one uppercase letter, one lowercase letter, one number, and
one special character. For example, MyP@ssw0rd.
e.
Type the new password again in the Confirm Password field.
f.
Click Accept.
5.
To enforce Two-factor Authentication, select TOTP from the One-time Passwords Method dropdown.
You can now bind your mobile authentication application with your user account during the next login.
6.
Click Accept.
Configuring Login Security
The internal SonicOS Web-server supports TLS 1.1 and above with strong ciphers (128 bits or greater) when
negotiating HTTPS management sessions. SSL implementations are not supported. This heightened level
of HTTPS security protects against potential SSLv2 rollback vulnerabilities and ensures compliance with the
Payment Card Industry (PCI) and other security and risk-management standards.
TIP: SonicOS uses advanced browser technologies, such as HTML5, which are supported in most
recent browsers. SonicWall recommends using the latest Chrome, Firefox, Internet Explorer, or Safari
(does not operate on Windows platforms) browsers for administration of SonicOS. Mobile device
browsers are not recommended for SonicWall system administration.
Configuring SonicOS password constraint enforcement ensures that administrators and users are using
secure passwords. This password constraint enforcement can satisfy the confidentiality requirements as
defined by current information security management systems or compliance requirements, such as
Common Criteria and the Payment Card Industry (PCI) standard.
Topics:
l Configuring Password Compliance
l Configuring Login Constraints
SonicOS 7 Device SettingsAdministration Guide
System Administration
14
Configuring Password Compliance
To configure password compliance:
1.
Navigate to Device | Settings > Administration.
2.
Click Login / Multiple Administrators.
Configure the following settings in the LOGIN SECURITY section.
3.
To require users to change their passwords after a designated number of days has elapsed:
a.
Select Password must be changed every (days). The field becomes active. This option is
not selected by default.
b.
Enter the elapsed time in the field. The default number of days is 90, the minimum is 1 day,
and the maximum is 9999.
When a user attempts to login with an expired password, a popup window prompts the user to enter a
new password. The User Login Status window now includes a Change Password button so users can
change their passwords at any time.
4.
To specify the minimum length of time, in hours, allowed between password changes:
a.
Select Change password after (hours) . The field becomes active.
b.
Enter the number of hours. The minimum – and default – time is 1 hour; the maximum is
9999 hours.
5.
To require users to use unique passwords for the specified number of password changes:
a.
Select Bar repeated passwords for this many changes. The field becomes active.
b.
Enter the number of changes. The default number is 4, the minimum number is 1, and the
maximum number is 32.
6.
To require users to change at least 8 alphanumeric/symbolic characters of their old password when
creating a new one, select Apply password constrains. For how to specify what characters are
allowed, see Step 7.
7.
Specify the shortest allowed password, enter the minimum number of characters in the Enforce a
minimum password length of field. The default number is 8, the minimum is 1, and the
maximum is 99.
8.
Choose how complex a user’s password must be to be accepted from the Enforce password
complexity drop-down menu:
l None (default)
l Alphanumeric characters— Requires both alphabetic and numeric characters
l Alphanumeric and symbolic characters— Requires alphabetic, numeric, and symbolic
characters – for symbolic characters, only !, @, #, $, %, ^, &, *, (, and ) are allowed; all others
are denied
9.
When a password complexity option other than None is selected, the options under Complexity
Requirement become active. Enter the minimum number of alphanumeric and symbolic characters
required in a user’s password. The default number for each is 0, but the total number of characters
for all options cannot exceed 99.
l
Upper Case Characters
l
Lower Case Characters
SonicOS 7 Device SettingsAdministration Guide
System Administration
15
l
Number Characters
l
Symbolic Characters
NOTE: The Symbolic Characters field becomes active only if Alphanumeric and symbolic
characters is selected.
10.
Select to which classes of users the password constraints are applied under Apply the above
password constraints for. By default, all options are selected:
l Admin – Refers to the default administrator with the username admin.
l Other full admin
l Limited admin
l Guest admin
l Other local users
Configuring Login Constraints
To configure login constraints:
1.
Navigate to Device | Settings > Administration.
2.
Click Login/Multiple Administrators.
In the LOGIN SECURITY section, configure the following:
1.
To specify the length of inactivity time that elapses before you are automatically logged out of the
Management Interface, enter the time, in minutes, in the Log out the Admin after inactivity
of (mins) field. By default, the SonicWall Security Appliance logs out the administrator after 5
minutes of inactivity. The inactivity timeout can range from 1 to 9999 minutes.
TIP: If the Administrator Inactivity Timeout is extended beyond five minutes, you should end
every management session by clicking Logout in the upper right corner of the view to prevent
unauthorized access to the firewall’s Management Interface.
2.
To configure the SonicWall Security Appliance to lockout an administrator or a user if the login
credentials are incorrect, enable Admin/user lockout. Both administrators and users are locked out
of accessing the firewall after the specified number of incorrect login attempts. This option is
disabled by default. When this option is enabled, the following fields become active.
SonicOS 7 Device SettingsAdministration Guide
System Administration
16
CAUTION: If the administrator and a user are logging into the firewall using the same
source IP address, the administrator is also locked out of the firewall. The lockout is
based on the source IP address of the user or administrator.
a.
Select Enable local admin/user account lockout (uncheck for login IP address lockout).
This option locks out user accounts and IP addresses when they have surpassed a specified
number of incorrect login attempts. This option is only available when admin/user lockout is
enabled.
b.
Select Log event only without lockout for SonicOS to log failed user login attempts that
have reached the established threshold, but does not lock out the user or IP address. This
option is only available when Admin/user lockout is enabled.
After a user or IP address is locked out, a “User login denied - User is locked out” message
displays on the login screen and the login is rejected.
NOTE: You can review and edit all locked out user accounts on the Active Users page
when local admin/user account lockout is enabled.
c.
Enter the number of failed attempts within a specified time frame before the user is locked out
in the Failed login attempts per minute before lockout field. The default number
is 5, the minimum is 1, and the maximum is 99. Enter the maximum time in which failed
attempts can be made. The default is 5 minutes, the minimum is 1 minute, and the maximum
is 240 minutes (4 hours).
d.
Enter the length of time that must elapse before the user is allowed to attempt to log into the
firewall again in the Lockout Period (mins) field. The default is 5 minutes, the minimum is
0 (permanent lockout), and the maximum is 60 minutes.
3.
Enter the number of incorrect login attempts from the command line interface (CLI) that triggers a
lockout in the Max login attempts through CLI field. The default is 5, the minimum is 3, and the
maximum is 15.
4.
Click Accept.
Multiple Administrators Support
SonicOS supports multiple concurrent administrators with full administrator privileges, read-only privileges,
and limited privileges. The original version of SonicOS supported only a single administrator to log on to a
firewall with full administrative privileges. Additional users can be granted “limited administrator” access, but
only one administrator can have full access to modify all areas of the SonicOS GUI at one time.
SonicOS provides support for multiple concurrent administrators. This feature allows for multiple users to
log-in with full administrator privileges. In addition to using the default admin user name, additional
administrator user names can be created. Because of the potential for conflicts caused by multiple
administrators making configuration changes at the same time, only one administrator is allowed to make
configuration changes. The additional administrators are given full access to the GUI, but they cannot make
configuration changes.
Multiple Administrators Support provides the following benefits:
l Improved productivity: Allowing multiple administrators to access a firewall simultaneously
eliminates auto logout, a situation that occurs when two administrators require access to the
appliance at the same time and one is automatically forced out of the system.
SonicOS 7 Device SettingsAdministration Guide
System Administration
17
l Reduced configuration risk: The new read-only mode allows users to view the current
configuration and status of a firewall without the risk of making unintentional changes to the
configuration.
Working of Multiple Administrators Support
Topics:
l Configuration Modes
l User Groups
l Priority for Preempting Administrators
l GMS and Multiple Administrator Support
Configuration Modes
To allow multiple concurrent administrators, while also preventing potential conflicts caused by multiple
administrators making configuration changes at the same time, these configuration modes have been
defined:
Configuration modeAdministrator has full privileges to edit the configuration. If no administrator
is already logged into the appliance, this is the default behavior for
administrators with full and limited administrator privileges (but not read-only
administrators).
NOTE: Administrators with full configuration privilege can also log in
using the Command Line Interface (CLI; see the SonicOS 7.0 CLI
Reference Guide).
Read-only modeAdministrator cannot make any changes to the configuration, but can view
the entire management UI and perform monitoring actions.
Only administrators who are members of the SonicWall Read-Only Admins
user group are given read-only access, and it is the only configuration mode
they can access.
Non-configuration
mode
Administrator can view the same information as members of the read-only
group and they can also initiate management actions that do not have the
potential to cause configuration conflicts.
Only administrators who are members of the SonicWall Administrators user
group can access non-configuration mode. This mode can be entered when
another administrator is already in configuration mode and the new
administrator chooses not to preempt the existing administrator. By default,
when an administrator is preempted out of configuration mode, he or she is
converted to non-configuration mode. On the Device | Settings >Administration page, this behavior can be modified so that the original
administrator is logged out.
Access rights available to configuration modes table provides a summary of the access rights available
to the configuration modes. Access rights for limited administrators are included also, but note that this table
does not include all functions available to limited administrators.
SonicOS 7 Device SettingsAdministration Guide
System Administration
18
ACCESS RIGHTS AVAILABLE TO CONFIGURATION MODES
FunctionFull admin in
config mode
Full admin in
non-config
Read-only
administrator
Limited
administrator
mode
Import certificatesX
Generate certificate signing requestsX
Export certificatesX
Export appliance settingsXXX
Download TSRXXX
Use other diagnosticsXXX
Configure networkXX
Flush ARP cacheXXX
Setup DHCP ServerX
Renegotiate VPN tunnelsXX
Log users offXXguest users
only
Unlock locked-out usersXX
Clear logXXX
Filter logsXXXX
Export logXXXX
Email logXXX
Configure log categoriesXXX
Configure log settingsXX
Generate log reportsXXX
Browse the full UIXXX
Generate log reportsXXX
SonicOS 7 Device SettingsAdministration Guide
System Administration
19
User Groups
The Multiple Administrators Support feature supports two new default user groups:
l SonicWall Administrators: Members of this group have full administrator access to edit the
configuration.
l SonicWall Read-Only Admins: Members of this group have read-only access to view the full
management interface, but they cannot edit the configuration and they cannot switch to full
configuration mode.
It is not recommended to include users in more than one of these user groups. If you do so, however, the
following behavior applies:
If members of this user
group
SonicWall AdministratorsAlso included in the Limited Administrators or SonicWall Read-Only
Limited AdministratorsIncluded in the SonicWall Read-Only Admins user group, the
Read-Only AdminsLater included in another administrative group, If this read-only admin
Are
Admins user groups, the members have full administrator rights.
members have limited administrator rights.
group is used with other administrative groups option in the SonicWall
Read-Only Admins group configuration determines whether the
members are still restricted to read-only access or have the full
administration capabilities set by their other group.
Priority for Preempting Administrators
These rules govern the priority levels that the various classes of administrators have for preempting
administrators that are already logged into the appliance:
1.
The admin user and SonicWall Global Management System (GMS) both have the highest priority
and can preempt any users.
2.
A user who is a member of the SonicWall Administrators user group can preempt any users except
for the admin and SonicWall GMS.
3.
A user who is a member of the Limited Administrators user group can only preempt other
members of the Limited Administrators group.
GMS and Multiple Administrator Support
When using SonicWall GMS to manage a firewall, GMS frequently logs in to the appliance (for such
activities as ensuring that GMS management IPSec tunnels have been created correctly). These frequent
GMS log-ins can make local administration of the appliance difficult because the local administrator can be
preempted by GMS.
SonicOS 7 Device SettingsAdministration Guide
System Administration
20
Configuring Multiple Administrator Access
To configure multiple administrator access:
1.
Navigate to Device | Settings > Administration.
Click Login / Multiple Administrators.
2.
To configure what happens when one administrator preempts another administrator, from the On
preemption by another admin option, select whether the preempted administrator can be converted
to non-config mode or logged out:
l Drop to non-config mode: More than one administrator to access the appliance in non-
config mode without disrupting other administrators. This option is not selected by default.
l Log out: The new administrator to preempt other sessions.
NOTE: Selecting Log Out disables Non-Config mode and prevents entering Non-Config mode
manually.
3.
To allow a lower-priority administrator to preempt the current administrator after a specified time,
enter the time, in minutes, in the Allow preemption by a lower priority administrator
after inactivity of (mins) field. The default is 10 minutes, the minimum is 1 minute, and the
maximum is 9999 minutes.
4.
The SonicOS Management Interface allows administrators to send text messages through the
Management Interface to other administrators logged into the appliance. The message appears in
the browser’s status bar. To enable this option:
a.
Select Inter-administrator messaging. The Messaging polling interval (seconds) field
becomes active.
b.
Specify how often an administrator’s browser checks for inter-administrator messages in the
Messaging polling interval (secs) field. Specify a reasonably short interval to ensure
timely delivery of messages, especially if there are likely to be multiple administrators who
need to access the appliance. The default is 10 seconds, the minimum is 1 second, and the
maximum is 99 seconds.
5.
To enable access by System Administrators, Cryptographic (Crypto) Administrators, and Audit
Administrators, select Multiple Admin Roles. When this option is disabled, these administrators
cannot access the system, and all related user groups and information about them are hidden. This
option is not selected by default.
Enabling Enhanced Audit Logging Support
An enhanced log entry contains the parameter changed and user name in the Monitor| Logs > System
Events page.
SonicOS 7 Device SettingsAdministration Guide
System Administration
21
To enable logging of all configuration changes in the Monitor| Logs > System Logs page:
1.
Navigate to Device | Settings > Administration.
2.
Click Audit / SonicOS API.
3.
In the ENHANCED AUDIT LOGGING SUPPORT section, enable Enhanced Audit Logging
4.
Click ACCEPT.
Configuring the Wireless LAN Controller
To enable wireless controller mode:
IMPORTANT: You must reboot the firewall after changing Wireless Controller modes.
1.
Navigate to Device | Settings > Administration.
2.
Click Audit/SonicOS API.
3.
In the Wireless LAN Controller section, select any one of the options from the WirelessController Mode drop-down menu:
l Wireless-Controller-Only (default)
This option enables wireless controller mode
l Non-Wireless
This option enables non-wireless controller mode
l Full-Feature-Gateway
This option enables normal firewall mode
4.
After you select the appropriate wireless controller mode, click OK in the warning message displayed.
5.
Click Accept.
Enabling SonicOS API and Configuring
Authentication Methods
You can use SonicOS API as an alternative to the SonicOS Command Line Interface (CLI) for configuring
selected functions. To do so, you must first enable SonicOS API. For more information about SonicOS API,
SonicOS 7 Device SettingsAdministration Guide
System Administration
22
see the SonicOS 7.0 API document available at https://www.sonicwall.com/support/technical-
documentation/.
To enable SonicOS API and configure client authentication:
1.
Navigate to Device | Settings > Administration.
2.
Click Audit / SonicOS API.
3.
In the SONICOS API section, enable SonicOS API.
4.
Select any of the authentication methods for initial client authentication:
l RFC-7616 HTTP Digest Access authentication
l Select the appropriate digest algorithms: SHA256 (default), MD5
l Integrity protection: Disabled (default), Allowed, or Enforced.
l Session variant (password hashes in place of passwords):Disabled, Allowed
(default), or Enforced
l CHAP authentication.
l RFC-2617 HTTP Basic Access authentication
l Public Key Authentication
l RSA modulus (key/cipher size in bits): 2014 is the default.
l RSA padding type: PKCS#1 v1.5 or PKCS#1 v2.0 OAEP
l OAEP hash method: SHA-1, SHA-256, or Other
l OAEP mask (MGF1) method: SHA1, SHA-256, or Other
l Session security using RFC-7616 Digest Access Authentication
5.
Click Accept.
l Can hold user passwords received from the client.
l Maximum nonce use: 10 by default
l Two-Factor and Bearer Token Authentication
SonicOS 7 Device SettingsAdministration Guide
System Administration
23
Enabling GMS Management
NOTE: For more information on SonicWall Global Management System, see the SonicWall GMS and
SonicWall Management Services administration documentation, available at
To configure the Security Appliance for GMS management:
1.
Navigate to Device | Settings > Administration.
2.
Click Audit / SonicOS API.
3.
Scroll to the ADVANCED MANAGEMENT section.
4.
Enable Management using GMS. The Configure button becomes available.
5.
Click Configure. The GMS Settings screen in displayed.
6.
Enter the host name or IP address of the GMS Console in the GMS Host Name or IP Address
field.
7.
Enter the port in the GMS Syslog Server Port field. The default value is 514.
8.
To send only heartbeat status instead of log messages, select Send Heartbeat Status MessagesOnly.
9.
If the GMS Console is placed behind a device using NAT on the network, select GMS behind NATDevice. When you select GMS behind NAT Device, the NAT Device IP Address field becomes
active.
10.
Enter the IP address of the NAT device in the NAT Device IP Address field.
11.
Select one of the following GMS modes from the Management Mode drop-down menu:
l IPSEC Management Tunnel—Allows the firewall to be managed over an IPsec VPN tunnel
to the GMS management console. If you selected this option, go to step 11.
l Existing Tunnel—Uses an existing VPN tunnel over the connection between the GMS server
and the firewall. If you selected this option, go to step 13.
SonicOS 7 Device SettingsAdministration Guide
System Administration
24
l HTTPS—Allows HTTPS management from two IP addresses: the GMS Primary Agent and
the Standby Agent IP address. The SonicWall firewall also sends encrypted syslog packets
and SNMP traps using 3DES and the firewall administrator’s password. Options for
configuring the GMS reporting server display. If you selected this option, go to step 12.
12.
The default IPsec VPN settings are displayed with values populated by SonicOS. Verify the settings.
a.
From Encryption Algorithms, select the appropriate algorithm.
b.
Optionally, enter a new encryption key in the Encryption Key field:
ForThe key must be
DES16 hexadecimal characters
3DES48 hexadecimal characters
c.
Optionally, enter a new authentication key in the Authentication Key field:
ForThe key must be
MD532 hexadecimal characters
SHA140 hexadecimal characters
d.
Go to Step 13.
13.
SonicOS needs to know the GMS reporting server.
a.
Select Send Syslog Messages to a Distributed GMS Reporting Server. The GMS
Reporting Server IP Address and GMS Reporting Server Port options become
available.
b.
In the GMS Reporting Server IP Address field, enter the IP address of the GMS server.
c.
In the GMS Reporting Server Port field, enter the port of the GMS server. The default port
is 514.
14.
Click OK.
15.
Click Accept.
SonicOS 7 Device SettingsAdministration Guide
System Administration
25
Configuring the Management Interface
In this section, you configure:
l How the Management Interface tables display.
l Certificate usage.
l Whether you are operating in Configuration or Non-Config mode.
l Other management options.
Topics:
l Managing through HTTP/HTTPS
l Selecting a Security Certificate
l Controlling the Management Interface Tables
l Enforcing TLS Version
l Switching Configuration Modes
l Deleting Browser Cookies
l Configuring SSH Management
Managing through HTTP/HTTPS
You can manage the SonicWall security appliance using HTTP or HTTPS and a Web browser. HTTP webbased management is disabled by default. Use HTTPS to log into the SonicOS Management Interface with
factory default settings.
SonicOS 7 Device SettingsAdministration Guide
System Administration
26
Loading...
+ 58 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.