The TZ 170 SP is the next-generation replacement for the original SonicWALL TELE3 SP -- one of the industry’s
first Firewall/VPN devices with an internal analog modem for failover/failback capability. The new TZ 170 SP is
significantly faster, contains an internal 10/100Mbps switch for its LAN ports, has an optional interface for future
growth, and runs SonicWALL’s award-winning SonicOS operating system, which allows it to perform many more
tasks than the original TELE3 SP. With the release of SonicOS 2.6 Enhanced for TZ 170 SP, customers will be
able to back up two dedicated WAN interfaces with the analog modem’s failover/failback capability, offering a levels
of uptime and redundancy not found in most competitors’ devices.
HARDWARE/SOFTWARE FEATURES
Can I run SonicOS Enhanced on the TZ 170 SP?
Yes.
What does the ‘SonicOS 2.6 Enhanced for TZ 170 SP’ upgrade cost?
The upgrade retails for US$500. This price applies to the 10-node, 25-node, and Unrestricted-node models of the
TZ 170 SP.
Can I import a prefs file from a TELE3 SP into a TZ 170 SP?
You can, although it will import and report errors, and some settings will not be transferred since the hardware and
prefs storing mechanisms are different in the two models. If you are replacing a TELE3 SP with a TZ 170 SP, it’s
recommended that you recreate the TELE3 SP’s settings on the TZ 170 SP to avoid any potential issues.
How do I upgrade a TZ 170 SP from SonicOS Standard to SonicOS Enhanced?
When you purchase the upgrade, you will be provided with a new firmware image to install onto the TZ 170 SP; the
new firmware is installed in the standard SonicWALL method of software upgrade (i.e. using the web management
GUI and a modern web browser). Please note that since the preferences files for Standard and Enhanced are
different, all settings will be erased when upgrading a TZ 170 SP from Standard to Enhanced
will need to note all the settings currently on the device, and re-enter them once the TZ 170 SP reboots running
Enhanced.
For a more complete discussion of this topic, please see the SonicWALL whitepaper ‘Upgrading SonicOS Standard
to SonicOS Enhanced’, located at
Can I downgrade a TZ 170 SP running SonicOS Enhanced to SonicOS Standard?
Yes, but your SonicOS Enhanced preferences are not convertible to SonicOS Standard (the advanced objects in
SonicOS Enhanced cannot be mapped onto the SonicOS Standard preference structure), so all settings will be lost
when the TZ 170 SP reboots with SonicOS 2.x Standard.
. Because of this, you
1
Is there an external preferences conversion utility for older SonicWALL firmware (6.x) to SonicOS Standard
and Enhanced?
No.
Is there an external preferences conversion utility for SonicOS Standard to SonicOS Enhanced?
Yes, but it only converts VPN settings, and will not convert any of the other settings. This utility is available from
SonicWALL’s tech support organization.
Can I manage my TZ 170 SP remotely using SonicWALL Global Management System (GMS)?
Yes, the TZ 170 SP can be centrally managed using SonicWALL’s award-winning Global Management System
version 2.8 or newer.
Can I use my TZ 170 SP with ViewPoint?
Yes, with Viewpoint 2.8 and newer.
What is the minimum firmware for the TZ 170 SP?
The minimum level of firmware the TZ 170 SP can run is SonicOS 2.6 Standard. The TZ 170 SP does not support
older SonicOS releases, or any of the older “6.x”-series firmware releases.
How do I get firmware for the TZ 170 SP?
SonicOS 2.6 Standard is available to customers for 90 days after they have registered their devices on the
https://www.mysonicwall.com
customers must purchase a support contract in order to continue to receive firmware updates and new versions.
When SonicOS Enhanced for TZ 170 SP is released, it will also be available for download at mysonicwall.com for
those that have purchased the SonicOS Enhanced Upgrade.
What is the difference between signed and non-signed firmware?
The TZ 170 SP requires signed firmware images, unlike other SonicWALL Firewall/VPN devices. This is a new
security mechanism added to the firmware to prevent tampering, and ensures that the image is both valid and
originates from SonicWALL. Because of this, the TZ 170 SP will not accept non-signed firmware images. All signed
images end with a ‘.sig’ extension.
What exactly is a “security zone”?
A security zone is simply a logical grouping of one or more interfaces or subinterfaces, and is intended to make
creating security policies a much simpler task. With SonicOS Enhanced, interfaces do not have the same
importance in terms of how the security policy functions as they did in previous versions of firmware. Please refer to
the whitepaper ‘Security Zones in SonicOS 2.x Enhanced’ for a full discussion on this topic.
What is the “Multicast” zone?
This is a default system zone introduced in SonicOS 2.5 Enhanced, and cannot be deleted or edited. You do not
need to do anything with the Multicast zone’s firewall access rules in order to get multicast to work; the system
automatically writes all necessary rules. Please note that the Multicast zone will not show up on the ‘Firewall >
Access Rules’ page unless you activate Multicast on the firewall and set one or more interfaces to participate in
Multicast.
What are zone ‘Security Types’ and what do they mean?
In SonicOS 2.5 Enhanced and newer, there are three zone types defined: ‘Trusted’, ‘Public’, and ‘Wireless’. Any
zone set to ‘Trusted’ will automatically have security policy written to allow any systems in that zone to access
systems in all other zones set to ‘Trusted’, and vice versa. Any zone set to ‘Public’ will automatically have security
policy written to allow any systems in that zone to access systems in all other zones set to ‘Public’, but will have
security policy written to deny all systems in that zone to access systems in any zone set to ‘Trusted’ or ‘Public’.
Any zone set to ‘Wireless’ will gain two new tabs: a ‘Wireless’ tab that allows you to enforce WiFiSec for all users in
that zone, and a ‘Guest Services’ tab that allows you to enforce wireless guest services for all users in that zone. It
will also write security policy to allow all systems in that zone to access system in all other zones set to ‘Public’, but
will but will have security policy written to deny all systems in that zone to access systems in any zone set to
‘Trusted’ or ‘Wireless’.
customer portal, and for customers who have valid support contracts. After 90 days,
2
What does ‘Allow Interface Trust’ mean for a zone?
When this box is checked, all interfaces added to the zone will automatically have security policy written to allow all
systems connected to each interface to talk to each other – if checked, you will see these policies show up in the
firewall access rules policy intersection for that zone (for example: ‘LAN > LAN’). These polices can be adjusted as
needed, or deleted completely.
I created some zones, but they do not show up in the rules matrix – why?
Zones will not display in the access rules matrix unless an interface has been explicitly bound to the zone. Once an
interface has been added to a zone, it will then show up in the matrix, and you can then write rules to/from this zone.
How many SonicPoints can I add to a TZ 170 SP?
You can add up to two SonicPoints to the OPT interface, once the OPT interface is added to a Wireless zone.
Please note that the TZ 170 SP must be running SonicOS 2.6 Enhanced or newer to support SonicPoints.
Can I put SonicPoints in the LAN or WAN zone?
No, you cannot. In order for SonicPoints to be acquired, provisioned, and controlled by the TZ 170 SP, they must
be placed into a Wireless zone. The WAN and LAN zones also do not have the WiFiSec and WGS enforcement
tabs, as the Wireless zones do. While a SonicPoint can be configured to run in standalone mode and could
conceivably be hand-programmed and attached to the LAN zone, you’d lose WiFiSec and WGS capabilities for the
wireless users associating with that SonicPoint.
Can I connect a third-party wireless access point to the TZ 170 SP?
Yes and no – it’s not possible to connect a non-SonicWALL access point to a Wireless zone, as the TZ 170 SP will
not communicate with third-party access points, and will block all wireless traffic attempting to connect through it
from that access point. However, it is possible to hook a third-party access point to any zone not marked as a
wireless zone, but you will not be able to enforce WiFiSec or WGS for any wireless user connecting through that
access point.
What is ‘Consistent NAT’?
This is a new feature in SonicOS 2.5 Enhanced and newer. The control for this feature, which is located on the
‘Firewall > VoIP’ page, should be left unchecked by default. The Consistent NAT option modifies the SonicWALL's
standard NAT behavior when handling outbound UDP traffic in order to provide higher levels of compatibility with a
small handful of certain peer-to-peer applications such as some online games and Apple's ‘iChat’
application. Consistent NAT uses an MD5 hashing method to consistently assign the same remapped (i.e. Network
Address Translated) public IP address and public UDP port pair to each internal private IP address and private
UDP port pair. For example:
Private (LAN) IP: 192.168.168.10 --> Consistent Remapped Public (WAN) IP Address: 64.41.140.167
Private (LAN) UDP Port: 50650 --> Consistent Remapped Public (WAN) UDP Port: 40004
Private (LAN) IP: 192.168.168.10 --> Consistent Remapped Public (WAN) IP Address: 64.41.140.167
Private (LAN) UDP Port: 50655 --> Consistent Remapped Public (WAN) UDP Port: 40745
Private (LAN) IP: 192.168.168.20 --> Consistent Remapped Public (WAN) IP Address: 64.41.140.167
Private (LAN) UDP Port: 50650 --> Consistent Remapped Public (WAN) UDP Port: 54621
Private (LAN) IP: 192.168.168.10 --> Consistent Remapped Public (WAN) IP Address: 64.41.140.167
Private (LAN) UDP Port: 50650 --> Consistent Remapped Public (WAN) UDP Port: 49724
With Consistent NAT, all subsequent requests from either host 192.168.168.10 or 192.168.168.20 using the same
Private UDP ports as illustrated above would result in the use of the same, predictable remapped Private UDP
ports. Without Consistent NAT, the remapped port would change with every subsequent request, providing no
consistency, and no predictability. Most UDP based applications are perfectly compatible with the latter, and do not
require Consistent NAT.
3
Loading...
+ 7 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.