Sonicos 7 1 System
Sonicos 7 1 System
System
Administration Guide
Contents
About SonicOS 7
Working with SonicOS 7
SonicOS Workflow 9
How to Use the SonicOS Administration Guides 10
Guide Conventions 12
Interfaces 13
About Interfaces 14
Physical and Virtual Interfaces 14
SonicOS Secure Objects 16
One Arm Mode and Single Interface Support 17
Transparent Mode 19
IPS Sniffer Mode 19
Firewall Sandwich 22
HTTP/HTTPS Redirection 22
Enabling DNS Proxy on an Interface 23
LTE Modem Support 23
LAN Bypass 23
Interface Settings IPv4 24
Adding Virtual Interfaces 26
Configuring Routed Mode 32
Enabling Bandwidth Management on an Interface 34
Configuring Interfaces in Transparent IP Mode (Splice L3 Subnet) 36
Configuring Wireless Interfaces 39
Configuring WAN Interfaces 42
Configuring Tunnel Interfaces 47
Configuring VPN Tunnel Interfaces 47
Configuring Link Aggregation and Port Redundancy 50
Configuring One Arm Mode 54
Configuring an IPS Sniffer Mode Appliance 57
Configuring Security Services (Unified Threat Management) 62
Configuring Wire and Tap Mode 63
Layer 2 Bridged Mode 68
Configuring Interfaces for IPv6 97
31-Bit Network Settings 98
31-Bit Network Environment Example 98
Configuring a 31-Bit Network in SonicOS 99
PPPoE Unnumbered Interface Support 99
ARP 112
ARP Cache 112
Flushing the ARP Cache 113
Static ARP Entries 113
Viewing Static ARP Entries 114
Adding Static ARP Entries 114
Editing Static ARP Entries 115
Deleting Static ARP Entries 116
Secondary Subnets with Static ARP 116
ARP Settings 118
IP Helper 157
Using IP Helper 157
About IP Helper 157
IP Helper Settings 161
Configuring IP Helper 164
Enabling IP Helper 164
Managing Relay Protocols 164
Managing IP Helper Policies 166
Multicast 203
Multicast Policies 204
Creating a Multicast Address Object 205
Creating a New Multicast Address Group 206
IGMP State 206
Enabling Multicast 207
Enabling Multicast on a LAN-Dedicated Interface 207
Enabling Multicast Support for Address Objects over a VPN Tunnel 208
About SonicOS
This guide is a part of the SonicOS collection of administrative guides that describes how to administer and
monitor the SonicWall family of firewalls. SonicOS provides network administrators the management interface,
API (Application Program Interface), and the Command Line Interface (CLI) for firewall configuration by setting
objects to secure and protect the network services, to manage traffic, and to provide the desired level of network
service. This guide focuses on
Topics:
l Working with SonicOS
l SonicOS Workflow
l How to Use the SonicOS Administration Guides
l Guide Conventions
SonicWall offers two different modes of operation in SonicOS; the modes differ mainly in the areas of policy,
object configuration and diagnostics.
This table identifies which modes can be used on the different SonicWall firewalls:
SonicOS Workflow
When working with SonicWall products, you can use the following workflow as a guide for setting up your security
solution.
You begin your planning as you start making your purchasing decisions. Your sales partners can help you assess
your network and make recommendations based on the kinds of security services you need. You can learn more
about SonicWall products by reviewing product information and solutions. After selecting the solution, you can
schedule your implementation.
After planning and scheduling your solution, you begin setting up the firewalls. The Getting Started Guides for
your products can help you begin setting up the pieces to your solution. The getting started guides are designed
to help you install the firewall to a minimal level of operation. Before performing any detailed configuration tasks
described in the SonicOS Administration Guides, you should have your firewall set up and basic operation
validated.
The configuration block of the workflow refers to the many tasks that combine to define how your firewall is
integrated into your security solution and how it behaves when protecting your environment. Depending on the
features of your security solution, this task can be quite complex. The System Administration Guides are broken
into the key command sets and features. Some documents may be used for all solutions, but others may be used
use only if you integrated that feature into your solution. For example, High Availability or Wireless Access Points
are not necessarily used by all customers. More information about a feature's workflow is presented in the feature
administration guide. Refer to the specific Administration Guide for a SonicOS feature for more information.
Configuration tends to be a one-time activity, although you might make minor adjustments after monitoring
performance or after diagnosing an issue. The configuration activity can be broken down into the more detailed
flow as the following figure shows. This also mirrors the key functions that are listed across the top of the
management interface.
To help you understand how the books align with the features and commands, the following figure shows the
books organized like the SonicWall management interface.
CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions
are not followed.
WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.
Convention Description
Bold text Used in procedures to identify elements in the management interface like
dialog boxes, windows, screen names, messages, and buttons. Also
used for file names and text or values you are being instructed to select or
type into the interface.
Function | Menu group > Indicates a multiple step menu choice on the user interface. For example,
Menu item NETWORK | System > Interfaces means to select the NETWORK
functions at the top of the window, then click on System in the left
navigation menu to open the menu group (if needed) and select
Interfaces to display the page.
Code Indicates sample computer programming code. If bold, it represents text
to be typed in the command line interface.
<Variable> Represents a variable name. The variable name and angle brackets
need to be replaced with an actual value. For example in the segment
serialnumber=<your serial number>, replace the variable and brackets
with the serial number from your device, such as
serialnumber=2CB8ED000004.
Italics Indicates the name of a technical manual. Also indicates emphasis on
certain words in a sentence, such as the first instance of a significant term
or concept.
Interfaces
The NETWORK | System > Interfaces | Interface Settings pages include interface objects that are directly
linked to physical interfaces for both IPv4 and IPv6. The SonicOS scheme of interface addressing works in
conjunction with your network zones and address objects.
About Interfaces
Topics:
l Physical and Virtual Interfaces
l SonicOS Secure Objects
l One Arm Mode and Single Interface Support
l Transparent Mode
l IPS Sniffer Mode
l Firewall Sandwich
l HTTP/HTTPS Redirection
l Enabling DNS Proxy on an Interface
l LTE Modem Support
l LAN Bypass
Topics:
l Physical Interfaces
l Virtual Interfaces (VLAN)
l Subinterfaces
Physical Interfaces
The front panel of a SonicWall firewall has a number of physical interfaces. The number and type of interfaces
depend on the model and version (for more information about the interfaces on your appliance, see the Quick
Start Guide for your appliance):
Virtual interfaces provide many of the same features as physical interfaces, including zone assignment, DHCP
Server, and NAT and Access Rule controls.
Virtual Local Area Networks (VLANs) can be described as a “tag-based LAN multiplexing technology” because
through the use of IP header tagging, VLANs can simulate multiple LAN’s within a single physical LAN. Just as
two physically distinct, disconnected LAN’s are wholly separate from one another, so too are two different VLANs;
however, the two VLANs can exist on the very same wire. VLANs require VLAN aware networking devices to
offer this kind of virtualization — switches, routers and firewalls that have the ability to recognize, process,
remove and insert VLAN tags (IDs) in accordance with the network’s design and security policies.
VLANs are useful for a number of different reasons, most of which are predicated on the VLANs ability to provide
logical rather than physical broadcast domain, or LAN boundaries. This works both to segment larger physical
LAN’s into smaller virtual LAN’s, as well as to bring physically disparate LAN’s together into a logically contiguous
virtual LAN. The benefits of this include:
l Increased performance – Creating smaller, logically partitioned broadcast domains decreases overall
network utilization, sending broadcasts only where they need to be sent, thus leaving more available
bandwidth for application traffic.
l Decreased costs – Historically, broadcast segmentation was performed with routers, requiring additional
hardware and configuration. With VLANs, the functional role of the router is reversed – rather than being
used for the purposes of inhibiting communications, it is used to facilitate communications between
separate VLANs as needed.
l Virtual workgroups – Workgroups are logical units that commonly share information, such as a
Marketing department or an Engineering department. For reasons of efficiency, broadcast domain
boundaries should be created such that they align with these functional workgroups, but that is not always
possible: Engineering and Marketing users might be commingled, sharing the same floor (and the same
workgroup switch) in a building, or just the opposite – the Engineering team might be spread across an
entire campus. Attempting to solve this with complex feats of wiring can be expensive and impossible to
maintain with constant adds and moves. VLANs allow for switches to be quickly reconfigured so that
logical network alignment can remain consistent with workgroup requirements.
l Security – Hosts on one VLAN cannot communicate with hosts on another VLAN unless some
networking device facilitates communication between them.
NOTE: VLAN IDs range from 0 – 4094, with these restrictions: VLAN 0 is reserved for QoS and VLAN 1 is
reserved by some switches for native VLAN designation.
NOTE: Dynamic VLAN Trunking protocols, such as VTP (VLAN Trunking Protocol) or GVRP (Generic VLAN
Registration Protocol), should not be used on trunk links from other devices connected to the firewall.
Trunk links from VLAN capable switches are supported by declaring the relevant VLAN ID’s as a subinterface on
the firewall, and configuring them in much the same way that a physical interface would be configured. In other
words, only those VLANs that are defined as subinterfaces are handled by the firewall, the rest are discarded as
uninteresting. This method also allows the parent physical interface on the firewall to which a trunk link is
connected to operate as a conventional interface, providing support for any native (untagged) VLAN traffic that
might also exist on the same link. Alternatively, the parent interface could remain in an ‘unassigned’ state.
VLAN subinterfaces have most of the capabilities and characteristics of a physical interface, including zone
assignability, security services, GroupVPN, DHCP server, IP Helper, routing, and full NAT policy and Access
Rule controls. Multicast support is excluded from VLAN subinterfaces at this time.
Secured objects include interface objects that are directly linked to physical interfaces and managed in the
NETWORK | System > Interfaces page. Address and Service Objects are defined in Match Objects >
Addresses and Match Objects > Services respectively.
Zones are the hierarchical apex of SonicOS’s secure objects architecture. SonicOS includes predefined zones as
well as allow you to define your own zones. Predefined zones include LAN, WAN, DMZ, VPN, SSLVPN,
Multicast, and Custom. For more information about zones, see Configuring Network Zones.
Zones can include multiple interfaces; the WAN zone, however, is restricted to a maximum of the total number of
interfaces minus one. Within the WAN zone, either one or more WAN interfaces can be actively passing traffic
depending on the WAN Failover and Load Balancing configuration on NETWORK | System > Failover & Load
Balancing. For more information on WAN Failover and Load Balancing on SonicWall firewalls, see Failover &
LB.
At the zone configuration level, the Allow Interface Trust setting for zones automates the processes involved in
creating a permissive intra-zone Access Rule. It creates a comprehensive Address Object for the entire zone and
a inclusively permissive Access Rule from zone address to zone addresses.
One example usage scenario is shown as follows for SonicWall Cloud Edge. Cloud Edge works well when using
a single interface on the firewall where traffic comes into and goes out from the same interface.
When you complete the One Arm Mode interface configuration, SonicOS automatically updates the system
configuration to support One Arm Mode.
If the One Arm Mode interface is in the LAN zone, options on the NETWORK | Firewall > Advanced page are
enabled or disabled. These are under ACCESS RULE OPTIONS:
l Enable Apply firewall rules for intra-LAN traffic to/from the same interface - enable LAN-to-LAN
security scanning
l Disable Enable ICMP Redirect on LAN zone - disable ICMP redirect if One Arm Mode interface is in
A security policy to allow traffic from One Arm Mode interface to One Arm Mode interface is automatically created
so traffic is always allowed.
A routing policy is automatically added with the One Arm Peer as the gateway to allow other traffic to apply One
Arm routing, if needed.
For configuration of a One Arm Mode interface, see Configuring One Arm Mode.
Transparent Mode
Transparent Mode in SonicOS uses interfaces is the top level of the management hierarchy. Transparent Mode
supports unique addressing and interface routing.
In IPS Sniffer Mode: Network diagram, traffic flows into a switch in the local network and is mirrored through a
switch mirror port into a IPS Sniffer Mode interface on the appliance. The appliance inspects the packets
according to the settings configured on the Bridge-Pair. Alerts can trigger SNMP traps that are sent to the
specified SNMP manager through another interface on the appliance. The network traffic is discarded after the
appliance inspects it.
The WAN interface of the appliance is used to connect to the firewall Data Center for signature updates or other
data.
In IPS Sniffer Mode, a Layer 2 Bridge is configured between two interfaces in the same zone on the appliance,
such as LAN-LAN or DMZ-DMZ. You can also create a custom zone to use for the Layer 2 Bridge.
Only the WAN zone is not appropriate for IPS Sniffer Mode. The reason for this is that SonicOS detects all
signatures on traffic within the same zone such as LAN-LAN traffic, but some directional specific (client-side
versus server-side) signatures do not apply to some LAN-WAN cases.
Either interface of the Layer 2 Bridge can be connected to the mirrored port on the switch. As network traffic
traverses the switch, the traffic is also sent to the mirrored port and from there into the appliance for deep packet
inspection. Malicious events trigger alerts and log entries, and if SNMP is enabled, SNMP traps are sent to the
configured IP address of the SNMP manager system. The traffic does not actually continue to the other interface
The Edit Interfaces dialog available from the NETWORK | System > Interfaces page provides an option, Only
sniff traffic on this bridge-pair, for use when configuring IPS Sniffer Mode. When selected, this option causes
the appliance to inspect all packets that arrive on the L2 Bridge from the mirrored switch port. The Never route
traffic on this bridge-pair option should also be selected for IPS Sniffer Mode to ensure that the traffic from the
mirrored switch port is not sent back out onto the network.
For detailed instructions on configuring interfaces in IPS Sniffer Mode, see Configuring IPS Sniffer Mode.
This method is useful in networks where there is an existing appliance that remains in place, but you wish to use
the appliance’s security services as a sensor.
In this deployment the WAN interface and zone are configured for the internal network’s addressing scheme and
attached to the internal network. The X2 port is Layer 2 bridged to the LAN port, but it is not attached to anything.
The X0 LAN port is configured to a second, specially programmed port on the HP ProCurve switch. This special
port is set for mirror mode: it forwards all the internal user and server ports to the “sniff” port on the firewall. This
allows the firewall to analyze the entire internal network’s traffic, and if any traffic triggers the security signatures it
immediately traps out to the PCM+/NIM server through the X1 WAN interface, which then can take action on the
specific port from which the threat is emanating.
Firewall Sandwich deployment and configuration can be implemented using these equipment and services:
l Dell Force10 Series switches, such as the S5000, S4810, S4048, or S6000 running FTOS v9.8+.
l SonicWall services, such as Gateway Anti-Virus, Intrusion Prevention, ASPR, DPI-SSL, and CFS in
conjunction with Single Sign-On All in Wire Mode.
HTTP/HTTPS Redirection
Topics:
l HTTP/HTTPS Redirection with DP Offload
When the firewall configuration requires user authentication, HTTP/HTTPS traffic from an unauthenticated
source is redirected to the SonicOS login screen for the user to enter their credentials. A problem occurs when
HTTP and HTTPS traffic arrive from sources from which users do not log in, and one or more such sources
repeatedly try to open new connections, which keeps triggering this redirection. These could be non-user devices
that are validly trying to get access or could be malicious code attempting a Denial of Service (DoS) attack. The
effect that it has on the firewall is to cause high CPU load in the CP, both in the data plane task initiating the
redirections and in the web server thread tasks that are serving up the target redirect pages.
To minimize this effect, ensure the Add rule to enable redirect from HTTP to HTTPS option is selected when
adding or editing an interface. Enabling this option causes SonicOS to add an access rule that allows HTTP to the
interface; a side effect of this rule is that it also allows SonicOS to be able to redirect HTTPS to HTTP in certain
cases without security issues. One such case is the first step of redirecting traffic that needs to be authenticated,
at which point there is no sensitive data that needs to be hidden. Then HTTP processing can occur on the data
plane (DP) rather than on the CP.
NOTE: This option is not available when adding or editing VPN tunnel interfaces or when Wire Mode (2-Port
Wire), Tap Mode (1-Port Tap) is selected for Mode/IP Assignment.
This feature improves efficiencies in both the web server and the HTTP/HTTPS redirection processes, and
offloads most of the redirection processes to the Data Plane (DP) where the processing can be spread across
multiple cores.
NOTE: Elements of this feature can be controlled by internal User Authentication Settings options. This
includes an option to globally enable/disable redirection processing in the DP, a flush option to clear the
redirect files cache, and an option to specify the internal NAT port number used for the web server. Contact
SonicWall Technical Support for information about internal settings.
LAN Bypass
The main functionality of the LAN Bypass feature, when enabled:
l Pass traffic in between the LBP-capable interfaces while rebooting.
l Even when the firewall is powered off, pass traffic in between those LBP-capable Interfaces.
The Interface Settings table lists this information for each interface:
Security Type Displays security type selected for the zone when it was configured.
Member Interfaces Lists interfaces assigned to this zone.
Interface Trust Indicates whether Allow Interface Trust is enabled for this zone.
Anti-Virus Indicates whether Enable Client AV Enforcement Service and/or
Enable Gateway Anti-Virus Service is enabled for this zone.
DPI SSL Enforcement Indicates whether DPI SSL Enforcement is enabled for this zone.
GSC Indicates whether Enforce Global Security Clients (GSC) protection is
enabled for this zone. For more information, see Enabling SonicWall
Security Services on Zones.
SEC Indicates whether SonicWall Enforced Client (SEC) protection is
enabled for this zone.
l Group - If the interface is assigned to a Load Balancing group, it is displayed in this column.
l IP Address - IP address assigned to the interface.
l Subnet Mask - The network mask assigned to the subnet.
l IP Assignment - The available methods of IP assignment depend on the zone to which the interface is
assigned:
NOTE: Wire mode is available only on NSa 2600 and higher firewalls.
NOTE: The options available in Advanced for a virtual interface vary depending on the selected zone
and platform.
2. For Link Speed, Auto Negotiate is selected by default, which causes the connected devices to negotiate
the speed and duplex mode of the Ethernet connection automatically. To force Ethernet speed and
duplex, select one of the following options from Link Speed:
Standard 1500
packets
(default)
Jumbo frame 9000
packets
NOTE: Jumbo frame support must be enabled before a port can process jumbo frames, as explained
in Policies Administration. Because of the jumbo frame packet buffer size requirements, jumbo
frames increase memory requirements by a factor of 4.
15. Optionally, to fragment non-VPN outbound packets larger than the interface’s MTU, select Fragment non-
VPN outbound packets larger than this Interface’s MTU. This option is selected by default. When selected,
the following option becomes available.
IMPORTANT: Specify fragmentation of outbound VPN traffic in Advanced Settings.
16. Optionally, to override the Do-not-fragment packet bit, select Ignore Don’t Fragment (DF) bit. This
option is not selected by default.
17. To block notification that the WAN interface can receive fragmented packets, select Do not send ICMP
Fragmentation Needed for outbound packets over the Interface MTU. This option is not selected by
default.
18. If configuring bandwidth management for this interface, go to Enabling Bandwidth Management on an
Interface.
19. Click OK.
By enabling Routed Mode on the interface for the 172.16.6.0 network, NAT translations are automatically
disabled for the interface, and all inbound and outbound traffic is routed to the WAN interface configured for the
10.50.26.0 network.
NOTE: Routed Mode is available when using Static IP Mode for interfaces in the LAN, DMZ, and WLAN
zones. For DMZ, it is also available when using Layer 2 Bridged Mode. Routed mode is not available for
WAN mode.
5. To enable Routed Mode for the interface, select Use Routed Mode - Add NAT Policy to prevent
outbound\inbound translation. This option is not selected by default. When you select it, the next
Expert Mode setting become available.
6. From NAT Policy outbound/inbound interface, select the WAN interface that is to be used to route
traffic for the interface. The default is Any.
IMPORTANT: The appliance creates “no-NAT” policies for both the configured interface and the selected
WAN interface. These policies override any more general M21 NAT policies that might be configured for the
interfaces.
For more information about configuring bandwidth management and the effect of the various BWM types, see the
SonicOS administration documentation, available at https://www.sonicwall.com/support/technical-
documentation.
SonicOS can apply bandwidth management to both egress (outbound) and ingress (inbound) traffic on any
interfaces. Outbound bandwidth management is done using Class-based Queuing. Inbound Bandwidth
Management is done by implementing an ACK delay algorithm that uses TCP’s intrinsic behavior to control the
traffic.
Class-based Queuing (CBQ) provides guaranteed and maximum bandwidth Quality of Service (QoS) for the
firewall. Every packet destined to the interface is queued in the corresponding priority queue. The scheduler then
dequeues the packets and transmits them on the link depending on the guaranteed bandwidth for the flow and
the available link bandwidth.
NOTE: Advanced Settings might differ, depending on the firewall model and the type of zone
selected.
5. Enable Bandwidth Management for this interface.
a. To limit outgoing traffic to a maximum bandwidth on the interface, select Enable Interface Egress
Bandwidth Limitation. This option is not selected by default.
Specify the maximum bandwidth, in kbps, in the Maximum Interface Egress Bandwidth (kbps)
field. The minimum is 20 Kbps, the maximum is 1000000, and the default is 384.000000.
b. To limit incoming traffic to a maximum bandwidth on the interface, select Enable Interface
Ingress Bandwidth Limitation. This option is not selected by default.
Specify the maximum bandwidth, in kbps, in the Maximum Interface Ingress Bandwidth (kbps)
field. The minimum is 20 Kbps, the maximum is 1000000, and the default is 384.000000.
When either of these options are:
l Selected, the maximum available egress BWM is defined, but as advanced BWM is policy-based,
the limitation is not enforced unless there is a corresponding Access Rule or App Rule.
l Not selected, no bandwidth limitation is set at the interface level, but traffic can still be shaped
using other options.
6. Optionally, select Enable Default 802.1p tagging to tag information passing through this interface with
802.1p priority information for Quality of Service (QoS) management. This option is not selected by
default.
Packets sent through this interface are tagged with VLAN id=0 and carry 802.1p priority information. To
make use of this priority information, devices connected to this interface should support priority frames.
QoS management is controlled with access rules established on POLICY | Rules and Policies >
Access Rules.
7. Click OK.
Transparent IP Mode enables the appliance to bridge the WAN subnet onto an internal interface.
NOTE: The administrator password is required to regenerate encryption keys after changing the appliance’s
address.
4. For Link Speed, Auto Negotiate is selected by default, which causes the connected devices to negotiate
the speed and duplex mode of the Ethernet connection automatically. To force Ethernet speed and
duplex, select one of the following options from Link Speed:
A wireless interface is an interface that has been assigned to a Wireless zone and is used to support SonicWall
SonicWave secure access points.
SonicPoints can only be provisioned and managed on the interfaces of security-type wireless (WLAN by default).
3.
4. From Zone, select WLAN or a previously defined custom Wireless zone.
5. For Mode/IP Assignment, select either:
l Static IP Mode (default); go to Step 12.
l Layer 2 Bridged Mode:
6. Click OK. The options change.
12. If configuring routed mode for this interface, go to Configuring Routed Mode.
13. If bandwidth management has been enabled, to configure BWM for this interface, go to Enabling
Bandwidth Management on an Interface.
14. Click OK.
NOTE: A default gateway IP is required on the WAN interface if any destination is required to be reached
through the WAN interface that is not part of the WAN subnet IP address space, regardless whether we
receive a default route dynamically from a routing protocol of a peer device on the WAN subnet.
Configuring a WAN interface enables Internet connectivity. You can configure up to N minus 2 WAN interfaces on
the appliance, where N is the number of interfaces defined on the unit (both physical and VLAN). Only X0 and
MGMT interfaces cannot be configured as WAN interfaces.
l Fragment non-VPN outbound packets larger than this Interface’s MTU - Specifies all non-
VPN outbound packets larger than this Interface’s MTU be fragmented. Specifying the fragmenting
The Internet Service Provider (ISP) provisions the fields (for example, SonicWall IP Address, Subnet Mask,
and Gateway Address) in the Settings Acquired via section of the Protocol view. These fields show actual
values after you connect the appliance to the ISP.
Additionally, specifying PPPoE causes SonicOS to set the Interface MTU option in the Advanced view to 1492
and provides additional settings in the Protocol view.
Numbered and unnumbered tunnel interfaces are used with VPNs. A numbered tunnel interface is assigned its
own IP address, but an unnumbered tunnel interface borrows an IP address from an existing physical or virtual
(VLAN) interface.
Both numbered and unnumbered tunnel interface types support static routing and dynamic routing with RIP and
OSPF, while numbered tunnel interfaces can also be used with BGP.
Also, both numbered VPN and unnumbered tunnel interfaces can support advanced routing, and unnumbered
tunnel interfaces have no restrictions.
See these sections for configuring the various types of tunnel interfaces:
l Numbered Tunnel Interfaces; see Configuring VPN Tunnel Interfaces
l Unnumbered Tunnel Interfaces; see SonicOS Network Administration Guide
l WLAN Tunnel Interfaces; see Creating a WLAN Tunnel Interface
l Drop Tunnel Interfaces; see Drop Tunnel Interface
l IPv6 6to4 Tunnel Interfaces; see Configuring the 6to4 Auto Tunnel
A VPN Tunnel Interface (TI) can be configured like a standard interface, including options to enable appliance
management or user login using HTTP, HTTPS, Ping, or SSH in addition to multicast, flow reporting, asymmetric
routing, fragmented packet handling, and Don't Fragment (DF) Bit settings.
NOTE: A similar VPN policy and numbered tunnel interface must be configured on the remote gateway. The
IP addresses assigned to the numbered tunnel interfaces (on the local gateway and the remote gateways)
must be on the same subnet.
VPN tunnel interface deployment lists how a VPN Tunnel Interface can be deployed.
For all platforms, the maximum supported number of VPN Tunnel Interfaces (numbered tunnel interfaces) is 64.
The maximum number of unnumbered tunnel interfaces differs by platform and directly corresponds to the
maximum number of VPN policies supported on each platform.
12. To enable flow reporting on flows created for the tunnel interface, select Enable flow reporting.
13. Optionally, enable multicast reception on the interface by selecting Enable Multicast Support. This
option is not selected by default.
Topics:
l Link Aggregation
l Link Aggregation Configuration
l Port Redundancy
l Port Redundancy Configuration
Link Aggregation
Link Aggregation is based on interface link speed, for example: a 10 Gbps port cannot be link aggregated with
another interface that does not support 10 Gbps. Any ports that are link aggregated together should support the
Link Aggregation allows you to interconnect devices with two or more links between them in such a way that the
multiple links are combined into one larger virtual pipe that can carry a higher combined bandwidth. Because
multiple links are present between the two devices, when one link fails, the traffic is transferred through the other
links without disruption. With multiple links being present, traffic can also be load balanced in such a way to
achieve even distribution.
Link Aggregation is also used to increase the available bandwidth between the firewall and a switch by
aggregating up to four interfaces into a single aggregate link, referred to as a Link Aggregation Group (LAG). All
ports in an aggregate link must be connected to the same switch. The appliance uses a round-robin algorithm for
load balancing traffic across the interfaces in a Link Aggregation Group. Link Aggregation also provides a
measure of redundancy, in that if one interface in the LAG goes down, the other interfaces remain connected.
There are two types of LAG: Static and Dynamic. With Static Link Aggregation all configuration settings are set up
on both participating LAG components. Static LAG is already supported on NSA and SuperMassive platforms in
SonicOS 6.2.7 and previous firmware releases.
Dynamic Link Aggregation is supported using LACP defined by the IEEE 802.3ad standard. LACP allows the
exchange of information related to link aggregation between the members of the link aggregation group in
protocol packets called Link Aggregation Control Protocol Data Units. With LACP, errors in configuration, wiring,
and link failures can be detected quickly.
Link Aggregation is referred to using different terminology by different vendors, including Port Channel, Ether
Channel, Trunk, and Port Grouping.
The two major benefits of LAG are increased throughput and link redundancy that can be achieved efficiently
using LACP. LACP is the signaling protocol used between members in a LAG. It ensures links are only
aggregated into a bundle when they are correctly configured and cabled. LACP can be configured in one of two
modes:
l Active mode ‐ the device immediately sends LACP PDUs when the port comes up.
l Passive mode ‐ the port is placed in a passive negotiating state, in which the port only responds to LACP
PDUs it receives but does not initiate LACP negotiation.
If both sides are configured as Active, LAG can be formed assuming successful negotiation of the other
parameters. If one side is configured as Active and the other one as Passive, LAG can be formed as the Passive
port responds to the LACP PDUs received from the Active side. If both sides are Passive, LACP fails to negotiate
the bundle. Passive mode is rarely used in deployments.
During the configuration, all member ports of the same LAG must be set up on the same VLAN as the Aggregator
port. Data packets received on the LAG members are associated with the parent Aggregator port using the
VLAN. After the state of the Aggregator/member ports of a LAG reaches a stable Collection/Distribution state, the
ports are ready to transmit and receive data traffic.
All information related to LAG such as the Aggregator ports configured, member ports that are part of the LAG,
status of each of the ports that form the LAG, and the Partner MAC address received by way of LACP are
displayed on the NETWORK | Switching > Link Aggregation page.
There, you will see six load balancing options are available for configuration. The load balancing option needs to
be chosen during creation of a LAG when the Aggregator port is chosen. You cannot modify the load balancing
option after the LAG is created.
Topics:
l Link Aggregation Failover
l Link Aggregation Limitations
l Link Aggregation Configuration
1. High Availability
2. Link Aggregation
3. Load Balancing Groups
HA takes precedence over Link Aggregation. Because each link in the LAG carries an equal share of the load, the
loss of a link on the Active firewall forces a failover to the Idle firewall (if all of its links remain connected). Physical
monitoring needs to be configured only on the primary aggregate port.
When Link Aggregation is used with a LB Group, Link Aggregation takes precedence. LB takes over only when all
the ports in the aggregate link are down.
IMPORTANT: Link Aggregation requires a matching configuration on the switch. The switch's method of
load balancing varies depending on the vendor. Consult the documentation for the switch for information on
configuring Link Aggregation. Remember that it might be referred to as Port Channel, Ether Channel, Trunk,
or Port Grouping.
Port Redundancy
Port Redundancy provides a simple method for configuring a redundant port for a physical Ethernet port. This is a
valuable feature, particularly in high-end deployments, to protect against switch failures being a single point of
failure.
When the primary interface is active, it processes all traffic to and from the interface. If the primary interface goes
down, the secondary interface takes over all outgoing and incoming traffic. The secondary interface assumes the
MAC address of the primary interface and sends the appropriate gratuitous ARP on a failover event. When the
primary interface comes up again, it resumes responsibility for all traffic handling duties from the secondary
interface.
In a typical Port Redundancy configuration, the primary and secondary interfaces are connected to different
switches. This provides for a failover path in case the primary switch goes down. Both switches must be on the
same Ethernet domain. Port Redundancy can also be configured with both interfaces connected to the same
switch.
1. Port Redundancy
2. HA
3. LB Group
When Port Redundancy is used with HA, Port Redundancy takes precedence. Typically an interface failover
causes an HA failover to occur, but if a redundant port is available for that interface, then an interface failover
occurs, but not an HA failover. If both the primary and secondary redundant ports go down, then an HA failover
occurs (assuming the secondary firewall has the corresponding port active).
When Port Redundancy is used with a LB Group, Port Redundancy again takes precedence. Any single port
(primary or secondary) failures are handled by Port Redundancy just like with HA. When both the ports are down
then LB kicks in and tries to find an alternate interface.
3. For Zone, select LAN or WAN. One Arm Mode is only supported for these zones.
The dialog displays more fields.
Configuring SNMP
When SNMP is enabled, SNMP traps are automatically triggered for many events that are generated by
SonicWall Security Services such as Intrusion Prevention and Gateway Anti-Virus (GAV).
More than 50 IPS and GAV events currently trigger SNMP traps. The SonicOS Log Administration Guide
contains a list of events that are logged by SonicOS, and includes the SNMP trap number where applicable. This
guide is available online at https://www.sonicwall.com/support/technical-documentation by selecting any
SonicWall platform that runs SonicOS.
To determine the traps that are possible when using IPS Sniffer Mode with Intrusion Prevention enabled, search
for Intrusion in the table found in the Index of Log Event Messages section in the SonicOS Log Administration
Guide. The SNMP trap number, if available for that event, is printed in the SNMP Trap Type column of the table.
To determine the possible traps with Gateway Anti-Virus enabled, search the table for Security Services, and
view the SNMP trap number in the SNMP Trap Type column.
NOTE: Informational videos with interface configuration examples are available online. For example, see
How to configure the SonicWall WAN / X1 Interface with PPPoE Connection. This and other videos are
available at: https://support.SonicWall.com/videos-product-select.
To enable Security Services, your SonicWall firewall must be licensed for them and the signatures must be
downloaded from the SonicWall Data Center. For complete instructions on enabling and configuring Intrusion
Prevention, Gateway Anti-Virus, and Anti-Spyware, see the SonicOS Security Services Administration Guide.
Topics:
l Configuring Logging
l Connecting a Mirrored Switch Port to an IPS Sniffer Mode Interface
l Connecting and Configuring a WAN Interface to the Data Center
Configuring Logging
You can configure logging on the DEVICE | Log > Settings page to record entries for attacks that are detected
by the firewall. For information on how to enable logging, see the SonicOS Logs Administration Guide.
Consult the switch documentation for instructions on setting up the mirrored port.
SonicOS supports Wire Mode and Tap Mode, which provide methods of non-disruptive, incremental insertion into
networks. Wire and Tap Mode Settings describe the wire and tap modes.
Wire modes: Functional differences summarizes the key functional differences between modes of interface
configuration:
L2 Bridge,
Transparent,
Interface NAT, Route
Configuration Bypass Mode Inspect Mode Secure Mode Tap Mode Modes
Active/Active No No No No Yes
Clustering
Application Control No No Yes No Yes
Application Visibility No Yes Yes Yes Yes
ARP/Routing/NATa No No No No Yes
Comprehensive No No No No Yes
Anti-Spam Servicea
Content Filtering No No Yes No Yes
DHCP Servera No No No No Yesb
DPI Detection No Yes Yes Yes Yes
DPI Prevention No No Yes No Yes
DPI-SSLa No No Yes No Yes
High-Availability Yes Yes Yes Yes Yes
NOTE: When operating in Wire Mode, the firewall’s dedicated Management interface is used for local
management. To enable remote management and dynamic security services and application intelligence
updates, a WAN interface (separate from the Wire Mode interfaces) must be configured for Internet
connectivity. This is easily done given that SonicOS supports interfaces in mixed-modes of almost any
combination.
a These functions or services are unavailable on interfaces configured in Wire Mode, but remain available on a
system-wide level for any interfaces configured in other compatible modes of operation
b Not available in L2 Bridged Mode.
c Link State Propagation is a feature whereby interfaces in a Wire Mode pair mirror the link-state triggered by
transitions of their partners. This is essential to proper operations in redundant path networks. Link State
Propagation is not supported in Wire Mode over VLAN interfaces.
d Disabled by design in Wire Mode to allow for failover events occurring elsewhere on the network to be
supported when multiple Wire Mode paths, or when multiple firewall units are in use along redundant or
asymmetric paths.
e VLAN Translation is not supported in Wire Mode over VLAN interfaces.
Link Aggregation (LAG) is used to bundle multiple links into a single interface to increase bandwidth. To inspect
traffic over a LAG interface, a SonicWall firewall can be connected inline, allowing packets sent on one link to be
bridged across to the destination transparently. Existing Wire Mode features such as link state propagation are
supported. Up to 8 members per LAG are supported.
Wire Mode and Link Aggregation are configured from NETWORK | System > Interfaces. When Link
Aggregation is selected on the Edit Interface > Advanced dialog, it also lists unassigned interfaces. You can
select member interfaces for each side of the Wire Mode connection. The number of members on each side must
be equal. It is recommended that the type and bandwidth size of the member interfaces also match.
To continue on Advanced:
1. From Redundant/Aggregate Ports, select Link Aggregation. The options change.
2. From Aggregate Port, select the port for aggregation.
3. From Paired Interface Aggregate Port, select the paired port for aggregation.
4. From Interface MTU, indicate the largest packet size that the interface can forward without fragmenting
the packet. The term MTU (Maximum Transmission Unit) refers to the size (in bytes) of the largest packet
that a given layer of a communications protocol can pass onwards. MTU parameters usually appear in
association with a communications interface (NIC, serial port, and so on). The default MTU size is 1500,
however for some networking technologies reducing the MTU size and allowing fragmentation can help
eliminate some connectivity problems occurring at the protocol level.
5. Click OK. The configuration is displayed in the Interface Settings table on NETWORK | System >
Interfaces.
SonicOS includes L2 (Layer 2) Bridged Mode, a method of unobtrusively integrating a firewall into any Ethernet
network. L2 Bridged Mode is ostensibly similar to SonicOS’s Transparent Mode in that it enables a firewall to
share a common subnet across two interfaces, and to perform stateful and deep-packet inspection on all
traversing IP traffic, but it is functionally more versatile.
In particular, L2 Bridged Mode employs a secure learning bridge architecture, enabling it to pass and inspect
traffic types that cannot be handled by many other methods of transparent appliance integration. Using L2
Bridged Mode, a SonicWall firewall can be non-disruptively added to any Ethernet network to provide in-line
Unlike other transparent solutions, L2 Bridged Mode can pass all traffic types, including IEEE 802.1Q VLANs,
Spanning Tree Protocol, multicast, broadcast, and IPv6, ensuring that all network communications continues
uninterrupted.
Another aspect of the versatility of L2 Bridged Mode is that you can use it to configure IPS Sniffer Mode.
Supported on SonicWall firewalls, IPS Sniffer Mode uses a single interface of a Bridge-Pair to monitor network
traffic from a mirrored port on a switch. IPS Sniffer Mode provides intrusion detection, but cannot block malicious
traffic because the appliance is not connected inline with the traffic flow. See IPS Sniffer Mode for more
information.
L2 Bridged Mode provides an ideal solution for networks that already have existing appliances, and do not have
immediate plans to replace their existing appliances, but wish to add the security of SonicWall deep-packet
inspection and security services, such as Intrusion Prevention, Gateway Anti-Virus, and Anti-Spyware. If you do
not have SonicWall security service subscriptions, you can sign up for free trials atMySonicWall.
You can also use L2 Bridged Mode in a High Availability deployment. This scenario is explained in the Layer 2
Bridged Mode with High Availability.
Feature Benefit
L2 Bridging with Deep This method of transparent operation means that a SonicWall firewall can be
Packet Inspection added to any network without the need for readdressing or reconfiguration,
enabling the addition of deep-packet inspection security services with no
disruption to existing network designs. Developed with connectivity in mind as
much as security, L2 Bridged Mode can pass all Ethernet frame types, ensuring
seamless integration.
Secure Learning Bridge True L2 behavior means that all allowed traffic flows natively through the L2
Architecture Bridge. Whereas other methods of transparent operation rely on ARP and route
manipulation to achieve transparency, which frequently proves problematic, L2
Bridged Mode dynamically learns the topology of the network to determine
optimal traffic paths.
Universal Ethernet All Ethernet traffic can be passed across an L2 Bridge, meaning that all network
Frame-Type Support communications continue uninterrupted. While many other methods of
transparent operation only support IPv4 traffic, L2 Bridged Mode inspects all
IPv4 traffic and passes (or blocks, if desired) all other traffic, including LLC, all
Ethertypes, and even proprietary frame formats.
L2 Bridged Mode – A method of configuring a SonicWall firewall, which enables it to be inserted inline into an
existing network with absolute transparency, beyond even that provided by Transparent Mode. Layer 2 Bridged
Mode also refers to the IP Assignment configuration that is selected for Secondary Bridge Interfaces that are
placed into a Bridge-Pair.
Transparent Mode – A method of configuring a SonicWall firewall that allows it to be inserted into an existing
network without the need for IP reconfiguration by spanning a single IP subnet across two or more interfaces
through the use of automatically applied ARP and routing logic.
IP Assignment – When configuring a Trusted (LAN) or Public (DMZ) interface, the IP Assignment for the
interface can either be:
Transparent Mode – The IP address(es) for the interface is assigned using an Address Object (Host, Range, or
Group) that falls within the WAN Primary IP subnet, effectively spanning the subnet from the WAN interface to the
assigned interface.
Layer 2 Bridged Mode – An interface placed in this mode becomes the Secondary Bridge Interface to the
Primary Bridge Interface to which it is paired. The resulting Bridge-Pair then behaves like a two-port learning
bridge with full L2 transparency, and all IP traffic that passes through is subjected to full stateful failover and deep
packet inspection.
Bridge-Pair – The logical interface set composed of a Primary Bridge Interface and a Secondary Bridge
Interface. The terms primary and secondary do not imply any inherent level of operational dominance or
subordination; both interfaces continue to be treated according to their zone type, and to pass IP traffic according
to their configured Access Rules. Non-IPv4 traffic across the Bridge-Pair is controlled by the Block all non-IPv4
traffic setting on the Secondary Bridge Interface. A system might support as many Bridge Pairs as it has interface
pairs available. In other words, the maximum number of Bridge-Pairs is equal to ½ the number of physical
interfaces on the platform. Membership in a Bridge-Pair does not preclude an interface from conventional
Primary Bridge Interface – A designation that is assigned to an interface after a Secondary Bridge Interface has
been paired to it. A Primary Bridge Interface can belong to an Untrusted (WAN), Trusted (LAN), or Public (DMZ)
zone.
Secondary Bridge Interface – A designation that is assigned to an interface whose IP Assignment has been
configured for Layer 2 Bridged Mode. A Secondary Bridge Interface can belong to a Trusted (LAN), or Public
(DMZ) zone.
Bridge Management Address – The address of the Primary Bridge Interface is shared by both interfaces of the
Bridge-Pair. If the Primary Bridge Interface also happens to be the Primary WAN interface, it is this address that is
used for outbound communications by the appliance, such as NTP, and License Manager updates. Hosts that
are connected to either segment of the Bridge-Pair might also use the Bridge Management Address as their
gateway, as is common in Mixed-Mode deployments.
Non-IPv4 Traffic – SonicOS supports the following IP protocol types: ICMP (1), IGMP (2), TCP (6), UDP (17),
GRE (47), ESP (50), AH (51), EIGRP (88), OSPF (89), PIM-SM (103), L2TP (115). More esoteric IP types, such
as Combat Radio Transport Protocol (126), are not natively handled by the appliance, nor are non-IPv4 traffic
types such as IPX or (currently) IPv6. L2 Bridged Mode can be configured to either pass or drop Non-IPv4 traffic.
Captive-Bridged Mode – This optional mode of L2 Bridge operation prevents traffic that has entered an L2
bridge from being forwarded to a non-Bridge-Pair interface. By default, L2 Bridge logic forwards traffic that has
entered the L2 Bridge to its destination along the most optimal path as determined by ARP and routing tables. In
some cases, the most optimal path might involve routing or NATing to a non-Bridge-Pair interface. Activating
Captive-Bridged Mode ensures that traffic that enters an L2 Bridge exits the L2 Bridge rather than taking its most
logically optimal path. In general, this mode of operation is only required in complex networks with redundant
paths, where strict path adherence is required.
Pure L2 Bridge Topology – Refers to deployments where the firewall is used strictly in L2 Bridged Mode for the
purposes of providing in-line security to a network. This means that all traffic entering one side of the Bridge-Pair
is bound for the other side, and is not routed/NATed through a different interface. This is common in cases where
there is an existing perimeter appliance, or where in-line security is desired along some path (for example, inter-
departmentally, or on a trunked link between two switches) of an existing network. Pure L2 Bridge Topology is not
a functional limitation, but rather a topological description of a common deployment in heterogeneous
environments.
Mixed-Mode Topology – Refers to deployments where the Bridge-Pair are not the only point of ingress/egress
through the appliance. This means that traffic entering one side of the Bridge-Pair might be destined to be
routed/NATed through a different interface. This is common when the appliance is simultaneously used to
provide security to one or more Bridge-Pair while also providing:
l Perimeter security, such as WAN connectivity, to hosts on the Bridge-Pair or on other interfaces.
l Firewall and Security services to additional segments, such as Trusted (LAN) or Public (DMZ) interface,
where communications occur between hosts on those segments and hosts on the Bridge-Pair.
l Wireless services with SonicPoints, where communications occur between wireless clients and hosts on
the Bridge-Pair.
Topics:
l Comparison of L2 Bridged Mode to Transparent Mode
l Benefits of Transparent Mode over L2 Bridged Mode
l ARP in Transparent Mode
l VLAN Support in Transparent Mode
l Multiple Subnets in Transparent Mode
l Non-IPv4 Traffic in Transparent Mode
l ARP in L2 Bridged Mode
l VLAN Support in L2 Bridged Mode
l L2 Bridge IP Packet Path
l Multiple Subnets in L2 Bridged Mode
l Non-IPv4 Traffic in L2 Bridged Mode
The appliance also proxy ARPs the IP addresses specified in the Transparent Range (192.168.0.100 to
192.168.0.250) assigned to an interface in Transparent Mode for ARP requests received on the X1 (Primary
WAN) interface. If the router had previously resolved the server (192.168.0.100) to its MAC address
00:AA:BB:CC:DD:EE, this cached ARP entry would have to be cleared before the router could communicate with
the host through the appliance. This typically requires a flushing of the router’s ARP cache either from its
management interface or through a reboot. When the router’s ARP cache is cleared, the router can then send a
new ARP request for 192.168.0.100, to which the appliance responds with its X1 MAC 00:06:B1:10:10:11.
This behavior allows for a SonicWall firewall operating in L2 Bridged Mode to be introduced into an existing
network with no disruption to most network communications other than that caused by the momentary
discontinuity of the physical insertion.
Stream-based TCP protocols communications (for example, an FTP session between a client and a server)
needs to be re-established upon the insertion of an L2 Bridged Mode appliance. This is by design so as to
maintain the security afforded by stateful packet inspection. As the stateful packet inspection engine cannot have
knowledge of the TCP connections that preexisted it, it drops these established packets with a log event such as
a TCP packet received on a nonexistent/closed connection; TCP packet dropped.
This allows an appliance operating in L2 Bridged Mode to be inserted, for example, inline into a VLAN trunk
carrying any number of VLANs, and to provide full security services to all IPv4 traffic traversing the VLAN without
the need for explicit configuration of any of the VLAN IDs or subnets. Access Rules can also, optionally, be
applied to all VLAN traffic passing through the L2 Bridged Mode because of the method of handling VLAN traffic.
The following sequence of events describes the flow in L2 Bridge IP Packet Flow:
1. 802.1Q encapsulated frame enters an L2 Bridge interface (this first step, Step 2, and Step 12 apply only to
802.1Q VLAN traffic).
2. The 802.1Q VLAN ID is checked against the VLAN ID white/black list. If the VLAN ID is:
l Disallowed, the packet is dropped and logged.
l Allowed, the packet is decapsulated, the VLAN ID is stored, and the inner packet (including the IP
header) is passed through the full packet handler.
3. As any number of subnets is supported by L2 Bridging, no source IP spoof checking is performed on the
source IP of the packet. It is possible to configure L2 Bridges to only support a certain subnet or subnets
using Access Rules.
4. SYN Flood checking is performed.
5. A destination route lookup is performed to the destination zone, so that the appropriate Access rule can be
applied. Any zone is a valid destination, including the same zone as the source zone (for example, LAN to
It is possible to construct an Access Rule to control any IP packet, independent of its VLAN
membership, by any of its IP elements, such as source IP, destination IP, or service type. If the
packet is disallowed, it is dropped and logged. If the packet is allowed, it continues.
8. A connection cache entry is made for the packet, and required NAT translations (if any) are performed.
9. Stateful packet inspection and transformations are performed for TCP, VoIP, FTP, MSN, Oracle, RTSP
and other media streams, PPTP and L2TP. If the packet is disallowed, it is dropped and logged. If the
packet is allowed, it continues.
10. Deep packet inspection, including Gateway Anti-Virus, Intrusion Prevention, Anti-Spyware, CFS and
email-filtering is performed. If the packet is disallowed, it is dropped and logged. If the packet is allowed, it
continues. Client notification is performed as configured.
11. If the packet is destined for the Encrypted zone (VPN), the Untrusted zone (WAN), or some other
connected interface (the last two of which might be the case in Mixed-Mode Topologies) the packet is sent
through the appropriate path.
12. If the packet is not destined for the VPN/WAN/Connected interface, the stored VLAN tag is restored, and
the packet (again bearing the original VLAN tag) is sent out the Bridge-Partner interface.
The following summary describes, in order, the logic applied to path determinations for these cases:
1. If present, the most specific non-default route to the destination is chosen. This would cover, for example:
a. A packet arriving on X3 (non-L2 Bridge LAN) destined for host 15.1.1.100 subnet, where a route
to the 15.1.1.0/24 subnet exists through 192.168.0.254 through the X0 (Secondary Bridge
Interface, LAN) interface. The packet would be forwarded through X0 to the destination MAC
address of 192.168.0.254, with the destination IP address 15.1.1.100.
b. A packet arriving on X4 (Primary Bridge Interface, LAN) destined for host 10.0.1.100, where a
route to the 10.0.1.0/24 exists through 192.168.10.50 through the X5 (DMZ) interface. The
packet would be forwarded through X5 to the destination MAC address of 192.168.10.50, with the
destination IP address 10.0.1.100.
2. If no specific route to the destination exists, an ARP cache lookup is performed for the destination IP
address. A match indicates the appropriate destination interface. This would cover, for example:
a. A packet arriving on X3 (non-L2 Bridge LAN) destined for host 192.168.0.100 (residing on L2
Primary Bridge Interface X2). The packet would be forwarded through X2 to the known destination
MAC and IP address of 192.168.0.100, as derived from the ARP cache.
b. A packet arriving on X4 (Primary Bridge Interface, LAN) destined for host 10.0.1.10 (residing on
X5 – DMZ). The packet would be forwarded through X5 to the known destination MAC and IP
address of 10.0.1.10, as derived from the ARP cache.
With regard to address translation (NAT) of traffic arriving on an L2 Bridge-Pair interface, if it is determined to be
bound for:
In addition to this categorization, packets traveling to/from zones with levels of additional trust, which are
inherently afforded heightened levels of security (LAN|Wireless|Encrypted <--> LAN|Wireless|Encrypted)
are given the special Trust classification. Traffic with the Trust classification has all signatures applied
(Incoming, Outgoing, and Bidirectional).
3. The direction of the signature. This pertains primarily to IPS, where each signature is assigned a
direction by SonicWall’s signature development team. This is done as an optimization to minimize false
positives. Signature directions are:
l Incoming – Applies to Incoming and Trust. The majority of signatures are Incoming, and they
include all forms of application exploits and all enumeration and footprinting attempts.
Approximately 85 percent of signatures are Incoming.
WAN Connectivity
Internet (WAN) connectivity is required for stack communications, such as licensing, security services signature
downloads, NTP (time synchronization), and CFS (Content Filtering Services). At present, these communications
can only occur through the Primary WAN interface. If you require these types of communication, the Primary
WAN should have a path to the Internet. Whether or not the Primary WAN is employed as part of a Bridge-Pair
does not affect its ability to provide these stack communications.
NOTE: If Internet connectivity is not available, licensing can be performed manually and signature updates
can also be performed manually (https://www.MySonicWall.com/).
Sample Topologies
The following are sample topologies depicting common deployments:
Topics:
l Wireless Layer 2 Bridge
l Inline Layer 2 Bridged Mode
l Perimeter Security
l Internal Security
l Layer 2 Bridged Mode with High Availability
l Layer 2 Bridged Mode with SSL VPN
This example refers to an appliance installed in a Hewlett Packard ProCurve switching environment. SonicWall is
a member of HP’s ProCurve Alliance – more details can be found at the following location:
https://www.hpe.com/us/en/networking.html.
HP’s ProCurve Manager Plus (PCM+) and HP Network Immunity Manager (NIM) server software packages can
be used to manage the switches as well as some aspects of the appliance.
You also need to make sure to modify the Access Rules to allow traffic from the LAN to WAN, and from the WAN
to the LAN, otherwise traffic cannot pass successfully. You might also need to modify routing information on your
firewall if your PCM+/NIM server is placed on the DMZ.
Perimeter Security
Perimeter Security is a network scenario where the appliance is added to the perimeter to provide security
services (the network might or might not have an existing appliance between the appliance and the router). In this
scenario, everything below the appliance (the Primary Bridge Interface segment) is generally considered as
having a lower level of trust than everything to the left of the appliance (the Secondary Bridge Interface segment).
For that reason, it would be appropriate to use X1 (Primary WAN) as the Primary Bridge Interface.
If there are public servers, for example, a mail and Web server, on the Secondary Bridge Interface (LAN)
segment, an Access Rule allowing WAN > LAN traffic for the appropriate IP addresses and services could be
added to allow inbound traffic to those servers.
Internal Security
A network scenario where the appliance acts as the perimeter security device and secure wireless platform.
Simultaneously, it provides L2 Bridge security between the workstation and server segments of the network
without having to readdress any of the workstation or servers.
This typical inter-departmental Mixed Mode topology deployment demonstrates how the appliance can
simultaneously Bridge and route/NAT. Traffic to/from the Primary Bridge Interface (Server) segment from/to the
Secondary Bridge Interface (Workstation) segment pass through the L2 Bridge.
As both interfaces of the Bridge-Pair are assigned to a Trusted (LAN) zone, the following apply:
l All traffic is allowed by default, but Access Rules could be constructed as needed.
l Consider, for the point of contrast, what would occur if the X2 (Primary Bridge Interface) was instead
assigned to a Public (DMZ) zone: All the Workstations would be able to reach the Servers, but the Servers
would not be able to initiate communications to the Workstations. While this would probably support the
traffic flow requirements (that is, Workstations initiating sessions to Servers), it would have two
undesirable effects.
l The DHCP server would be in the DMZ. DHCP requests from the Workstations would pass through the L2
Bridge to the DHCP server (192.168.0.100), but the DHCP offers from the server would be dropped by
the default DMZ > LAN Deny Access Rule. An Access Rule would have to be added, or the default
modified, to allow this traffic from the DMZ to the LAN.
l Security services directionality would be classified as Outgoing for traffic from the Workstations to the
Server because the traffic would have a Trusted source zone and a Public destination zone. This might be
suboptimal because it would provide less scrutiny than the Incoming or (ideally) Trust classifications.
l Security services directionality would be classified as Trust, and all signatures (Incoming, Outgoing, and
Bidirectional) are applied, providing the highest level of security to/from both segments.
For detailed instructions on configuring interfaces in Layer 2 Bridged Mode, see Configuring Layer 2 Bridged
Mode.
The appliance HA pair consists of two appliances, connected together on port X5, the designated HA port. Port
X1 on each appliance is configured for normal WAN connectivity and is used for access to the management
interface of that device. Layer 2 Bridged Mode is implemented with port X0 bridged to port X2.
When setting up this scenario, there are several things to take note of on both the appliances and the switches.
On the appliances:
l Do not enable the Virtual MAC option when configuring High Availability. In a Layer 2 Bridged Mode
configuration, this function is not useful.
l Enabling Preempt Mode is not recommended in an inline environment such as this. If Preempt Mode is
required, follow the recommendations in the documentation for your switches, as the trigger and failover
time values play a key role here.
l Consider reserving an interface for the management network (this example uses X1). If it is necessary to
assign IP addresses to the bridge interfaces for probe purposes or other reasons, SonicWall recommends
using the management VLAN network assigned to the switches for security and administrative purposes.
NOTE: The IP addresses assigned for HA purposes do not directly interact with the actual traffic flow.
The LAN interface on the appliance is used to monitor the unencrypted client traffic coming from the external
interface of the SSL VPN appliance. This is the reason for running in Layer 2 Bridged Mode (instead of
reconfiguring the external interface of the SSL VPN appliance to see the LAN interface as the default route).
You might be automatically disconnected from the appliance’s management interface. You can now disconnect
your management laptop or desktop from the appliance’s X0 interface, and power the appliance off before
physically connecting it to your network.
Installing the Appliance between the Network and an SSL VPN Appliance
Regardless of your deployment method (single- or dual-homed), the appliance should be placed between the
X0/LAN interface of the SSL VPN appliance and the connection to your internal network. This allows the device to
connect out to SonicWall’s licensing and signature update servers, and to scan the decrypted traffic from external
clients requesting access to internal network resources.
If your SSL VPN appliance is in two-port mode behind a third-party firewall, it is dual-homed.
If your SSL VPN appliance is in one-port mode in the DMZ of a third-party firewall, it is single-homed.
Licensing Services
When your appliance is successfully registered:
1. Navigate to DEVICE | Settings > Licenses.
2. Click Synchronize from the top right of the top banner.
This contacts the appliance licensing server and ensures the appliance is properly licensed.
To check licensing status, go to DEVICE | Settings > Licenses and in the second column, view the license
status of all security services.
Enabling Syslog
Enable Syslog on the DEVICE | Log > Syslog page. For information on how to enable Syslog, see the SonicOS
Log Administration Guide.
Then, for each service on POLICY | Security Services, activate and configure the settings that are most
appropriate for your environment. For information about activating and configuring security services, see the
SonicOS Security Services Administration Guide.
Choose an interface to act as the Primary Bridge Interface. Refer to the L2 Bridge Interface Zone Selection for
information in making this selection. This example uses X1 (automatically assigned to the Primary WAN).
Topics:
l Configuring the Primary Bridge Interface
l Configuring the Secondary Bridge Interface
l Configuring an L2 Bypass for Hardware Failures
Choose an interface to act as the Secondary Bridge Interface. Refer to the L2 Bridge Interface Zone Selection for
information in making this selection.
You can now apply security services to the appropriate zones, as desired. In this example, they should be applied
to the LAN, WAN, or both zones.
When the L2 bypass relay is closed, the network cables attached to the bypassed interfaces (X0 and X1) are
physically connected as if they were a single continuous network cable. The Engage physical bypass on
malfunction option provides you the choice of avoiding disruption of network traffic by bypassing the firewall in
the event of a malfunction.
L2 bypass is only applicable to interfaces in Layer 2 Bridged Mode. The Engage physical bypass on
malfunction option only appears when the Layer 2 Bridged Mode option is selected from Mode / IP
Assignment. This option does not appear unless a physical bypass relay exists between the two interfaces of the
bridge-pair.
When the Engage physical bypass on malfunction option is enabled, the other Layer 2 Bridged Mode
options are automatically set
l Block all non-IPv4 traffic – disabled. When enabled, this option blocks all non-IPv4 Ethernet frames. So,
this option is disabled.
l Never route traffic on this bridge-pair – enabled. When enabled, this option prevents packets from
being routed to a network other than the peer network of the bridged pair. So, this option is enabled.
l Only sniff traffic on this bridge-pair – disabled. When enabled, traffic received on the bridge-pair
interface is never forwarded. So, this option is disabled.
l Disable stateful-inspection on this bridge-pair – unchanged. This option is not affected.
To configure an L2 bypass:
1. Navigate to NETWORK | System > Interfaces.
2. Click the Edit icon in the Configure column for the interface you want to configure. The Edit Interface
dialog displays.
3. Select Engage physical bypass on malfunction.
NOTE: The Engage physical bypass on malfunction option is available only when the X0 and X1
interfaces are bridged together on an NSa-6600 or higher.
4. Click OK.
At this point, if the packet has been validated as acceptable traffic, it is forwarded to its destination. The packet
egress path includes:
l Encryption
l Encapsulation
l IP fragmentation
On egress, if the route policy lookup determines that the gateway interface is a VLAN subinterface, the packet is
tagged (encapsulated) with the appropriate VLAN ID header. The creation of VLAN subinterfaces automatically
updates the firewall’s routing policy table:
The auto-creation of NAT policies, Access Rules with regard to VLAN subinterfaces behave exactly the same as
with physical interfaces. Customization of the rules and policies that govern the traffic between VLANs can be
performed with customary SonicOS ease and efficiency.
When creating a zone (either as part of general administration, or as a step in creating a subinterface), a
checkbox is presented on the zone creation page to control the auto-creation of a GroupVPN for that zone. By
default, only newly created Wireless type zones have Create GroupVPN for this zone enabled, although the
option can be enabled for other zone types by selecting the checkbox during creation.
Management of security services between VLAN subinterfaces is accomplished at the zone level. All security
services are configurable and applicable to zones comprising physical interfaces, VLAN subinterfaces, or
combinations of physical and VLAN subinterfaces.
VLAN support enables organizations to offer meaningful internal security (as opposed to simple packet filtering)
between various workgroups, and between workgroups and server farms without having to use dedicated
physical interfaces on the firewall.
Here the ability to assign VLAN subinterfaces to the WAN zone, and to use the WAN client mode (only Static
addressing is supported on VLAN subinterfaces assigned to the WAN zone) is illustrated, along with the ability to
support WAN Load Balancing and failover. Also demonstrated is the distribution of SonicPoints throughout the
network by means of connecting them to access mode VLAN ports on workgroup switches. These switches are
then backhauled to the core switch, which then connects all the VLANs to the appliance through a trunk link.
Asymmetric Routing
SonicOS supports asymmetric routing. Asymmetric routing is when the flow of packets in one direction passes
through a different interface than that used for the return path. This can occur when traffic flows across different
layer 2 bridged pair interfaces on the firewall or when it flows across different appliances in a high availability
cluster.
Any appliance that performs deep packet inspection or stateful firewall activity must “see” all packets associated
with a packet flow. This is in contrast to traditional IP routing in which each packet in a flow might technically be
forwarded along a different path as long as it arrives at its intended destination — the intervening routers do not
have to see every packet. Today’s routers do attempt to forward packets with a consistent next-hop for each
packet flow, but this applies only to packets forwarded in one direction. Routers make no attempt to direct return
traffic to the originating router. This IP routing behavior presents problems for a appliance cluster that does not
support asymmetric routing because the set of Cluster Nodes all provide a path to the same networks. Routers
ASYMMETRIC ROUTING
In Asymmetric Routing, PC1 communicates with Server1, two-way traffic passes through different routers, that is,
some packets of same connection go through blue path, some go through green path. On such deployments, the
routers might run some redundancy route or load balancing protocols, for example, the Cisco HSRP protocol.
SonicOS uses stateful inspection. All connections passing through the appliance are bound to interfaces. With
support for asymmetric routing, however, SonicOS tracks ingress and egress traffic, even when the flows go
across different interfaces, and provides stateful, deep packet inspection.
NOTE: Asymmetric routing is not the same as one-way connections without reply, that is, TCP State Bypass.
In this context, the point-to-point link is not equivalent to PPP (point to point protocol). A point-to-point link using a
31-bit mask can use or not use the PPP protocol. 31-bit prefixed IPv4 addresses on a point-to-point link can also
be used in the Ethernet network.
Topics:
l 31-Bit Network Environment Example
l Configuring a 31-Bit Network in SonicOS
In this network environment, Host PC1 and Host PC2 can visit each other, while hosts in the LAN network can
visit Host PC2.
5. On the firewall, add one route entry to enable the WAN zone data flow from X2 to X5, and X5 to X2:
Any 10.102.234.0 Any X2 Default Gateway X2
SonicOS adds two policies to the NETWORK | System > Dynamic Routing table.
Caveats
To change X3 to another mode when X2 unnumbered to X3 is configured, first terminate the relationship with X2
by changing X2 to another mode. Otherwise, if you change the IP address or mask of interface X3, it causes X3 to
reconnect to the PPPoE server.
6. For IP Address, enter the address provided by your ISP. Usually it is the second IP address assigned by
the provider.
7. Enter the subnet mask assigned by the ISP in the Subnet Mask field.
8. Finish configuring this interface.
9. Click OK.
10. Finish configuring the first interface.
11. Click OK.
Failover & LB
WAN Failover enables you to configure one of the user-defined interfaces as a secondary WAN port. The
secondary WAN port can be used in a simple “active/passive” setup to allow traffic to be only routed through the
secondary WAN port if the primary WAN port is unavailable. This allows the SonicWall to maintain a persistent
connection for WAN port traffic by “failing over” to the secondary WAN port.
For a SonicWall appliance with a WWAN interface, you can configure failover using the WWAN interface.
Failover between the Ethernet WAN (the WAN port, OPT port, or both) and the WWAN is supported through the
WAN Connection Model setting.
This feature also allows you to do simple load balancing (LB) for the WAN traffic on the SonicWall. You can select
a method of dividing the outbound WAN traffic between the two WAN ports and balance network traffic. Load-
balancing is currently only supported on Ethernet WAN interfaces.
SonicOS can monitor WAN traffic using Physical Monitoring that detects when the link is unplugged or
disconnected, or Physical and Logical Monitoring that monitors traffic at a higher level, such as upstream
connectivity interruptions.
IMPORTANT: Before you begin, be sure you have configured a user-defined interface to mirror the WAN
port settings.
Topics:
l Settings
l Groups
l Statistics
2. On the Settings tab, select Enable Failover & LB. This option must be enabled for you to access the
Groups and Statistics tabs. If disabled, no options for failover and load balancing are available for
configuration. This option is selected by default.
3. Select Respond to Probes. When enabled, the appliance can reply to probe request packets that arrive
on any of the appliance’s interfaces. This option is not selected by default. Enabling this option makes the
Any TCP-SYN to Port option available.
4. Select Any TCP-SYN to Port.
l This option is only available when the Respond to Probes option is enabled. When selected, the
appliance only responds to TCP probe request packets having the same packet destination
address TCP port number as the configured value. The default TCP port number is 0.
l This option is not selected by default.
5. Click Accept.
Groups
To configure Group settings:
1. Navigate to the NETWORK | System > Failover & LB page.
2. Click the Groups tab and then click Configure for the Group you wish to configure.
7. Click OK.
8. Complete the Probing tab.
3. From the Display Statistics for drop-down menu, select the LB group for which you want to view statistics.
The Load Balancing Statistics table displays the following LB group statistics for the firewall:
l Interface –
l Total Connections –
l New Connection –
l Current Ratio –
l Average Ratio –
l Total Unicast Bytes –
l Rx Unicast –
l Rx Bytes –
l Tx Unicast –
l Tx Bytes –
l Throughput (KB/s) –
l Throughput (Kbits/s) –
4. Click Reset on the top right of the Statistics table to clear its information.
Neighbor Discovery
The Neighbor Discovery Protocol (NDP) is a messaging protocol that was created as part of IPv6 to perform a
number of the tasks that ICMP and ARP are able to accomplish with IPv4. Just like ARP, Neighbor Discovery
builds a cache of dynamic entries, and you can configure static Neighbor Discovery entries. The IPv4/IPv6
neighbor table shows the IPv6 neighbor messages and functions that are analogous to the traditional IPv4
neighbor messages.
The Static NDP feature allows for static mappings to be created between a layer 3 IPv6 address and a Layer 2
MAC address.
Topics:
l NDP Cache
l Static NDP Entries
l NDP Settings
NDP Cache
The NDP Cache table displays all current IPv6 neighbors.
TIP: To configure a specific length of time for an entry to time-out, enter a value in minutes in the NDP Cache
entry time-out (minutes) field; see NDP Settings.
3. In the IP Address field, enter the IPv6 address for the remote device.
4. From Interface, select the interface on the SonicWall appliance that is used for the entry.
5. In the MAC Address field, enter the MAC address of the remote device.
6. Click Add. The Static NDP Entry is added.
NDP Settings
In the NDP Settings tab, specify the maximum time to reach a neighbor.
NOTE: For IPv6, this value also can be set for each interface on the NETWORK | System > Interfaces |
Edit Interface > Advanced dialog. If Router Advertisement is enabled on an interface, the value set for the
interface is used for that interface only. For more information, see Configuring Interfaces.
2. Enter a number in the Neighbor Discover BaseReachableTime (seconds) field. The minimum is 0
seconds, the maximum is 3600 seconds, and the default is 30 seconds.
TIP: When this option's value is set to 0, the global value of NDP settings is used.
3. Click Change.
ARP
ARP (Address Resolution Protocol) maps layer 3 (IP addresses) to layer 2 (physical or MAC addresses) to
enable communications between hosts residing on the same subnet. ARP is a broadcast protocol that can create
excessive amounts of network traffic on your network. To minimize the broadcast traffic, an ARP cache is
maintained to store and reuse previously learned ARP information.
Topics:
l ARP Cache
l Static ARP Entries
l ARP Settings
ARP Cache
TIP: To configure a specific length of time for an entry to time out, enter a value in minutes in the ARP Cache
entry time out (minutes) field; see ARP Settings.
Topics:
l Viewing Static ARP Entries
l Adding Static ARP Entries
l Editing Static ARP Entries
l Deleting Static ARP Entries
l Secondary Subnets with Static ARP
To delete all Static ARP entries from the Static ARP Entries table:
1. Navigate to NETWORK | System > ARP | Static ARP Entries view.
2. Select the top left checkbox in the table title row. All Static ARP Entries are selected.
3. Click the Trash icon on the right side of the table.
4. Click Confirm when the confirmation dialog box appears.
Topics:
l Adding a Secondary Subnet
l Secondary Subnet Example
5. Click Save. The entry appears in the Static ARP Entries table.
6. Navigate to NETWORK | System > Dynamic Routing.
7. Add a static route for the 10.203.28.57 network, with the 255.255.255.0 subnet mask on the X3
Interface. For information about adding static routes, see Configuring Route Advertisements and Route
Policies.
8. To allow traffic to reach the 10.203.28.57 subnet and to allow the subnet to reach the hosts on the LAN,
navigate to the POLICY | Rules and Policies > Access Rules page.
9. Add appropriate access rules to allow traffic to pass.
ARP Cache entry timeout Specify a length of time for the entries to time out and to be flushed from the
(minutes) cache. The minimum time is two minutes, the maximum is 600 minutes (10
hours), and the default is 10 minutes.
Don’t glean source data Select to prevent source data from being obtained from ARP requests. This
from ARP requests option is not selected by default.
MAC IP Anti-Spoof
MAC and IP address-based attacks are increasingly common in today’s network security environment. These
types of attacks often target a Local Area Network (LAN) and can originate from either outside or inside a
network. In fact, anywhere internal LANs are somewhat exposed, such as in office conference rooms, schools, or
libraries, could provide an opening to these types of attacks. These attacks also go by various names: man-in-
the-middle attacks, ARP poisoning, SPITS. The MAC-IP Anti-Spoof feature lowers the risk of these attacks by
providing you with different ways to control access to a network, and by eliminating spoofing attacks at OSI Layer
2/3.
The effectiveness of the MAC-IP Anti-Spoof feature focuses on two areas. The first is admission control that
allows you the ability to select which devices gain access to the network. The second area is the elimination of
spoofing attacks, such as denial-of-service attacks, at Layer 2. To achieve these goals, two caches of information
must be built: the MAC-IP Anti-Spoof Cache, and the ARP Cache.
The MAC-IP Anti-Spoof cache validates incoming packets and determines whether they are to be allowed inside
the network. An incoming packet’s source MAC and IP addresses are looked up in this cache. If they are found,
the packet is allowed through. The MAC-IP Anti-Spoof cache is built through one or more of the following sub-
systems:
l DHCP Server-based leases (SonicWall’s - DHCP Server)
l DHCP relay-based leases (SonicWall’s - IP Helper)
l Static ARP entries
l User created static entries
The MAC-IP Anti-Spoof subsystem achieves egress control by locking the ARP cache, so egress packets
(packets exiting the network) are not spoofed by a bad device or by unwanted ARP packets. This prevents a
firewall from routing a packet to the unintended device, based on mapping. This also prevents man-in-the-middle
attacks by refreshing a client’s own MAC address inside its ARP cache.
After your setting selections for this interface are complete, click Save. After the settings have been adjusted, the
interface’s listing is updated on the MAC-IP Anti-Spoof page. The green circle with white check mark icons
denote which settings have been enabled.
NOTE: The following interfaces are excluded from the MAC-IP Anti-Spoof list:
l Non-Ethernet interfaces
l Port-shield member interfaces
l Layer 2 bridge pair interfaces
l High availability interfaces
l High availability data interfaces
Anti-Spoof Cache
The MAC-IP Anti-Spoof Cache lists all the devices presently listed as “authorized” to access the network, and all
devices marked as “blacklisted” (denied access) from the network.
If you need to edit an Anti-Spoof cache entry, click the entry’s Edit icon under the Configure column.
Single, or multiple, anti-spoof cache entries can be deleted. To do this, select the checkbox next to each entry,
then click Delete MAC-IP Anti-Spoof Cache).
Some packet types are bypassed even though the MAC-IP Anti-Spoof feature is enabled:
l Non-IP packets.
l DHCP packets with source IP as 0.
l Packets from a VPN tunnel.
l Packets with invalid Unicast IPs as their source IPs.
l Packets from interfaces where the Management status is not enabled under anti-spoof settings.
The Anti-Spoof Cache Search section provides the ability to search the entries in the cache.
The Spoof Detected List displays devices that failed to pass the ingress anti-spoof cache check. Entries on this
list can be added as a static anti-spoof entry.
Entries can be flushed from the list by clicking Flush. The name of each device can also be resolved using
NetBIOS, by clicking Resolve.
Web Proxy
When accessing the web through a proxy server located on the internal network (between you and the SonicWall
appliance), the HTTP/HTTPS connections recognized by the appliance originate from the proxy server, not from
you.
If you have a proxy server on your network, instead of configuring each computer’s web browser to point to the
proxy server, you can move the server to the WAN or DMZ zone and enable Web Proxy Forwarding using the
settings on the NETWORK | System > Web Proxy page. The appliance automatically forwards all web proxy
requests to the proxy server without requiring all the computers on the network to be configured.
Proxy Forwarding
A Web proxy server intercepts HTTP requests and determines if it has stored copies of the requested Web
pages. If it does not, the proxy completes the request to the server on the Internet, returning the requested
information to the user and also saving it locally for future requests.
Setting up a Web proxy server on a network can be cumbersome, because each computer on the network must
be configured to direct Web requests to the server.
If there is a proxy server on the SonicWall appliance’s network, you can move the appliance between the network
and the proxy server, and enable Web Proxy Forwarding. This forwards all WAN requests to the proxy server
without requiring the computers to be individually configured.
NOTE: The proxy server must be located on the WAN or DMZ; it cannot be located on the LAN.
After the appliance has been updated, a message confirming the update displays.
3. Enter a proxy server host name or IP address in the Enter Proxy Server Host Name or IP Address
field.
4. Click Accept. The new proxy server populates in the User Proxy Servers table.
5. Click Accept.
4. Make the change to the Enter Proxy Server Host Name or IP Address field.
5. Click Accept. The changed proxy server populates in the User Proxy Servers table.
PortShield Groups
A PortShield interface is a virtual interface with a set of ports, including ports on Dell Networking X-Series, or
extended switches assigned to it. PortShield architecture enables you to configure some or all of the LAN ports
into separate security contexts, providing protection not only from the WAN and DMZ, but between devices inside
your network as well. In effect, each context has its own wire-speed PortShield that enjoys the protection of a
dedicated, deep packet inspection firewall. On the NETWORK | System > PortShield Groups page, you can
manually group ports together that allow them to share a common network subnet as well as common zone
settings.
TIP: Zones can always be applied to multiple interfaces in the NETWORK | System > Interfaces page,
even without the use of PortShield groupings. These interfaces, however, do not share the same network
subnet unless they are grouped using PortShield.
You can assign any combination of ports to a PortShield interface. All ports not assigned to a PortShield interface
are assigned to the LAN interface.
NOTE: TZ series firewalls support Dell Networking X-Series switches and the Dell Networking X-Series
Solution, which expand the capability of the firewalls, especially for portshielding interfaces. See Configuring
PortShield Interfaces for Dell Networking X-Series Switches.
NOTE: For information about configuring PortShield interfaces for Dell networking X-Series switches, also
see Configuring PortShield Interfaces for Dell Networking X-Series Switches.
NETWORK | System > PortShield Groups allows you to manage the assignments of ports to PortShield
interfaces through:
l Port Graphics
l Port Configuration
l External Switch Configuration
l External Switch Diagnostics
The maximum number of interfaces available on the SonicWall firewalls varies depending on the model. The
feature is supported on all SonicWall firewalls running SonicOS.
In certain deployments, the number of ports required might easily exceed the maximum number of interfaces
available on the firewall. With the X-Series Solution, ports on switches are viewed as extended interfaces of the
appliance, thereby increasing the number of interfaces available for use up to 192, depending on the switch.
These extended ports can be portshielded and/or configured for High Availability (HA) and treated as any other
interface on the appliance.
Performance Requirements
A SonicWall appliance can now:
l Be provisioned for a maximum of four switches.
l Manage an increased number of ports.
X-Series switches (excluding X1052/X1052P models) are delivered from the factory in unmanaged mode to
avoid unauthorized access to the switch. You need to put the switch into Managed mode by pressing Mode, near
the power plug, for at least seven seconds.
X1052/X1052P models delivered from the factory are by default in Managed mode.
During the initial set up of the switch, to ensure the X-Series switch’s IP does not change dynamically when the
DHCP server is enabled on the appliance interfaces, choose Static IP instead of Dynamic IP.
For more information on these features, refer to the SonicWall SonicOS X-Series Solution Deployment Guide
located on the Support portal at https://www.sonicwall.com/support/technical-documentation/ and select TZ
Series in the Select A Product field.
l Apart from the initial IP address, username/password configuration, which can be found on the switch, no
other configuration is recommended to be performed on the X-Series switch directly through the switch’s
GUI/console. To do so results in the appliance being out-of-sync with the configuration state of the X-
Series switch.
l To manage the X-Series switch from the appliance, one of the interfaces of the appliance must be in the
same subnet as the X-Series switch. For example, to manage an X-Series switch with a default IP
192.168.2.1, an interface of the appliance needs to be configured in the 192.168.2.0/24 subnet and
connected to the X-Series switch.
Daisy-chaining allows those with large facilities, such as warehouses, to deploy two switches more than 1000 ft
apart on a given site, to be connected to each other through fiber, to have the first switch—the parent switch—
connected to the appliance, and to manage both the switches from the appliance. This deployment also allows
you access to an increased number of interfaces on the switch by using a single interface on the appliance. All
the interfaces of the parent switch and the child switch are available to be managed from the appliance.
Topics:
l Assumptions and Dependencies
l Daisy-chaining Support
Daisy-chaining Support
Both switches connected in daisy-chained mode must have the IP address in the same subnet, and the appliance
must be able to reach this subnet. Provisioning the switches in daisy-chained mode is a two-step process:
Some X-Series switches also support SFP/SFP+, as shown in X-Series switch PoE/PoE+ and SFP/SFP+
support.
Configuration of the PoE/PoE+ ports on the X-Series switch is managed from the UI of the X-Series switch and
not through NETWORK | System > PortShield Groups on the SonicWall appliance.
IMPORTANT: A SonicWave AC without an external power source must be portshielded through ports 1
through 12 on an X1026P or X1052P X-Series switch.
Any SonicWave non-AC model without an external power source can be portshielded through ports 1
through 8 (X1008P), 1 through 16 (X1018P), or 1 through 24 (X1026P and X1052P).
Any SonicWave with an external power source can be portshielded to any Ethernet port.
When connecting SonicPoints to an X-Series switch, it is important to consider the SonicPoint's power
requirements. A SonicPoint ACe/ACi/N2 requires a minimum of 25.5 watts. If your switch model does not support
PoE+, you must use a SonicPoint power injector. For which switches support PoE+, see PoE/PoE+ and
SFP/SFP+ Support. For more information about managing SonicPoints, see the Knowledge Base article;
SonicWall TZ Series and SonicWall X-Series Solution managing SonicPoint ACe/ACi/N2 access points.
For more information, refer to the GMS administration documentation located on the Support portal. Go to
https://www.sonicwall.com/support/technical-documentation/ and select GMS in the Select A Product field.
For more information, refer to the SonicWall SonicOS X-Series Solution Deployment Guide located on the
Support portal at https://www.sonicwall.com/support/technical-documentation/ and select TZ Series in the
Select A Product field.
About Links
Management (MGMT) links carry only management traffic and cannot be portshielded.
Data links carry all PortShield traffic. If all they carry are data, the links are called common links. In a few
topologies, data links also carry management traffic, in which case they are called shared links.
Dedicated links can carry only one portshielded group, and that group must be portshielded to the dedicated port
on the appliance.
Supported Topologies
IMPORTANT: Before setting up the interface between the appliance and the switch, learn about
provisioning, configuring, and setting up these topologies in the SonicWall SonicOS X-Series Solution
Deployment Guide found on the Support portal at https://www.sonicwall.com/support/technical-
documentation/ by selecting TZ Series in the Select A Product field.
NOTE: For basic details on configuring PortShield interfaces with X-Series switches, see Managing Ports.
NOTE: SonicPoints must be portshielded through the port that is part of the dedicated link.
Port Graphics
Port Graphics displays the PortShield interfaces (ports) for your appliance. The large graphic represents the
appliance’s available interfaces. The interfaces are color coded to reflect their configuration:
When one or more extended switches are provisioned, Port Graphics displays the PortShield interfaces (ports)
for both the appliance and the switch(es):
l The first graphic displays the appliance’s ports and is not labeled.
l The next graphic displays the ports for the first external switch, External Switch 1, which is labeled
SwitchModel External Switch 1, for example, X1018P External Switch 1.
l If more external switches are provisioned, subsequent graphics display the ports for the other external
switches in order of their ID, that is, External Switch 2, External Switch 3, and External Switch 4.
The color coding for external interfaces is the same as for the appliance; see Color Code for Interface
Configuration.
Port Configuration
The Port Configuration table details more information about your PortShield interfaces:
Name Port name associated with the PortShield interface, such as X0 or X15. Ports
for any external switches are shown in the format ESs:n, where s is the switch
ID and n is the port number, as appropriate.
PortShield Interface Color-coded graphic reflecting the PortShield interface’s assignment and to
which PortShield group it belongs. This graphic is a smaller version of the
larger graphic(s) on Port Graphics.
NOTE: When an extended switch has been powered off and then the
appliance is restarted (rebooted), it might take up to five minutes before the
appliance discovers the extended switch and reports the Status of the
switch as up and available.
IP Address IP address of the extended switch.
Switch Mode Mode of the switch, such as Standalone.
Switch Management Switch port used for management traffic.
Firewall Uplink Port on the appliance configured as the appliance uplink. If no appliance port has
been configured as the appliance uplink, the column displays None.
Switch Uplink Port on the extended switch configured as the switch uplink. If no switch port has
been configured as the switch uplink, the column displays None.
Parent Switch ID For daisy-chained switches, the ID of the parent switch. If no switch port has
been configured as the parent switch, the column displays N/A.
Parent Switch Uplink Port on a daisy-chained parent switch configured as the switch uplink. If no
switch port has been configured as the parent switch uplink, the column displays
N/A.
Configure Contains the:
l Edit icon – Click to display the Edit External Switch dialog.
l Delete icon – Click to delete the switch entry.
External Switch Configuration provides information about the external switches provisioned on the appliance
and allows you to manage the switch. You can also configure or delete an extended switch. To configure an
extended switch, see PortShield Groups; to delete an extended switch, see the SonicWallX-Series Solution
Deployment Guide.
External Switch Diagnostics displays statistics and other information about only one switch at a time. By default,
the data for External Switch 1, ES1, is displayed. If you have two or more external switches, to display data about
a different external switch, choose ES2, ES3, or ES4 from Switch Name.
Statistics
The Statistics table displays a running tally of all statistics.
STATISTICS TABLE
Oversized packets Number of received packets larger than the port was expecting.
Firmware Management
The Firmware Management table displays information about the external switch’s firmware and boot code.
NOTE: You can add PortShield interfaces only to Trusted, Public, and Wireless zones.
4. In the Mode / IP Assignment drop-down menu, select PortShield Switch Mode. The options change
again.
5. From PortShield to, select the interface you want to map this port to. Only ports that match the zone you
have selected are displayed.
6. Click OK.
Port Graphics displays a graphical representation of the current configuration of PortShield interfaces. For a
description of the graphic display, see Viewing Interfaces (Ports) on Port Graphics.
You can manually group ports using the graphical PortShield Groups interface by clicking on the ports you want
to group. Grouping ports allows them to share a common network subnet as well as common zone settings.
NOTE: The name of the interface for this port is dimmed and cannot be changed.
3. From Port Enable, select whether you want to enable or disable the interfaces. The default is Enabled.
4. From PortShield Interface, select which interface you want to assign as the master interface for this
PortShield interfaces. The default is Unassigned.
5. From Link Speed, select the link speed for the interfaces:
l Auto Negotiate (default)
l 1000 Mbps – Full Duplex
6. Click OK.
NETWORK | System > PortShield Groups displays a graphical representation of the current configuration of
PortShield interfaces on both the firewall and the extended (external) switch(es). If there is one external switch,
there are two graphics; for two external switches, there are three graphics, and so on. The switch graphics are
labeled with the switch model and the external switch ID: 1, 2, 3, 4.
You can manually group ports on the firewall and switches together using the graphical PortShield Groups
interface by clicking on the ports you want to group. Grouping ports allows them to share a common network
subnet as well as common zone settings.
The Name field is dimmed and cannot be modified. It displays the names of both the appliance’s and external
switch’s ports you selected (n is the selected port):
l Firewall ports are named Xn.
l External switch 1 ports are named ES1 : n.
l External switch 2 ports are named ES2 : n.
5. From PortShield Interface, select which interface you want to assign as the master interface for these
PortShield interfaces:
l Unassigned
l Port name
IMPORTANT: For a port to be an interface, it must be configured with an IP address. Otherwise, the port is
not listed in PortShield Interface.
l —Keep Current Settings— (default)
NOTE: PortShield options could be disabled for external switch ports. Ports that are portshielded here are
configured automatically as access VLANs for the corresponding PortShield VLAN.
6. From Link Speed, select the link speed for the interfaces:
l Auto Negotiate
l 1000 Mbps – Full Duplex
l 100 Mbps – Full Duplex
l 100 Mbps – Half Duplex
l 10 Mbps – Full Duplex
l 10 Mbps – Half Duplex
l —Keep Current Settings— (default) – By default, the link speed for all ports on the extended
switch are set to Auto Negotiate.
7. Click OK.
PoE Settings
This feature is only available for TZ devices that include PoE support. If your TZ is designed for PoE support, the
PoE ports must be enabled individually for powered device (PD) detection and classification.
Topics:
l Enabling PoE on the Appliance
8. Select Power Enable, then set the desired options and click Save.
9. Power Mode – Changes to this option do not take effect unless a PoE device is connected to that port.
The TZ detects the mode from the device, but you can change the mode here. For example, if the Power
Mode is detected as 802.3 AT, you can change it to 802.3 AF if you know that the device requires a lower
power level.
10. Power Priority Level – By default, this option is set to Low for all PoE ports and the highest numbered
PoE port has the highest priority for power as distributed by the PoE controller. Set this option to High on a
lower numbered port to give it a higher priority.
VLAN Translation
Topics:
l Mapping Modes
l Mapping Persistence
l Map Multiple Interface Pairs
l Creating and Managing VLAN Maps
The VLAN Translation (mapping) feature allows traffic arriving on a VLAN to a Wire Mode interface operating in
Secure mode to be mapped to a different VLAN on the outgoing paired interface. Re-routing some of the traffic
coming into the appliance onto different VLANS allows you to perform further analysis, processing, or merely
remapping traffic. This feature is supported on all Wire Mode-capable devices.
An advantage of Wire Mode, is that you can preprovision the VLAN mapping. This allows you to have the
mapping in place before the interface receives traffic. You also can add and delete mapping on an active Wire
Mode interface.
NOTE: VLAN Translation is available on all platforms that support Wire Mode.
NOTE: VLAN Translation and Wire Mode over VLAN interfaces cannot be enabled at the same time.
Mapping Modes
You can create a VLAN mapping in these modes:
l Unidirectional mapping – For example, use to:
l Secure printing from a less-secure network to a high-secure network
l Transfer application and operating system updates from a less-secure network to a high-secure
network
l Monitor multiple networks in a SOC (security operations center)
l Provide time synchronization in high-secure networks
l Transfer files
l Provide a “you have mail” alert to a high-secure network from a less-secure network
Mapping Persistence
The VLAN map created for a pair of interfaces is persistent over reload and is stored as part of the configuration.
If the wire-mode pair (secure mode) have mapping associated with them, the wire mode cannot be changed
unless the mapping policy is deleted.
If the paired interface is changed, the message, Cannot change wire-mode pair interface when WireMode
VLAN entries exist for the interface, displays.
Example
MULTIPLE INTERFACE PAIRS MAPPING
In Multiple interface pairs mapping, a mapping exists for X12 to X13 (policy 1) as well as X12 to X15 (policy 2).
As only X12 and X13 (policies 1 and 3) and X14 and X15 (policies 4 and 6) are currently forming a Wire Mode
pair, only policies 1, 3, 4, and 6 are active as indicated by the green checkmark in the active column.
NOTE: The wire-mode pair interfaces cannot change if Wire Mode VLAN entries exist for the interface.
NETWORK | System > VLAN Translation allows you to create and manage the VLAN mapping of interfaces.
Policy number and checkbox Number of the policy and its associated checkbox.
7. Select the zone for the paired interface from Paired Interface Zone. The default is LAN.
8. Configure the other options as if configuring a regular Wire Mode pair as described in Configuring Wire
and Tap Mode.
9. Click OK. The NETWORK | System > Interfaces page is updated.
Editing Mappings
To edit a mapping, click its Edit icon in the Configuration column. The Edit VLAN Translation dialog displays.
You can change any of the mappings except the Reverse Translation setting.
Filtering Mappings
If you have a lot of VLAN mappings, you can display only those of interest by:
Deleting Mappings
To delete mappings:
1. To delete:
A single mapping by:
l Clicking its Delete icon in the Configuration column.
2. Click OK.
IP Helper
Topics:
l Using IP Helper
l Configuring IP Helper
Using IP Helper
Topics:
l About IP Helper
l VPN Tunnel Interface Support for IP Helper
l DHCPv6 Relay
l Configuring IP Helper Settings
l Relay Protocols
l Policies
l DHCP/DHCPv6 Relay Leases
l Configuring IP Helper
l Enabling IP Helper
l Managing Relay Protocols
l Managing IP Helper Policies
l Filtering Which DHCP Relay Leases are Displayed
About IP Helper
IMPORTANT: IP Helper is not supported for WAN interfaces or for interfaces that are configured for NAT.
Many User Datagram Protocols (UDP) rely on broadcast/multicast to find its respective server, usually requiring
their servers to be present on the same broadcast subnet. To support cases where servers lie on different
subnets than clients, a mechanism is needed to forward these UDP broadcasts/multicasts to those subnets. This
mechanism is referred to as UDP broadcast forwarding. IP Helper helps broadcast/multicast packets to cross an
IP Helper supports user-defined protocols and extended policies. IP Helper provides better control on existing
NetBIOS/DHCP relay applications. Some of the built-in applications that have been extended are:
1. In PC:
a. Connect to the LAN (X0) subnet of GatewayA.
b. Set to obtain an IP address through DHCP mode.
DHCPv6 Relay
Topics:
l About DHCPv6 Relay
l Configuring DHCPv6 Relay
In SonicOS, supported destination addresses can be global addresses or link-local addresses, but not multicast
addresses.
DHCPv6 relay can be enabled on both physical and virtual interfaces. DHCPv6 is a built-in application in IP
Helper protocols.
8. Click Save.
A new DHCP lease appears in the DHCPv6 Relay Leases section of the page when the client gets a new
IP address from the server.
IP Helper Settings
Topics:
l Relay Protocols
l Policies
l DHCP/DHCPv6 Relay Leases
Relay Protocols
Port Optional second UDP port number for the IP Helper application.
Indicates whether raw mode was selected when the IP Helper application was
Raw configured. Timeout is ignored if this option is enabled.
Protocol UDP.
Timeout for the IP Helper cache. N/A indicates Raw mode is selected and the
Timeout (secs) timeout is ignored.
Indicates the mode the protocol supports:
l Broadcast
l Multicast
Mode l Both
Multicast IP Multicast IP the protocol uses.
Indicates whether the source IP address is translated when packets are
IP Translation forwarded by an IP Helper policy.
Enable Indicates whether the IP Helper policy is enabled.
Contains the Statistics, Edit, and Delete icons for the entries.
Configure NOTE: Only user-generated Relay protocols can be deleted.
Policies
Configure Contains the Edit and Delete icons for each entry.
Enabling IP Helper
To activate IP Helper features:
1. Navigate to NETWORK | System > IP Helper.
2. Select enable IP Helperin the top banner.
IMPORTANT: IP Helper is not supported for WAN interfaces or for interfaces that are configured for NAT.
Topics:
l Adding an IP Helper Policy
l Editing an IP Helper Policy
l Deleting IP Helper Policies
l Displaying IP Helper Cache from TSR
3. The policy is enabled by default. To configure the policy without enabling it, disable Enable Policy.
4. Select a protocol from the Protocol menu. The default is DHCP.
5. Select a source interface or zone from From.
6. From To, select either:
l A destination Address Group or Address Object.
l Create New Network to create a new Address Object. The Add Address Object dialog displays.
Ip=1.1.1.0/24;iface=x1;just-string
OR Ip=1.1.1.1,2.2.2.2,3.3.3.0/24
Iface=x1,x2,x3
Negative !ip=1.1.1.1;!just-string
!iface=x1,x2
Mixed Ip=1.1.1.1,2.2.2.2;mac=00:01:02:03:04:05; just-string;!iface=x1,x2
Dynamic Routing
A router running a dynamic routing protocol can change its routing table to a better path when the primary route
goes down.
Topics:
l Route Advertisement
l Settings
Route Advertisement
SonicWall firewalls use RIPv1 or RIPv2 to advertise its static and dynamic routes to other routers on the
network. Changes in the status of VPN tunnels between the firewall and remote VPN gateways are also reflected
in the RIPv2 advertisements. Based on your router’s capabilities or configuration, choose between:
l RIPv1, which is an earlier version of the protocol, has fewer features, and sends packets through
broadcast instead of multicast.
l RIPv2, which is a later version of the protocol, includes subnet information when multicasting the routing
table to adjacent routers and route tags for learning routes. RIPv2 packets are backwards compatible and
can be accepted by some RIPv1 implementations that provide an option of listening for multicast packets.
The RIPv2 Enabled (broadcast) selection, which broadcasts packets instead of multicasting them, is for
heterogeneous networks with a mixture of RIPv1 and RIPv2 routers.
1. NETWORK | System > Dynamic Routing | Route Advertisement displays only when Advanced
Routing Mode is disabled in Settings.
OSPFv2
NETWORK | System > Dynamic Routing > OSPFv2, which displays only when Advanced Routing Mode is
enabled on the Settings tab, shows the status of OSPFv2 and allows you to configure OSPFv2 for an interface.
Settings Icon from the top right portion of the page that displays the Settings pop-up for
configuring the metrics for default routes. See General Settings.
Interface (Zone) Interfaces and their zone configured for OSPFv2. If a zone has not been
configured for an interface, the (Zone) designation is (N/A).
OSPFv2 Indicates whether OSPF is enabled on an interface:
l OSPF Enabled
l OSPF Enabled (passive)
l OSPF Disabled
OSPF Neighbor Status Displays the Status icon, which indicates whether there are active or inactive
neighbors; clicking the icon displays the Interface OSPFv2 Area Neighbors
pop-up for detail about the interface’s neighbors.
Configure Displays the Edit OSPFv2 Configuration icon for the interface.
Display this pop-up by clicking the Status icon for the interface. (OSPFv2 must be enabled on the Configuration
dialog.)
General Settings
To enable Dynamic Routing General Settings:
1. Navigate to NETWORK | System > Dynamic Routing | Settings tab.
2. Enable and confirm Advanced Routing Mode. Click the OSPFv2 tab. Click the Edit OSPFv2
Configuration icon for the Interface Configuration with the relevant Routes or Networks to be distributed.
3. In the dialog that appears, set OSPFv2 to Enabled and input the following information: Dead Interval,
Hello Interval, and OSPF Area. This information must match across all firewalls or the routes and
networks are not distributed correctly.
After everything is configured, you will see OSPF Neighbor Status on NETWORK | System > Dynamic Routing
| OSPFv2. A green bubble indicates that the neighbors are able to communicate, a red bubble indicates a failure.
You can check the firewall's Logs under DEVICE | Log > Settings > Network > Advanced Routing for more
information about failed peering.
OSPFv3
NETWORK | System > Dynamic Routing > OSPFv3, which displays only when Advanced Routing Mode is
enabled on the Settings tab, shows the status of OSPFv3 and allows you to configure OSPFv3 for an interface.
Icon that displays the Settings pop-up for configuring the metrics for default
Settings routes. See General Settings.
Interfaces and their zone configured for OSPFv3. If a zone has not been
Interface (Zone) configured for an interface, the (Zone) designation is (N/A).
Indicates whether OSPFv3 is enabled on an interface:
l OSPFv3 Enabled
l OSPFv3 Enabled (passive)
OSPFv3 l OSPFv3 Disabled
Configure OSPFv3 Displays the Edit icon for the interface.
Displays the Status icon, which indicates whether there are active or inactive
neighbors; clicking the icon displays the Interface OSPFv3 Area Neighbors
OSPFv3 Neighbor pop-up for more detail about the interface’s neighbors. See NETWORK |
Status System > Dynamic Routing > OSPFv3> Interface OSPFv3 Neighbors.
RIP
NETWORK | System > Dynamic Routing > RIP, which displays only when Advanced Routing Mode is
enabled on the Settings tab, shows the status of RIP and allows you to configure RIP for an interface.
Settings Icon that displays the Settings pop-up for configuring the metrics for default
routes. See General Settings.
RIPng
NETWORK | System > Dynamic Routing > RIPng, which displays only when Advanced Routing Mode is
enabled on the Settings tab, shows the status of RIPng and allows you to configure RIPng for an interface.
Icon that displays the Settings pop-up for configuring the metrics for default
Settings routes. See General Settings.
Interfaces and their zone configured for RIPng. If a zone has not been
Interface (Zone) configured for an interface, the (Zone) designation is (N/A).
Indicates whether RIPng is enabled on an interface:
l RIPng Enabled
l RIPng Enabled (passive)
RIPng l RIPng Disabled
Configure RIPng Displays the Edit icon for the interface.
DHCP Server
The appliance includes a DHCP (Dynamic Host Configuration Protocol) server to distribute IP addresses, subnet
masks, gateway addresses, and DNS server addresses to your network clients. NETWORK | System > DHCP
Server | DHCP Server Settings includes settings for configuring the appliance’s DHCP server.
IMPORTANT: You can use the appliance’s DHCP server or use existing DHCP servers on your network. If
your network uses its own DHCP servers, make sure Enable DHCP Server is disabled.
Topics:
l Configuring a DHCP Server
l Configuring Advanced Options
IPV6
3. To distribute IP addresses, subnet masks, gateway addresses, and DNS server addresses to your
network clients, select Enable DHCPv4/6 Server. This option is selected by default. For IPv4, Advanced
and other server settings options become available.
4. For configuring DHCPv6, skip to Step 7.
Topics:
l Configuring the DHCP Server for DNS Proxy
The DHCP Server Lease Scopes table displays the currently configured DHCP IP ranges:
The current DHCP lease information is displayed in the Current DHCP Leases table. Each binding entry
displays the:
l IP Address
l Hostname
l Lease Expires
l Ethernet Address
l Vendor
The current DHCP lease information is displayed in the Current DHCP Leases table. Each binding entry
displays the:
l IP Address
l Lease Expires
l IAID
l DUID
l Type of binding (Dynamic, Dynamic BOOTP, or Static BOOTP)
l Delete icon
DHCPv6 Relay
SonicOS supports DHCPv6 Relay. For information about DHCPv6 relay in SonicOS, see DHCPv6 Relay.
Topics:
l Configuring DHCP Option Objects
l Configuring DHCP Option Groups
l Configuring a Trusted DHCP Relay Agent Address Group (IPv4 Only)
l Enabling Trusted DHCP Relay Agents
RFC-Defined DHCP Option Numbers provides a list of DHCP options by RFC-assigned option number.
NOTE: Available options differ depending on whether you are configuring an IPv4 or IPv6
option.
6. If:
l Only one option type is available, for example, for Option Number 2 (Time Offset), Option Array
is dimmed. Go to Step 7.
l There are multiple option types available, for example, for 77 (User Class Information), Option
Type becomes available and lists allowable types of the option, such as IP Address, Two-Byte
Data, String, or Boolean. Select the option type.
7. Type the option value, for example, an IP address, in the Option Value field. If Option Array is checked,
multiple values can be entered, separated by a semi-colon (;).
8. Click OK. The object displays in the Option Objects table.
NOTE: Available options differ depending on whether you are configuring an IPv4 or IPv6
option (see IPv6 DHCP Advanced Settings or IPv4 DHCP Advanced Settings).
Address Objects and Address Groups are configured in OBJECT | Match Objects > Addresses | Address
Objects. For more information on how to configure Address Objects and Address Groups, see the SonicOS
Object Administration Guide.
NOTE: When a server is assigned as the internal DHCP server for DHCP over VPN Central Gateway, DHCP
messages that come from the VPN tunnel are always bypassed.
To enable the Trusted Relay Agent List option and select the desired Address Group:
1. Navigate to NETWORK | System > DHCP Server | DHCPv4 Settings.
2. Click Advanced. The DHCP Advanced Settings dialog displays.
3. Click the Others view.
4. Select Enable Trusted DHCP Relay Agent List. This option is not selected by default. Trusted Relay
Agent List becomes available.
5. Select the Address Group from Default Trusted Relay Agent List. This option includes all existing
address groups as well as the Create New Address Object Group option.
6. To create a custom Address Group for this option, select Create New Address Object Group. The Add
Address Object Group dialog displays. For information on how to configure Address Groups, see the
SonicOS Object Administration Guide.
7. Click OK to enable the Trusted Relay Agent List option with the selected Address Group.
DNS/WINS
Advanced
For more information on VoIP support features on the SonicWall firewall, see VoIP.
DNS
Advanced
The Static Range Configuration dialog displays. Go to Adding Static Range Configuration
Settings.
IMPORTANT: To select an interface from the Interface menu, it must first be fully configured
and it must be of the zone type, LAN, WLAN, or DMZ, or be a VLAN subinterface.
6. Enter the number of minutes an IP address is leased by the scope before it is issued another IP address in
the Lease Time (minutes) field. The minimum is 0, the maximum is 71582789, and 1440 minutes (24
hours) is the default.
7. Use the populated gateway address or enter the IP address of the gateway into the Default Gateway
field.
8. Use the populated subnet mask or enter the gateway subnet mask into the Subnet Mask field.
9. Optionally, enter a comment in the Comment field.
10. For how to configure DNS/WINS and Advanced settings, see DNS/WINS and Advanced, respectively.
11. Click OK to add the settings to the firewall.
12. Click Accept for the settings to take effect on the firewall.
For more information on VoIP support features on the SonicWall firewall, see VoIP.
DNS/WINS
Advanced
For more information on VoIP support features on the SonicWall firewall, see VoIP.
The Add DHCPv6 Static Scope dialog displays. Go to Adding Static Range Configuration
Settings.
DNS
NOTE: Before generic options for a DHCP lease scope can be configured, a static or dynamic DHCP server
lease scope must be created.
The RFC-Defined DHCP Option Numbers provides a list of DHCP options by RFC-assigned option number.
Multicast
IP multicasting is a method for sending one Internet Protocol (IP) packet simultaneously to multiple hosts.
Multicast is suited to the rapidly growing segment of Internet traffic - multimedia presentations and video
conferencing. For example, a single host transmitting an audio or video stream and ten hosts that want to receive
this stream. In multicasting, the sending host transmits a single IP packet with a specific multicast address, and
the 10 hosts simply need to be configured to listen for packets targeted to that address to receive the
transmission. Multicasting is a point-to-multipoint IP communication mechanism that operates in a
connectionless mode - hosts receive multicast transmissions by “tuning in” to them, a process similar to tuning in
to a radio.
The NETWORK | System > Multicast page allows you to manage multicast traffic on the firewall.
l Enable Multicast - Select this option to support multicast traffic. This option is not selected by default.
l Require IGMP Membership reports for multicast data forwarding - Select this option to improve
performance by regulating multicast data to be forwarded to only interfaces joined into a multicast group
address using IGMP. This option is available only if Multicast is enabled. This option is selected by default.
Topics:
l Multicast Policies
l IGMP State
l Enabling Multicast
Multicast Policies
TIP: Multicast must be enabled for these options to be available.
l Enable reception of all multicast addresses - This radio button is not enabled by default. Select this
radio button to receive all (class D) multicast addresses.
NOTE: Receiving all multicast addresses might cause your network to experience performance
degradation.
l Enable reception for the following multicast addresses - Select an existing multicast object/group.
You can also create a new multicast object or a new multicast group to have it listed in the drop-down
menu. In the drop-down menu, select Create a new multicast address object or Create new multicast
group.
NOTE: Only address objects and groups associated with the MULTICAST zone are available to
select. Only addresses from 224.0.0.1 to 239.255.255.255 can be bound to the MULTICAST zone.
NOTE: You can specify up to 200 total multicast addresses.
Topics:
l Creating a Multicast Address Object
6. Click Save.
IGMP State
This section provides descriptions of the fields in the IGMP State Table.
l Multicast Group Address—Provides the multicast group address the interface is joined to.
l Interface / VPN Tunnel—Provides the interface (such as LAN) for the VPN policy.
l IGMP Version—Provides the IGMP version (such as V2 or V3).
l Time Remaining—Provides the remaining time details.
Enabling Multicast
This section provides information on how to enable the multicast through a VPN and on a LAN dedicated
interface.
Topics:
l Enabling Multicast on a LAN-Dedicated Interface
l Enabling Multicast Support for Address Objects over a VPN Tunnel
4. In the Name field, enter a name for your multicast address object.
5. From the Zone Assignment drop-down menu, select a zone: DMZ, LAN, MULTICAST, SSLVPN, VPN,
WAN.
6. When you select a type from the Type drop-down menu, the other options change, depending on the
selection. If you select:
l Host: enter an IP address in the IP Address field.
l Range : enter the starting and ending IP addresses in the Starting IP Address and the Ending IP
Addressfield.
l Network: enter the network IP address in the Netmask field and a netmask or prefix length in the
Netmask/Prefix Length field.
l MAC: enter the MAC address in the MAC Address field and select the Multi-homed host checkbox
(which is selected by default).
l FQDN: enter the FQDN hostname in the FQDN Hostname field.
7. Click Save.
8. Navigate to NETWORK | System > Interfaces page.
9. Click the Edit icon for the Group VPN policy you want to configure. The VPN Policy dialog displays.
10. Click Advanced.
Network Monitor
The Network in the top navigation menu consists of Network Monitor services that provide a flexible mechanism
for monitoring network path viability. The results and status of this monitoring are displayed dynamically on the
Network Monitor page, and are also provided to affected client components and are logged into the system log.
Each custom NM (Network Probe) policy defines a destination Address Object to be probed. This Address Object
can be a Host, Group, Range, or FQDN. When the destination Address Object is a Group, Range, or FQDN with
multiple resolved addresses, Network Monitor probes each probe target and derives the NM Policy state based
on the results.
Topics:
l About Network Monitor
l Configuring Network Monitor
The NETWORK | System > Network Monitor page shows the dynamic performance data (latency/jitter/packet
loss) and probe status for each path (interface) in the address object group, in both tabular and graphic displays.
The display can show data for the last minute (default), last day, last week, or last month.
Number of the probe. The Collapse/Expand icon toggles the display of the
# graphs.
Name Name of the Network Monitor Policy.
NOTE: When - TCP – Explicit Route is selected along with the RST
Probe Type Response Counts as Miss field, the Port field also becomes available.
Interval Time between SD-WAN performance probes, in seconds.
Port for the SD-WAN performance probe. The minimum/maximum values are 1
to 65535. Ports are displayed only for TCP - Explicit Route probe types. A
Port hyphen (–) displays for Ping - Explicit Route probe types.
Response Timeout Maximum delay for a response.
Failure Threshold Number of missed intervals before the probe state is set to DOWN.
Success Threshold Number of successful intervals until the probe state is set to UP.
When configuring Network Monitor, default row(s) are created for each of the interfaces used by the groups
established on the Network Monitor Policies screen.
2. Click OK.
AWS Configuration
The firewall integration with Amazon Web Services (AWS) enables Logs to be sent to AWS CloudWatch Logs,
Address Objects and Groups to be mapped to EC2 Instances and VPNs created to allow connections to Virtual
Private Clouds (VPCs). For an overview and links to pages describing how to use the individual firewall GUI
pages, refer to the SonicOS AWS User Guide.
In order that the firewall can communicate with the various Application Programming Interfaces (APIs) of the
Amazon Web Services (AWS), and thereby implement the integration with AWS, it is necessary to configure the
firewall with the relevant AWS Security Credentials. The information required includes an AWS Identity and
Access Management (IAM) User's Access Key, the corresponding Secret Access Key and a default region. The
default region is used by the AWS Logs page, and for initialization of the AWS Objects and AWS VPN pages
though different regions can be selected on those two pages.
Assuming that the AWS Account is already created and that an Administrator with either Root access or
widespread privileges is logged into that account, it is then necessary to create an IAM User, if one does not
already exist, that is used by the firewall to access the various AWS APIs for the services supported by the
firewall.
You need certain permissions to access the different services. These permissions can either be granted directly
to the user or included in a security access policy assigned to an IAM Group and then the user added to that
group.
Creating a group is described in the IAM Documentation. It is not strictly necessary to create a group; the
permissions can be assigned directly to a user, however, it is common practice to define such a group so that it
can be used for multiple users.
A user must be created. That user can be created specifically for use by the firewall alone. However, if the same
user is going to access the AWS Management Console, the relevant checkbox must be ticked. In either case, the
user must have "programmatic access."
The second step of the Add User wizard determines which permissions the user has assigned, either through
adding the user to a group or attaching the permission policies directly.
After reviewing the details of the user to be created and pressing Create User, there is a final and critical stage.
You must retrieve the Secret Access Key that has been created for the user. The Secret Access Key together
with the Access Key is used in the configuration of the firewall. It is needed for all API access to AWS. You
should either copy it to a safe location or download the CSV file and keep that in a safe, secure location.
If you miss getting the Secret Access Key, it is possible to create another access Key from the User section of the
IAM Console. Indeed, it is considered good practice to rotate Access Keys.
Firewall Configuration
Having obtained the Access Key and Secret Access Key for the user account that is used to enable the firewall to
access the AWS APIs, the basic configuration of the firewall itself is straightforward.
2. Enter the Access Key ID, the Secret Access Key, Confirm Key, and select a default Region.
After all the settings have been entered, press Accept to save the configuration.
Test Connection
To test that the submitted credentials are acceptable and that the firewall can successfully communicate with
AWS, press Test Connection. This results in a number of tests being run from the firewall with the feedback
being shown.
For example, suppose an invalid Access Key had been entered, the resulting pop-up dialog would show
something like this:
Clicking Test Connection provides more information about the tests that were conducted, highlighting the failed
task.
After closing the chain of pop-up dialogs, correcting the invalid Access Key and saving the new configuration,
the Test Connection can be run again. If successful, the pop-up dialog would indicate that.
The configuration of AWS credentials is now complete. You can proceed to configure the firewall to send log
events to AWS Cloud Watch Logs on the AWS Logs page, map EC2 Instances to Address Objects and Groups
on the AWS Objects page and connect the firewall to Virtual Private Clouds (VPCs) on the AWS VPN page.
SonicWall Support
Technical support is available to customers who have purchased SonicWall products with a valid maintenance
contract.
The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a
day, 365 days a year. To access the Support Portal, go to https://www.sonicwall.com/support.
The information in this document is provided in connection with SonicWall and/or its affiliates’ products. No license, express or implied,
by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of products.
EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS
PRODUCT, SONICWALL AND/OR ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS,
IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT
SHALL SONICWALL AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE,
SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS
INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF
SONICWALL AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its
affiliates make no representations or warranties with respect to the accuracy or completeness of the contents of this document and
reserves the right to make changes to specifications and product descriptions at any time without notice. and/or its affiliates do not
make any commitment to update the information contained in this document.