`
UK Sales: 0330 1340 230

Latest News

09/05/2024
by Paul Heritage

Latest blogs and updates from SonicWall-Sales.com

Why upgrade to a SonicWall Gen 7 TZ Series firewall

14/12/2020
by Paul Heritage

10 REASONS TO UPGRADE

  1. 1. Multi-gigabit support in desktop form factor, fiber interface and high port density
    • Benefit: Organizations that require increased throughput to support bandwidth-intensive applications and data transfer need multi-gigabit ports. Multi-gig firewalls work seamlessly with SonicWave APs and SonicWall Switches to deliver end-to-end multi-gigabit performance. In addition, having greater number of ports allows organizations to connect more devices directly to the firewall.
    • Difference: The TZ470/570/670 series next-generation firewalls are the first desktop form factor to bring multigigabit (2.5/5/10G) interfaces or fiber (SFP+, SFP) interfaces, while the rest support only gigabit interfaces. Gen 7 TZs supports a minimum of 8 ports while Gen 6 supports 5.
  2. 2. Superior hardware upgrades with expandable storage and redundant power supply
    • Benefit: Gen 7 TZs come an expandable storage that enables various features including logging, reporting, caching, firmware backup and more. Secondary power supply is available for redundancy in case of failure, providing business continuity.
    • Difference: TZ570/670 series come with an expandable storage slot on the bottom of the device that provides the ability to expand up to 256GB, while Gen 6 does not. TZ670 comes preloaded with 32GB expandable storage and TZ570/670 series firewalls support two AC power supplies for redundancy. The optional redundant power supply is available for purchase, while other models excluding the TZ570/670 series, support just one power supply.
  3. 3. Groundbreaking firewall inspection, DPI performance and IPSec VPN performance
    • Benefit: With increased network bandwidth requirements from IT trends such as apps, HD video streaming and social media, faster firewall inspection, DPI and IPSec VPN performance provides a secure network without performance degradation. Having a faster firewall performance provides organizations with a greater capacity to utilize higher internet speeds and support more concurrent and remote users.
    • Difference: Gen 7 TZs offer up to 4 times firewall, DPI and IPSec VPN performance over Gen 6 firewalls.
  4. 4. Scale higher with increased connection count (per second, SPI, DPI, DPI-SSL)
    • Benefit: Having a higher number of concurrent connections provides greater scalability by enabling more simultaneous user sessions to be active and tracked by the firewall.
    • Difference: Gen 7 TZs offer up to 15 times maximum connections over Gen 6 firewalls.
  5. 5. More single sign-on (SSO) users
    • Benefit: The single sign-on feature improves employee productivity and reduces IT support costs by enabling users to gain access to connected systems with a single ID and password.
    • Difference: Gen 7 firewalls allows up to 5 times more SSO users than Gen 6 series to benefit from the use of single sign-on.
  6. 6. Increased VPN connectivity
    • Benefit: For organizations with remote and branch locations such as Retail POS businesses, the ability to create a larger number of site-to-site VPN tunnels to connect distributed networks together and securely share data is essential.
    • Difference: Gen 7 offers up to 8 times more site-to-site VPN tunnels than Gen 6 firewalls.
  7. 7. High VLAN interfaces
    • Benefit: VLANs support the logical grouping of network devices, reduce broadcast traffic and allow more control when implementing security policies. It provides logical separation of devices on the same network. High VLAN interfaces signify better segmentation and performance for organizations.
    • Difference: Gen 7 TZ series offers up to 5 times more VLAN interfaces than Gen 6 TZ series.
  8. 8. 802.11ac Wave 2 technology with increase in max number of access points supported
    • Benefit: The latest 802.11ac Wave 2 technology enhances WiFi user experience by supporting MU-MIMO technology. Integrated WiFi option enables organizations to extend their wireless network farther without purchasing additional hardware. Alternatively, high number of APs supported by the firewall provide better scalability of the WiFi network.
    • Difference: Gen 7 TZs with the exception of TZ670, offers integrated 802.11ac Wave 2 support while Gen 6 supports only 802.11ac Wave 1 or 802.11n technologies. Gen 7 TZs support up to 4 times more number of access points over Gen 6 series.
  9. 9. Brand-new SonicOS 7.0 support
    • Benefit: The feature-rich SonicOS 7.0 operating system features modern UI/UX, topology view, enhanced policy, advanced security, networking and management capabilities, along with TLS 1.3 and default support for BGP routing without the need for additional license.
    • Difference: SonicOS 7.0 support is available on Gen 7 series and not available on Gen 6 series. Gen 6 series require an additional expanded license to be purchased to enable BGP support while the Gen 7 include BGP support as default with every firewall purchase. Stateful HA support is available on Gen 7 TZs and not available on Gen 6 TZ series.
  10. 10. 5G USB Modem Support
    • Benefit: USB 3.0 port could be used to plug in a 5G dongle for 5G connectivity. It is also backward compatible with 4G/LTE/3G technologies with the use of corresponding dongles.
    • Difference: 5G technology support is available on Gen 7 TZ series and not available on Gen 6 TZ series.

Original document

ALL UPGRADE MODELS: https://www.sonicwall-sales.comsecure-upgrade-plu...

Managing a centralised and scalable firewall platform

10/12/2020
by Paul Heritage

It's great when companies plan their growth and look to scale their operations due to continued increases in sales and revenues.

However, with this growth comes a requirement to increase the speed at which IT security and, in particular, firewalls need deploying.

Protecting your systems and networks is vital, and firewalls act as the perfect barrier to prevent such cyber-attacks from slipping through the net.

As your business, networks, and systems grow, you need to have robust measures in place to manage these firewall operations, allowing you to respond to risks and continued daily challenges.

Managing a centralised and scalable firewall platform


Some of the main reasons why companies move from managing individual firewalls to managing a more centralised system (such as the SonicWall NSM) include:

  • IT teams are overwhelmed with the management of fragmented firewall silos.
  • Inconsistent firewall policies are causing various security vulnerabilities.
  • Due to the fragmented approach, IT teams aren't able to respond to threats promptly.
  • Internal security audits have identified potential gaps that need attention.

To help, SonicWall is on hand!

The latest Network Security Manager (NSM) is primarily designed for the cloud and offers a multi-tenant centralised firewall system that puts you in control.

You can now take command of firewalls across your network, managing and seeing instantly risks coming your way.

Easy to use, the NSM allows you to centrally orchestrate your firewall management and reduce the chances of human error and policy misconfigurations.

The system is also much more intuitive and visually pleasing, with menus, navigation, and workflows all simplified, organised, and above all, streamlined.

Now, with NSM, you and your IT teams are more effective, aware, and in control.

Security control

With NSM, companies will be in a position to scale on demand. Using its more effective visibility, tenant-level manageability, and group-based device control, those utilising NSM will be in a position to deploy and manage unlimited firewall devices, removing firewall silos altogether.

The platform also allows you to create consistency in your approach to IT security and cyber threats.

Developing synchronised policies across all cloud environments.

And of course, operating on the cloud means you can achieve all of this from anywhere using any browser-enabled device.

Effectiveness guaranteed

With NSM, you have the tools to work smarter. To have the time to think, plan, and implement faster without taking up too much of your time or effort.

You can now automate workflow processes to help simplify processes and tasks, allowing your security operations to run smoothly without you manually instructing systems, carrying out all of these activities from one unified device table.

These automated processes include:

  • Tracking all firewalls under your management from one single view.
  • Synchronising firewalls, keeping them all in line.
  • Upgrading all firewalls simultaneously and carrying out audits and backup configurations as and when required.
  • Scheduling reports for management.
  • Onboarding and operationalising as many firewalls as required, through zero-touch deployment.
  • Implementing changes to configuration easier and more intuitively. And,
  • Automating firewall operations such as performing system health checks and audit configurations, etc., through the REST API service available.

Increase Awareness

The NSM's intuitive dashboard boasts real-time monitoring that provides you with the best and most comprehensive reporting and analytical data around.

This level of detail and one glance view allows security operators to troubleshoot problems instantly, investigate potential risks, and take smart, effective security actions as outlined in policies and procedures.

The dashboard should help decision-making, planning, and be used in the development of cyber policies. Providing a company-wide view of all current activities and potential threats, companies can now have a more detailed understanding of whether their internal security requirements can be met or if more needs to be done.

Having this level of awareness relating to your company's security infrastructure is vital.

More reasons to opt for SonicWall's NSM

  • With its cloud-native SaaS offering, it can help lower TCO.
  • There's no maintenance schedule to adhere to
  • No configurations or upgrades are required.
  • No downtime (a big benefit to business)
  • And no depreciation or retirement costs.

Instead, through a cost-effective yearly subscription, you can simplify your management workflows and increase your overall efficiency.

Scalable to support various business environments, you can have one firewall or a hundred, as setting up network infrastructures and multiple device groups have never been easier to deploy and manage.

You are in complete control.

From the templates, you apply to the consistent security measures you enforce.

To find out more, check us out online or call us on 0330 1340 230; we'd be happy to help!

SonicWall Sweeps Six Industry Awards, Including Grand Trophy, at Network Product Guide 2020 IT World Awards

09/12/2020
by Paul Heritage

On the heels of a banner year, marked by the introduction of the Boundless Cybersecurity model and an unprecedented number of new product launches, SonicWall is pleased to announce it has won six prestigious awards in the 15th annual Network Product Guide’s 2020 IT World Awards event:

  • SonicWall GRAND TROPHY WINNER
  • Enterprise Network Firewalls: GOLD WINNER, NSsp 15700
  • Firewalls: SILVER WINNER, TZ570/TZ670
  • Information Security and Risk Management: BRONZE WINNER, SonicWall Network Security Manager
  • Security Hardware: GOLD WINNER, SonicWall Capture Security appliance 1000
  • Unified or Integrated Security: GOLD WINNER, SonicOSX 7

Based on its demonstration of overall excellence in a range of categories, as well as the quality of its entry submissions and content, SonicWall was awarded the coveted Grand Trophy distinction. This excellence was reflected in the latest SonicWall releases, from SonicOSX7 and the growing lineup of firewalls running it, to improvements in Network Security Manager (NSM) and the introduction of our brand-new Capture Security appliance (CSa) technology.

SonicOSX 7 took home the gold for its revolutionary architecture, which was designed to enable the latest features necessary for modern enterprises. These include Unified Policy, which combines Layer Three through Seven rules into a single rule base for an easier and more intuitive configuration, along with support for a true multi-instance architecture, which allows customers to provide tenants with dedicated resources to enable support for unique configurations and software versions.

The introduction of true multi-instance architecture is essential for our high-end Next-Generation Firewall (NGFW) line and helps distinguish it in the enterprise firewall market. This capability, as well as its comparative price/performance, port density and the availability of 100GbE ports are just some of the features that propelled the NSsp 15700 to the top, earning it a Gold award in Enterprise Network Firewalls category.

Our November product launch introduced a full Gen 7 TZ Series refresh — but only the TZ570 and TZ670 were ready to be judged by the submission deadline. With only two models in the line, the Gen 7 TZ line still won a Silver award for Firewalls.

(It’s worth noting that the NSa 2700 NGFW was also part of the November launch, and was released after the window for review. As the natural successor to the NSa 2650 — which was named “Best UTM” in early 2020 by SC Awards Magazine — we expect the NSa 2700 to start winning similar awards in the future.)

To complement our firewalls and help maintain compliance for those who can’t use Capture Advanced Threat Prevention (Capture ATP) for unknown malware detection, we created CSa 1000, which uses the memory-based RTDMI engine and features an improved UI. Network Products Guide was able to review the benefits that the on-premise CSa 1000 brings to compliance-sensitive customers that need advanced threat detection technology, and they proudly awarded it the gold medal for security hardware.

As SonicWall introduced greater and stronger capabilities and a growing number of security options, our customers began requesting a way to improve firewall management across even the largest and most distributed enterprises. The SonicWall NSM 2.0 SaaS was designed to better control, manage and monitor tens of thousands of network security devices — including firewalls, managed switches and secure wireless access points — from anywhere via a simple cloud interface. Network Product Guide recognized SonicWall’s ability to effectively manage this ecosystem by awarding it the Bronze award for Information Security and Risk Management.

If you would like to talk with our team about these solution sets and how they can work together to build a better security ecosystem for you, email our team. In the meantime, if you’d like to see how SonicWall solutions are used in real life, I recommend reading our solution brief, “Securing Smart Cities Over Distributed Networks.”

Cybersecurity during a pandemic

26/11/2020
by Paul Heritage

Unfortunately, just because the world is in the midst of a pandemic does not mean that cyber-attacks cease.

On the contrary.

We typically find an increase in the volume of cyber-attacks as they use vulnerability and fear to their advantage.

Cybersecurity during COVID 19 has seen business across all industries, tested. With reports of significant increases in malicious activity volume, exploiting the pandemic, and using uncertainty as a driver for a cyber-attack opportunity.

Cybersecurity during a pandemic

Phishing attacks are currently the most common cyber threats businesses, and individuals face. These and official-looking, specially designed apps that promote virus tracking maps, where once users click on these apps and data, their computers and phones are instantly infected with malicious software.

Plus, with more and more people now working from home than ever before, and potentially using their own devices and personal systems; the level of protection and security setup may not be as high as what endpoints at work are.

With an increase in the scope and severity of cyber-attacks since March and a marked increase in remote desktop protocol exploitation, we need to continue to educate ourselves and our teams about the reality of cyber threats, what to look out for, and how to stay safe online.

So, now that we have everyone paranoid about downloading malicious content onto their smartphones or computers, below we've highlighted in our cybersecurity guide some best practice security tips to help keep your networks and systems safe.

Keeping security high while working through a new `normal`

Top tips to stop a cyber-attack from reaching your systems:

Be wary of unknown or unexpected emails – even if the email looks as if it has come from a friend, make sure to check these emails out, looking specifically at their email address to make sure they haven't been spoofed!

Verify the email address – check out the sender's email address – may be the start of the email address looks official, but how does it end? Aol.com? Or maybe there's a slight spelling mistake in there somewhere to throw you off the scent. Get ready to do some proofreading!

Ransomware attacks are luring people using COVID 19 – these must be stopped by using firewall software like SonicWall firewall systems and backing up your data regularly.

Never open an unknown attachment – this is one of the first rules we all have drummed into us when using emails. Opening malicious PDF files is one of the most common forms of cyber-attacks used against businesses. Make sure to always know where your attachments are coming from and never open an attachment from an unknown sender.

Tread with caution when an email states it requires urgent attention – beware of the emails where you need to click on a link because new details have come to light regarding COVID, or where you have to subscribe with your personal details just to receive an announcement. These types of emails should all set alarm bells ringing that this is a potential scam!

Be wary of embedded links – always use official websites and navigate to the page from here rather than clicking the link embedded in the email.

Be careful of the increase in distributed denial of service (DDOS) attacks as more users try to access remote systems simultaneously. To help, companies should look to increase bandwidth allocations, disable any unused services, and discourage the streaming of videos and music, etc.

Only use your work laptop to access work and your company's network and systems. Using only the approved, secure remote access connection that has been provided.

Don't disable security features such as anti-malware or, indeed, your firewalls! And ensure all passwords and credentials are secure, and please don't reuse the same password across multiple accounts.

Signs you have fallen victim to a cyber-attack

There are a few signs that may indicate if your computer has fallen foul of a cyber-attack. If you feel any of the below applies to you, we'd advise you to speak with your IT team as soon as possible.

  • Pop up windows have now started to appear
  • Your browser's homepage has changed
  • Your computer slows down
  • Anti-virus software has become disabled
  • Your system and applications start behaving strangely
  • Unknown programmes start running on your system automatically.

Working in the new `normal`

There is no best way of operating cybersecurity in these times, as every company is different and, of course, every company will have individual approaches to their security procedures.

What we would suggest as minimum requirements are:

  • Carry out regular system backups and perform complete system backups more often.
  • Ensure that all work-related business is carried out through a VPN.
  • Enable automatic updates across all of your systems and networks where possible.
  • Enable the SonicWall firewall and configure the firewall with unique passwords.
  • Turn off WPS and UPnP and turn on WPA2 or WP3.

With the increase in data-driven technologies and the increase in attacks due to potentially reduced IT staffing or the use of insecure networks, maintaining and monitoring your IT security systems and software has never been so important.

Implementing and deploying the right software such as firewalls, anti-virus, anti-malware, spyware, and more help keep your business and teams operating in the safest way possible.

Keeping on top of encryption and patch maintenance and circulating policy controls, and safeguarding company information and data is what SonicWall systems and software do best.

To understand more how we can help support your online security through these times, call us on 0330 1340 230; we'd be happy to help.

Read next post: Managing a centralised and scalable firewall platform

Reference video: UNSW Business School

SonicWall Announce New Gen7 TZ270, TZ370 & TZ470 Series

16/11/2020
by Paul Heritage

The latest SonicWall TZ series, are the first desktop form factor next generation firewalls (NGFW) with 10 or 5 Gigabit Ethernet interfaces. The series consist of a wide range of products to suit a variety of use cases.

Designed for small, mid-sized organizations and distributed enterprise with SD-Branch locations, the 7th generation (Gen 7) TZ series delivers industry-validated security effectiveness with best-in-class price performance. These NGFWs address the growing trends in web encryption, connected devices and high-speed mobility by delivering a solution that meets the need for automated, realtime breach detection and prevention.

New full Gen7 firewall range datasheet: SonicWall TZ270 TZ370 TZ470 TZ570 TZ670 Gen7 TZ Series Datasheet

Popular SonicWall Firewall Configurations

15/11/2020
by Paul Heritage

This article lists all the popular SonicWall configurations that are common in most firewall deployments.

  • Configuring LAN Interface
  • Configuring the WAN (X1) connection
  • Configuring other interfaces (X2, X3 or DMZ etc)
  • Port forwarding to a server behind SONICWALL
  • Configuring remote VPN connections (GroupVPN, GVC, SSL-VPN, L2TP, etc.)
  • Site to Site VPN and Route Based VPN configuration
  • Configuring Wireless
  • Connect via Console
  • Resetting the SonicWall and Uploading firmware
  • Enabling SonicWall Security Services (Content Filter, IPS, GAV, etc.)
  • Configuring user authentication
  • Configuring High Availability
  • Installing GMS/Analyzer

RESOLUTION:

Configuring LAN Interface

Configuring SonicWall DHCP server settings

Configuring the WAN (X1) Interface

Configuring other interfaces (X2, X3 or DMZ etc)

Upgrading to latest Firmware

Port forwarding to a server behind SonicWall

Configuring remote VPN connections. (GroupVPN, GVC, SSL-VPN, L2TP, etc.)

Site to Site VPN and Route Based VPN configuration

Configuring Wireless

Diagnostic tools

Resetting the SonicWall, Diagnostic Files and Uploading firmware

Enabling SonicWall Security Services (Content Filter, IPS, GAV, etc.) and configuring user authentication

CFS:

GAV/IPS/ASW

Capture ATP

Application Firewall:

RBL

Geo-IP:

Configuring user authentication

Configuring High Availability

Installing GMS/Analyzer


Original article: https://www.sonicwall.com/support/knowledge-base/popular-sonicwall-firewall-configurations/170503358114735/

Upgrade your firewall to the latest firmware

17/10/2020
by Paul Heritage

To keep your security appliance updated against known threats you need review and update your current software and firmware. This week SonicWall announced an update to fix a potential issue with SSLVPN.

Please read the attached link and download & apply firmware as detailed.

https://www.sonicwall.com/support/product-notifica...

SonicWall Product Comparison

06/10/2020
by Paul Heritage

Official SonicWall page for comparing the different model groups.

TZ Entry-Level Firewall Compare: https://www.sonicwall.com/tz-entry-level-firewall-series-products-compare-2/

Mid-Range Firewall Comparison: https://www.sonicwall.com/mid-range-products-compare/

‘3 & Free’ Promotion: How to Upgrade Your SonicWall Firewall for Free

05/10/2020
by Paul Heritage

What is the SonicWall ‘3 & Free’ Promotion?

The limited-time SonicWall ‘3 & Free’ promotion is the easy, cost-effective way for customers to upgrade to the very latest SonicWall next-generation firewall appliance for free.

Through Oct. 31, 2020, eligible customers may receive a complimentary NSa 2650, TZ350 or SOHO 250 appliance by purchasing a bundle that includes a three-year subscription of the SonicWall Advanced Gateway Security Suite from their authorized SonicWall SecureFirst partner.

This security suite includes everything you need to stay protected against today’s modern attacks, including advanced malware, ransomware, encrypted threats, viruses, spyware, zero-day exploits and more. This complete service includes:

SonicWall’s exclusive security subscription service also includes SonicWall Real-Time Deep Memory Inspection (RTDMI). A patent-pending technology, RTDMI™ enables Capture ATP to detect and block malware that does not exhibit any malicious behavior or hides weaponry via encryption. This protects your organization from zero-day attacks, malicious PDFs and Microsoft Office files.

https://blog.sonicwall.com/en-us/2020/10/3-and-fre...

How to configure SSL VPN on SonicWall

01/10/2020
by Paul Heritage

SSL VPN license ultimately allows users who are working or operating remotely to connect to internal networks and resources safely and securely through the SonicWall.

Setup of SSL VPN is through the software solutions; SonicWall SSL VPN client, NetExtender, and the SonicWall mobile connect client.

How to configure SSL VPN on SonicWall

Configuring SSL VPN on the 7.X SonicOS

For the address ranges within SSL VPN IP v4, you first need to create your address object.

An administrator will need to log in to your UI firewall management and choose object from the menu.

Look for match objects and addresses, and then click add.

A second window will appear where you can then include the identified range for SSL VPN.

You then need to configure the SSL VPN by navigating to within the server settings to network SSL VPN and opting for SSL VPN status on zones.

From here, you can change SSL VPN access by switching to enable or disable (note, green indicates an active status).

Within the SSL VPN server settings, you then have the option to select domain and SSL VPN port.

(Note: the port option will be required if you connect using the NetExtender and mobile connect methods. The domain will be necessary for the user to gain access to the networks and log in.)

From the client settings – SSL VPN Network, choose default device profile and set the SSL VPN for zone IP v4 and set the address object generated previously as the Network address IP v4.

The tab across the top of the window labelled client routes allows you to manage what levels of network access remote users can be permitted via their connection.

The last tab, client settings, allows administrators to input suffix, WINS, and DNS information and control the caching passwords, behaviour of NetExtender clients, and usernames.

Change create client connection profile to enable and save all changes.

Adding additional SSL VPN users

NetExtender users can authenticate SonicWall for local users, or if they’re listed within a known group, this can be done through LDAP.

To add local users, you need to be within local users and groups, which can be found within devices and users. You can now add new users by simply clicking add.

Moving to the tab labelled groups, click SSL VPN services, and move this across to member of, section.

Moving across to VPN access, you can now add all relevant areas that the user will need access to.

Again, make sure to click save before closing the window.

For the zones of SSL VPN, it’s important to check access rule information.

To do this you need to access, access rules by following policy – rules and policies, then choose SSL VPN – LAN rules. If a user requires access to other zones to obtain resources, this can all be managed in this area by verifying and adding additional access rules as you go.

Configuring SSL VPN for the 6.5 SonicOS

Similar to the SonicOS 7.x, administrators will need to log in to the management platform of SonicWall and within the navigation menu choose manage and then address objects.

From here, click add.

A second window will appear where you now have the option to add your range for SSL VPN.

To configure these settings, click on SSL VPN on the settings page and go to WAN, changing it from red to green to show it is now active.

Now all SSL VPN configurations will be enabled in this particular zone.

You can then set the domain and ports for SSL VPN as you require.

Move across to client settings where, as administrator, you can configure the range of client addresses and NetExtender settings.

For the default device profile, click on configure.

Here you can set the network address v4 IP as your address object from before and set the zone v4 IP as SSL VPN.

The tab labelled client routes will allow administrators to manage the level of access users have to two networks.

It’s essential to set the VPN appropriately as all users will be able to see the routes but may not necessarily be authorised to access all network resources.

In the settings, administrators should also enter all required DNS and WINS data and create client profile connections by enabling this action.

Adding additional users

To add new users, click on users and local users and groups. Within groups, click add SSL VPN services to move the field to member of.

Moving to VPN access, you can then add all the relevant IP addresses and objects identified to the users requirements, in terms of access via NetExtender.

Note: Client routes and VPN access must match for users to have authority to access network resources.

Remember to click save, to save all changes before closing.

SSL VPN zones access rule details

Within access rules, you can access SSL VPN LAN rules with drop-lists available.

Access rules allow access to intended end devices through SSL VPN IPs which are also required for the firewalls to understand that such traffic is allowed through.

You can also test all connections and configurations by installing the SonicWall NetExtender.

Two final points to note:

Remember, within the user’s section of the menu toolbar, you must add in however many users that will have login credentials. Each user then must become a member of SSL VPN services group and have to subnet added to VPN access within the allow list.

In-network interfaces make sure to click on configure on the WAN interface and tick the HTTPS box beside the user login – this helps to minimise login failed attempts occurring when users access SSL VPN via a web portal.

For further information on a SonicWall VPN licence and more call 0330 1340 230, today.

Read the next article: Best Practices for SSL VPNs

Setting up SSL VPN

30/09/2020
by Paul Heritage

SonicWall's security appliance features SSL VPN, providing secure remote access to networks using the NetExtender client.

Below, we outline the steps required to help configure the SonicWall SSL VPN setup, allowing you to run applications securely across your company's network.


Setting up SSL VPN


Accessing NetExtender

Remote users will use NetExtender to access your networks and anything contained within these, i.e., documents, shared files, etc.


Typically users access NetExtender either by clicking on the NetExtender button found when logging in to the virtual office web portal or by launching the NetExtender as a standalone client (once installed, it will remain as a shortcut or within the Start menu making it easy to access after that).


How to setup SSL VPN for SonicOS 7.X

When setting up SonicWall SSL VPN on the latest 7.X firmware, the following instructions should help.


1. With the server settings, look for SSL VPN, Network.


2. Choose SSL VPN status on zones


3. You can choose whether you want and need to disable or enable access to SSL VPN (moving it to a green status means it is active).


4. You then need to move to the server SSL VPN settings. Here choose the port SSL VPN and the desired domain and configure within client settings SSL VPN, Network.


5. With the client settings, SSL VPN, you're able to configure the NetExtender client settings and the client address range information, i.e., which IP's you will provide for those connecting clients and where users can log in from.


6. For the default profile of the device, click on configure.


7. Change the Network IP v4 Address to the address range you inputted in point 5 and set the Zone IP V4 as SSL VPN.


8. Within client routes, you can now control network access for all users, deciding on what can and can't be accessed across the network.


9. The last tab, client settings, is where you can input Suffix, WINS, and DNS information, all while managing usernames, caching passwords, etc.


10. You must enable the create client profile connection for the NetExtender to make a connection and record the server name for the SSL VPN and domain name too.


11. To configure the SSL VPN virtual office's functionality and appearance, you need to use the SSL VPN portal settings page.


12. All SSL VPN users must be part of a user group or SSL VPN services member. To check this and change as appropriate within; device - users – local users and groups.


13. Moving across to VPN access at the top of the screen, you can choose one or more networks from the list, clicking the arrow button to move them directly across to the access list. If you need to change or remove a user's access rights, select the network from the access list and click on the arrow pointing left.


14. Finally, within policy, rules and access rules, set the SSL VPN to LAN rules. And if a user requires access to other zones, you can add and verify these via the access rules page.


SSL VPN setup for SonicOS 6.5

1. Select the SonicWall application and click on manage – SSL VPN settings.


2. To configure these client settings, you need to be on the SSL VPN client settings page where you can input the address range for the client, NetExtender information, and where the users will be able to log in.


3. Within the settings tab, make sure to select both network address IP V4 and Zone IP.


4. To allow the right level of access for users, administrators will need to set this within SSL VPN – client routes page.


5. To configure client settings for the NetExtender, the create client profile connection must be enabled.


6. For the virtual office portal's appearance and functionality, these elements must be configured within SSL VPN – portal settings.


7. Administrators will need to manage users and groups of users through users – local users and moving each member to the appropriate services group. When configuring local users, navigate to manage and system setup – local users and groups, you can then add SSL VPN services. To set local and LDAP user groups, you must edit SSL


VPN services and add the specified user group within the member's tab.


8. Within VPN access, you will see what users can access what networks. You can also add more networks to the access list as required. Of course, these can also be removed by carrying out the same procedure in reverse..


9. Note the new SSL VPN areas within firewall – access rules.


10. SSL VPN zones will auto-create firewall access rules; however, these can be modified, allowing access to only those users that have been configured.


11. Administrators should follow manage – network – interfaces, and within the WAN interface, administrators must ensure HTTPS is enabled.


Both of these SonicWall SSL VPN setup procedures can be tested via users through the SonicWall's public IP – always recommended.