Latest News
Latest blogs and updates from SonicWall-Sales.com
Managing a centralised and scalable firewall platform
It's great when companies plan their growth and look to scale their operations due to continued increases in sales and revenues.
However, with this growth comes a requirement to increase the speed at which IT security and, in particular, firewalls need deploying.
Protecting your systems and networks is vital, and firewalls act as the perfect barrier to prevent such cyber-attacks from slipping through the net.
As your business, networks, and systems grow, you need to have robust measures in place to manage these firewall operations, allowing you to respond to risks and continued daily challenges.
Some of the main reasons why companies move from managing individual firewalls to managing a more centralised system (such as the SonicWall NSM) include:
- IT teams are overwhelmed with the management of fragmented firewall silos.
- Inconsistent firewall policies are causing various security vulnerabilities.
- Due to the fragmented approach, IT teams aren't able to respond to threats promptly.
- Internal security audits have identified potential gaps that need attention.
To help, SonicWall is on hand!
The latest Network Security Manager (NSM) is primarily designed for the cloud and offers a multi-tenant centralised firewall system that puts you in control.
You can now take command of firewalls across your network, managing and seeing instantly risks coming your way.
Easy to use, the NSM allows you to centrally orchestrate your firewall management and reduce the chances of human error and policy misconfigurations.
The system is also much more intuitive and visually pleasing, with menus, navigation, and workflows all simplified, organised, and above all, streamlined.
Now, with NSM, you and your IT teams are more effective, aware, and in control.
Security control
With NSM, companies will be in a position to scale on demand. Using its more effective visibility, tenant-level manageability, and group-based device control, those utilising NSM will be in a position to deploy and manage unlimited firewall devices, removing firewall silos altogether.
The platform also allows you to create consistency in your approach to IT security and cyber threats.
Developing synchronised policies across all cloud environments.
And of course, operating on the cloud means you can achieve all of this from anywhere using any browser-enabled device.
Effectiveness guaranteed
With NSM, you have the tools to work smarter. To have the time to think, plan, and implement faster without taking up too much of your time or effort.
You can now automate workflow processes to help simplify processes and tasks, allowing your security operations to run smoothly without you manually instructing systems, carrying out all of these activities from one unified device table.
These automated processes include:
- Tracking all firewalls under your management from one single view.
- Synchronising firewalls, keeping them all in line.
- Upgrading all firewalls simultaneously and carrying out audits and backup configurations as and when required.
- Scheduling reports for management.
- Onboarding and operationalising as many firewalls as required, through zero-touch deployment.
- Implementing changes to configuration easier and more intuitively. And,
- Automating firewall operations such as performing system health checks and audit configurations, etc., through the REST API service available.
Increase Awareness
The NSM's intuitive dashboard boasts real-time monitoring that provides you with the best and most comprehensive reporting and analytical data around.
This level of detail and one glance view allows security operators to troubleshoot problems instantly, investigate potential risks, and take smart, effective security actions as outlined in policies and procedures.
The dashboard should help decision-making, planning, and be used in the development of cyber policies. Providing a company-wide view of all current activities and potential threats, companies can now have a more detailed understanding of whether their internal security requirements can be met or if more needs to be done.
Having this level of awareness relating to your company's security infrastructure is vital.
More reasons to opt for SonicWall's NSM
- With its cloud-native SaaS offering, it can help lower TCO.
- There's no maintenance schedule to adhere to
- No configurations or upgrades are required.
- No downtime (a big benefit to business)
- And no depreciation or retirement costs.
Instead, through a cost-effective yearly subscription, you can simplify your management workflows and increase your overall efficiency.
Scalable to support various business environments, you can have one firewall or a hundred, as setting up network infrastructures and multiple device groups have never been easier to deploy and manage.
You are in complete control.
From the templates, you apply to the consistent security measures you enforce.
To find out more, check us out online or call us on 0330 1340 230; we'd be happy to help!
SonicWall Sweeps Six Industry Awards, Including Grand Trophy, at Network Product Guide 2020 IT World Awards
On the heels of a banner year, marked by the introduction of the Boundless Cybersecurity model and an unprecedented number of new product launches, SonicWall is pleased to announce it has won six prestigious awards in the 15th annual Network Product Guide’s 2020 IT World Awards event:
- SonicWall GRAND TROPHY WINNER
- Enterprise Network Firewalls: GOLD WINNER, NSsp 15700
- Firewalls: SILVER WINNER, TZ570/TZ670
- Information Security and Risk Management: BRONZE WINNER, SonicWall Network Security Manager
- Security Hardware: GOLD WINNER, SonicWall Capture Security appliance 1000
- Unified or Integrated Security: GOLD WINNER, SonicOSX 7
Based on its demonstration of overall excellence in a range of categories, as well as the quality of its entry submissions and content, SonicWall was awarded the coveted Grand Trophy distinction. This excellence was reflected in the latest SonicWall releases, from SonicOSX7 and the growing lineup of firewalls running it, to improvements in Network Security Manager (NSM) and the introduction of our brand-new Capture Security appliance (CSa) technology.
SonicOSX 7 took home the gold for its revolutionary architecture, which was designed to enable the latest features necessary for modern enterprises. These include Unified Policy, which combines Layer Three through Seven rules into a single rule base for an easier and more intuitive configuration, along with support for a true multi-instance architecture, which allows customers to provide tenants with dedicated resources to enable support for unique configurations and software versions.
The introduction of true multi-instance architecture is essential for our high-end Next-Generation Firewall (NGFW) line and helps distinguish it in the enterprise firewall market. This capability, as well as its comparative price/performance, port density and the availability of 100GbE ports are just some of the features that propelled the NSsp 15700 to the top, earning it a Gold award in Enterprise Network Firewalls category.
Our November product launch introduced a full Gen 7 TZ Series refresh — but only the TZ570 and TZ670 were ready to be judged by the submission deadline. With only two models in the line, the Gen 7 TZ line still won a Silver award for Firewalls.
(It’s worth noting that the NSa 2700 NGFW was also part of the November launch, and was released after the window for review. As the natural successor to the NSa 2650 — which was named “Best UTM†in early 2020 by SC Awards Magazine — we expect the NSa 2700 to start winning similar awards in the future.)
To complement our firewalls and help maintain compliance for those who can’t use Capture Advanced Threat Prevention (Capture ATP) for unknown malware detection, we created CSa 1000, which uses the memory-based RTDMI engine and features an improved UI. Network Products Guide was able to review the benefits that the on-premise CSa 1000 brings to compliance-sensitive customers that need advanced threat detection technology, and they proudly awarded it the gold medal for security hardware.
As SonicWall introduced greater and stronger capabilities and a growing number of security options, our customers began requesting a way to improve firewall management across even the largest and most distributed enterprises. The SonicWall NSM 2.0 SaaS was designed to better control, manage and monitor tens of thousands of network security devices — including firewalls, managed switches and secure wireless access points — from anywhere via a simple cloud interface. Network Product Guide recognized SonicWall’s ability to effectively manage this ecosystem by awarding it the Bronze award for Information Security and Risk Management.
If you would like to talk with our team about these solution sets and how they can work together to build a better security ecosystem for you, email our team. In the meantime, if you’d like to see how SonicWall solutions are used in real life, I recommend reading our solution brief, “Securing Smart Cities Over Distributed Networks.â€
Cybersecurity during a pandemic
Unfortunately, just because the world is in the midst of a pandemic does not mean that cyber-attacks cease.
On the contrary.
We typically find an increase in the volume of cyber-attacks as they use vulnerability and fear to their advantage.
Cybersecurity during COVID 19 has seen business across all industries, tested. With reports of significant increases in malicious activity volume, exploiting the pandemic, and using uncertainty as a driver for a cyber-attack opportunity.
Phishing attacks are currently the most common cyber threats businesses, and individuals face. These and official-looking, specially designed apps that promote virus tracking maps, where once users click on these apps and data, their computers and phones are instantly infected with malicious software.
Plus, with more and more people now working from home than ever before, and potentially using their own devices and personal systems; the level of protection and security setup may not be as high as what endpoints at work are.
With an increase in the scope and severity of cyber-attacks since March and a marked increase in remote desktop protocol exploitation, we need to continue to educate ourselves and our teams about the reality of cyber threats, what to look out for, and how to stay safe online.
So, now that we have everyone paranoid about downloading malicious content onto their smartphones or computers, below we've highlighted in our cybersecurity guide some best practice security tips to help keep your networks and systems safe.
Keeping security high while working through a new `normal`
Top tips to stop a cyber-attack from reaching your systems:
Be wary of unknown or unexpected emails – even if the email looks as if it has come from a friend, make sure to check these emails out, looking specifically at their email address to make sure they haven't been spoofed!
Verify the email address – check out the sender's email address – may be the start of the email address looks official, but how does it end? Aol.com? Or maybe there's a slight spelling mistake in there somewhere to throw you off the scent. Get ready to do some proofreading!
Ransomware attacks are luring people using COVID 19 – these must be stopped by using firewall software like SonicWall firewall systems and backing up your data regularly.
Never open an unknown attachment – this is one of the first rules we all have drummed into us when using emails. Opening malicious PDF files is one of the most common forms of cyber-attacks used against businesses. Make sure to always know where your attachments are coming from and never open an attachment from an unknown sender.
Tread with caution when an email states it requires urgent attention – beware of the emails where you need to click on a link because new details have come to light regarding COVID, or where you have to subscribe with your personal details just to receive an announcement. These types of emails should all set alarm bells ringing that this is a potential scam!
Be wary of embedded links – always use official websites and navigate to the page from here rather than clicking the link embedded in the email.
Be careful of the increase in distributed denial of service (DDOS) attacks as more users try to access remote systems simultaneously. To help, companies should look to increase bandwidth allocations, disable any unused services, and discourage the streaming of videos and music, etc.
Only use your work laptop to access work and your company's network and systems. Using only the approved, secure remote access connection that has been provided.
Don't disable security features such as anti-malware or, indeed, your firewalls! And ensure all passwords and credentials are secure, and please don't reuse the same password across multiple accounts.
Signs you have fallen victim to a cyber-attack
There are a few signs that may indicate if your computer has fallen foul of a cyber-attack. If you feel any of the below applies to you, we'd advise you to speak with your IT team as soon as possible.
- Pop up windows have now started to appear
- Your browser's homepage has changed
- Your computer slows down
- Anti-virus software has become disabled
- Your system and applications start behaving strangely
- Unknown programmes start running on your system automatically.
Working in the new `normal`
There is no best way of operating cybersecurity in these times, as every company is different and, of course, every company will have individual approaches to their security procedures.
What we would suggest as minimum requirements are:
- Carry out regular system backups and perform complete system backups more often.
- Ensure that all work-related business is carried out through a VPN.
- Enable automatic updates across all of your systems and networks where possible.
- Enable the SonicWall firewall and configure the firewall with unique passwords.
- Turn off WPS and UPnP and turn on WPA2 or WP3.
With the increase in data-driven technologies and the increase in attacks due to potentially reduced IT staffing or the use of insecure networks, maintaining and monitoring your IT security systems and software has never been so important.
Implementing and deploying the right software such as firewalls, anti-virus, anti-malware, spyware, and more help keep your business and teams operating in the safest way possible.
Keeping on top of encryption and patch maintenance and circulating policy controls, and safeguarding company information and data is what SonicWall systems and software do best.
To understand more how we can help support your online security through these times, call us on 0330 1340 230; we'd be happy to help.
Read next post: Managing a centralised and scalable firewall platform
Reference video: UNSW Business School
SonicWall Announce New Gen7 TZ270, TZ370 & TZ470 Series
The latest SonicWall TZ series, are the first desktop form factor next generation firewalls (NGFW) with 10 or 5 Gigabit Ethernet interfaces. The series consist of a wide range of products to suit a variety of use cases.
Designed for small, mid-sized organizations and distributed enterprise with SD-Branch locations, the 7th generation (Gen 7) TZ series delivers industry-validated security effectiveness with best-in-class price performance. These NGFWs address the growing trends in web encryption, connected devices and high-speed mobility by delivering a solution that meets the need for automated, realtime breach detection and prevention.
New full Gen7 firewall range datasheet: SonicWall TZ270 TZ370 TZ470 TZ570 TZ670 Gen7 TZ Series Datasheet
Popular SonicWall Firewall Configurations
This article lists all the popular SonicWall configurations that are common in most firewall deployments.
- Configuring LAN Interface
- Configuring the WAN (X1) connection
- Configuring other interfaces (X2, X3 or DMZ etc)
- Port forwarding to a server behind SONICWALL
- Configuring remote VPN connections (GroupVPN, GVC, SSL-VPN, L2TP, etc.)
- Site to Site VPN and Route Based VPN configuration
- Configuring Wireless
- Connect via Console
- Resetting the SonicWall and Uploading firmware
- Enabling SonicWall Security Services (Content Filter, IPS, GAV, etc.)
- Configuring user authentication
- Configuring High Availability
- Installing GMS/Analyzer
RESOLUTION:
Configuring LAN Interface
Configuring SonicWall DHCP server settings
Configuring the WAN (X1) Interface
- How to configure the WAN / X1 Interface with PPPoE Connection?
- How to configure the WAN / X1 Interface with Dynamic / DHCP IP address?
- How to configure the WAN / X1 Interface with Static IP address?
- How to configure the WAN / X1 Interface with L2TP Connection ?
- How to configure the WAN / X1 Interface with PPTP Connection?
- How to change the MTU size?
- WWAN/3G/4G Mode
Configuring other interfaces (X2, X3 or DMZ etc)
- Configuring the DMZ / OPT Interface in NAT Mode
- How to Configure an interface as Secondary WAN port in SonicOS
- Configuring VLAN's with the SonicWall appliances with Cisco L2 Switch
Upgrading to latest Firmware
- Procedure to upgrade the SonicWall firmware Image with Current Preferences
- Registering the SonicWall UTM Appliance with MySonicWall.com
- How to download the latest SonicOS Firmware Version?
Port forwarding to a server behind SonicWall
- How to Enable Port Forwarding and Allow Access to a Server Through the SonicWall
- How to Open ports on the Firewall using the Configuration Wizard
- How to Enable Port Forwarding and Allow Access to a Server Through the SonicWall via the CLI
Configuring remote VPN connections. (GroupVPN, GVC, SSL-VPN, L2TP, etc.)
- How to Configure WAN GroupVPN to connect using Global VPN Client?
- How to setup SSL-VPN feature (NetExtender Access)
- How to create Bookmarks for specific users for the SSL VPN service
- Configuring L2TP Server
- How to configure the WAN / X1 Interface with L2TP Connection?
Site to Site VPN and Route Based VPN configuration
- Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites)
- Configuring Site to Site VPN when a Site has Dynamic WAN IP address (Aggressive Mode)
- How to configure numbered Tunnel Interface VPN (Route-Based VPN)
- How to configure NAT over VPN in a site to site VPN with overlapping networks
Configuring Wireless
- How to configure WGS (Wireless Guest Services) in SonicWall TZ devices with built-in Wireless
- How to configure WEP Encryption in SonicWall TZ devices with built-in Wireless?
- How to configure WPA Encryption in SonicWall TZ devices with built-in Wireless?
- With SonicPoints
- How to manage SonicPoint Access Points and upgrade SonicPoint firmware
- How to configure Wireless with SonicPoint using WPA encryption
- How to configure Wireless with SonicPoint using WEP encryptionVirtual Access Points (VAP)
- Configuring a Virtual Access Point (VAP) Profile for Wireless Corporate Users using SonicPoints
Diagnostic tools
Resetting the SonicWall, Diagnostic Files and Uploading firmware
- How To Put the SonicWall into Safe Mode
- How to Upgrade SonicOS Firmware
- Understanding and resolving preferences corruption after an attempted "downgrade" of firmware
- Can Settings be Exported/Imported from one SonicWall to Another? (Support Matrix)
Enabling SonicWall Security Services (Content Filter, IPS, GAV, etc.) and configuring user authentication
CFS:
- Using custom Content Filter policies to block Internet access to a specific group (CFS + ULA + local groups)
- Integration of LDAP and multiple/Custom CFS policies for different user groups (ULA + CFS + LDAP)
- Using Multiple Custom content Filter policies with LDAP and SSO to restrict Internet access (CFS + LDAP + SSO)
- Upgrade from CFS 3.0 App Rules Mode to CFS 4.0
- Upgrade from CFS 3.0 Zones and Users Mode to CFS 4.0
- Content Filtering Service (CFS) 4.0 Overview - SonicOS 6.2.6 and above
GAV/IPS/ASW
Capture ATP
Application Firewall:
RBL
Geo-IP:
Configuring user authentication
- How to configure IAS RADIUS Authentication
- Integration of LDAP and multiple/Custom CFS policies for different user groups - ULA + CFS + LDAP
- Configuring Single Sign-On
Configuring High Availability
- How to Configure High Availability (HA)
- Stateful and Non-Stateful High Availability Prerequisites
- Tips for High Availability (HA) setup
Installing GMS/Analyzer
- How to Backup/restore the configuration and data from Analyzer (Windows)
- How do I install a fresh instance of Analyzer?
- How to install GMS/Analyzer Software on a Windows System
Original article: https://www.sonicwall.com/support/knowledge-base/popular-sonicwall-firewall-configurations/170503358114735/
Upgrade your firewall to the latest firmware
To keep your security appliance updated against known threats you need review and update your current software and firmware. This week SonicWall announced an update to fix a potential issue with SSLVPN.
Please read the attached link and download & apply firmware as detailed.
Supported SonicWall & 3rd Party SFP / SFP+ modules that can be used with SonicWall firewalls
SonicWall have just updated the list of support SFP and SFP+ modules that work with SonicWall firewalls - including the new Gen7.
SonicWall Product Comparison
Official SonicWall page for comparing the different model groups.
TZ Entry-Level Firewall Compare: https://www.sonicwall.com/tz-entry-level-firewall-series-products-compare-2/
Mid-Range Firewall Comparison: https://www.sonicwall.com/mid-range-products-compare/
‘3 & Free’ Promotion: How to Upgrade Your SonicWall Firewall for Free
What is the SonicWall ‘3 & Free’ Promotion?
The limited-time SonicWall ‘3 & Free’ promotion is the easy, cost-effective way for customers to upgrade to the very latest SonicWall next-generation firewall appliance for free.
Through Oct. 31, 2020, eligible customers may receive a complimentary NSa 2650, TZ350 or SOHO 250 appliance by purchasing a bundle that includes a three-year subscription of the SonicWall Advanced Gateway Security Suite from their authorized SonicWall SecureFirst partner.
This security suite includes everything you need to stay protected against today’s modern attacks, including advanced malware, ransomware, encrypted threats, viruses, spyware, zero-day exploits and more. This complete service includes:
- Capture Advanced Threat Protection (ATP) sandbox
- Gateway Anti-Virus and Anti-Spyware
- Intrusion Prevention Service
- Application Control
- Content Filtering Service
- 24×7 Support
SonicWall’s exclusive security subscription service also includes SonicWall Real-Time Deep Memory Inspection (RTDMI). A patent-pending technology, RTDMI™ enables Capture ATP to detect and block malware that does not exhibit any malicious behavior or hides weaponry via encryption. This protects your organization from zero-day attacks, malicious PDFs and Microsoft Office files.
How to configure SSL VPN on SonicWall
SSL VPN license ultimately allows users who are working or operating remotely to connect to internal networks and resources safely and securely through the SonicWall.
Setup of SSL VPN is through the software solutions; SonicWall SSL VPN client, NetExtender, and the SonicWall mobile connect client.
Configuring SSL VPN on the 7.X SonicOS
For the address ranges within SSL VPN IP v4, you first need to create your address object.
An administrator will need to log in to your UI firewall management and choose object from the menu.
Look for match objects and addresses, and then click add.
A second window will appear where you can then include the identified range for SSL VPN.
You then need to configure the SSL VPN by navigating to within the server settings to network SSL VPN and opting for SSL VPN status on zones.
From here, you can change SSL VPN access by switching to enable or disable (note, green indicates an active status).
Within the SSL VPN server settings, you then have the option to select domain and SSL VPN port.
(Note: the port option will be required if you connect using the NetExtender and mobile connect methods. The domain will be necessary for the user to gain access to the networks and log in.)
From the client settings – SSL VPN Network, choose default device profile and set the SSL VPN for zone IP v4 and set the address object generated previously as the Network address IP v4.
The tab across the top of the window labelled client routes allows you to manage what levels of network access remote users can be permitted via their connection.
The last tab, client settings, allows administrators to input suffix, WINS, and DNS information and control the caching passwords, behaviour of NetExtender clients, and usernames.
Change create client connection profile to enable and save all changes.
Adding additional SSL VPN users
NetExtender users can authenticate SonicWall for local users, or if they’re listed within a known group, this can be done through LDAP.
To add local users, you need to be within local users and groups, which can be found within devices and users. You can now add new users by simply clicking add.
Moving to the tab labelled groups, click SSL VPN services, and move this across to member of, section.
Moving across to VPN access, you can now add all relevant areas that the user will need access to.
Again, make sure to click save before closing the window.
For the zones of SSL VPN, it’s important to check access rule information.
To do this you need to access, access rules by following policy – rules and policies, then choose SSL VPN – LAN rules. If a user requires access to other zones to obtain resources, this can all be managed in this area by verifying and adding additional access rules as you go.
Configuring SSL VPN for the 6.5 SonicOS
Similar to the SonicOS 7.x, administrators will need to log in to the management platform of SonicWall and within the navigation menu choose manage and then address objects.
From here, click add.
A second window will appear where you now have the option to add your range for SSL VPN.
To configure these settings, click on SSL VPN on the settings page and go to WAN, changing it from red to green to show it is now active.
Now all SSL VPN configurations will be enabled in this particular zone.
You can then set the domain and ports for SSL VPN as you require.
Move across to client settings where, as administrator, you can configure the range of client addresses and NetExtender settings.
For the default device profile, click on configure.
Here you can set the network address v4 IP as your address object from before and set the zone v4 IP as SSL VPN.
The tab labelled client routes will allow administrators to manage the level of access users have to two networks.
It’s essential to set the VPN appropriately as all users will be able to see the routes but may not necessarily be authorised to access all network resources.
In the settings, administrators should also enter all required DNS and WINS data and create client profile connections by enabling this action.
Adding additional users
To add new users, click on users and local users and groups. Within groups, click add SSL VPN services to move the field to member of.
Moving to VPN access, you can then add all the relevant IP addresses and objects identified to the users requirements, in terms of access via NetExtender.
Note: Client routes and VPN access must match for users to have authority to access network resources.
Remember to click save, to save all changes before closing.
SSL VPN zones access rule details
Within access rules, you can access SSL VPN LAN rules with drop-lists available.
Access rules allow access to intended end devices through SSL VPN IPs which are also required for the firewalls to understand that such traffic is allowed through.
You can also test all connections and configurations by installing the SonicWall NetExtender.
Two final points to note:
Remember, within the user’s section of the menu toolbar, you must add in however many users that will have login credentials. Each user then must become a member of SSL VPN services group and have to subnet added to VPN access within the allow list.
In-network interfaces make sure to click on configure on the WAN interface and tick the HTTPS box beside the user login – this helps to minimise login failed attempts occurring when users access SSL VPN via a web portal.
For further information on a SonicWall VPN licence and more call 0330 1340 230, today.
Read the next article: Best Practices for SSL VPNs
Setting up SSL VPN
SonicWall's security appliance features SSL VPN, providing secure remote access to networks using the NetExtender client.
Below, we outline the steps required to help configure the SonicWall SSL VPN setup, allowing you to run applications securely across your company's network.

Accessing NetExtender
Remote users will use NetExtender to access your networks and anything contained within these, i.e., documents, shared files, etc.
Typically users access NetExtender either by clicking on the NetExtender button found when logging in to the virtual office web portal or by launching the NetExtender as a standalone client (once installed, it will remain as a shortcut or within the Start menu making it easy to access after that).
How to setup SSL VPN for SonicOS 7.X
When setting up SonicWall SSL VPN on the latest 7.X firmware, the following instructions should help.
1. With the server settings, look for SSL VPN, Network.
2. Choose SSL VPN status on zones
3. You can choose whether you want and need to disable or enable access to SSL VPN (moving it to a green status means it is active).
4. You then need to move to the server SSL VPN settings. Here choose the port SSL VPN and the desired domain and configure within client settings SSL VPN, Network.
5. With the client settings, SSL VPN, you're able to configure the NetExtender client settings and the client address range information, i.e., which IP's you will provide for those connecting clients and where users can log in from.
6. For the default profile of the device, click on configure.
7. Change the Network IP v4 Address to the address range you inputted in point 5 and set the Zone IP V4 as SSL VPN.
8. Within client routes, you can now control network access for all users, deciding on what can and can't be accessed across the network.
9. The last tab, client settings, is where you can input Suffix, WINS, and DNS information, all while managing usernames, caching passwords, etc.
10. You must enable the create client profile connection for the NetExtender to make a connection and record the server name for the SSL VPN and domain name too.
11. To configure the SSL VPN virtual office's functionality and appearance, you need to use the SSL VPN portal settings page.
12. All SSL VPN users must be part of a user group or SSL VPN services member. To check this and change as appropriate within; device - users – local users and groups.
13. Moving across to VPN access at the top of the screen, you can choose one or more networks from the list, clicking the arrow button to move them directly across to the access list. If you need to change or remove a user's access rights, select the network from the access list and click on the arrow pointing left.
14. Finally, within policy, rules and access rules, set the SSL VPN to LAN rules. And if a user requires access to other zones, you can add and verify these via the access rules page.
SSL VPN setup for SonicOS 6.5
1. Select the SonicWall application and click on manage – SSL VPN settings.
2. To configure these client settings, you need to be on the SSL VPN client settings page where you can input the address range for the client, NetExtender information, and where the users will be able to log in.
3. Within the settings tab, make sure to select both network address IP V4 and Zone IP.
4. To allow the right level of access for users, administrators will need to set this within SSL VPN – client routes page.
5. To configure client settings for the NetExtender, the create client profile connection must be enabled.
6. For the virtual office portal's appearance and functionality, these elements must be configured within SSL VPN – portal settings.
7. Administrators will need to manage users and groups of users through users – local users and moving each member to the appropriate services group. When configuring local users, navigate to manage and system setup – local users and groups, you can then add SSL VPN services. To set local and LDAP user groups, you must edit SSL
VPN services and add the specified user group within the member's tab.
8. Within VPN access, you will see what users can access what networks. You can also add more networks to the access list as required. Of course, these can also be removed by carrying out the same procedure in reverse..
9. Note the new SSL VPN areas within firewall – access rules.
10. SSL VPN zones will auto-create firewall access rules; however, these can be modified, allowing access to only those users that have been configured.
11. Administrators should follow manage – network – interfaces, and within the WAN interface, administrators must ensure HTTPS is enabled.
Both of these SonicWall SSL VPN setup procedures can be tested via users through the SonicWall's public IP – always recommended.
Protecting your business during a global crisis
COVID19 has had a dramatic effect on the world. With companies changing the way they operate and work and teams are looking at different ways to communicate and access information.
A business’s focus during this time is on how they will continue to operate. And in all instances, people ultimately need access to the tools and information to help them get the job done.

To help keep businesses running and operating as smoothly as possible, we take a look at some of the best practices for businesses and why they're so important when protecting the business from a global health crisis.
A firewall approach to a global health crisis
During the Coronavirus pandemic, each country has taken its own approach to protect its people.
Countries like Japan have almost used the technological concept of firewalls and built their own manmade firewall around their cities. They were restricting travel, placing quarantine restrictions on areas, and limiting the volume of people coming in and out of the country.
Japan's focus was to create a firewall that blocked the Coronavirus's inflow, just like a firewall blocks malware accessing its networks and spreading.
However, as Japan found out, firewalls have to be robust, with no room for error or indeed holes in the system.
So, what can businesses of all shapes and sizes do to protect their online networks further?
Protecting business during the global crisis
1. Make sure you have a robust business continuity plan
Your business continuity plan is not just a nice to have; it's a must-have. It should be a plan covering everything from adverse weather conditions to cyber-attacks, global pandemics, and more! It's advisable that these plans are checked and played out (to some extent) annually and should account for all business areas, including infrastructure, technology, communication, etc.
2. Securely expand remote working
Remote working is not a new concept; however, having your entire workforce working remotely is unique! The problem that most businesses have come across when expanding their remote working capabilities is that they don't have enough VPN (a virtual private network) licences to accommodate everyone.
This can be a risky place to be in, not only because your employees no longer have access to information and applications needed to do their jobs, but you also run the risk of employees trying to access networks via non-secure connections.
The solution?
Businesses need to look at scalable, secure remote access solutions that can easily cope with an increase in users should the need ever arise.
3. Watch out for fear-based cyber attacks
Fear-based cyber campaigns are common among cybercriminals, and organisations must ensure that they have high or increased email security levels in place to help mitigate these cyber fear attacks.
Office 365 security, cloud application security, and endpoint protection solutions should all be implemented to prevent phishing attacks compromising networks.
4. Look after your endpoints
With more people working remotely, businesses must look at proactive endpoint protection that prevents attacks before, during, and after their execution.
Why cybersecurity matters now more than ever
We have an increased dependency on digital infrastructures. Today the internet and its many communication channels have become the only method (at times) for social/human interaction.
With more work from home policies coming into effect than ever before, workforces have been confined to social media posts, video calls, chat programmes, etc.
With this in mind, a cyberattack now, of any sort, on an organisation's network or across a family's devices would be devastating. Not only because of what the attack could cost you financially but because of what it can do to our mental well-being as all communication is lost.
Fear. As we've mentioned previously, cybercriminals are renowned for exploiting human weakness and thrive in the knowledge that people will, unfortunately, make more mistakes in times of global crisis. We need to be careful whom we trust with our data online.
For example, a recent cyber-attack occurred, which centred on a map that seemed to display Coronavirus statistics. However, Malware was concealed in this download, which then ran a malicious application on the computer and allowed hackers to access passwords and more.
Staying safe online
It's important to remember some best practice points when working from home or when looking at increasing your level of security online:
- Make sure you have a long, complex router password
- Check all firewalls are active on your router
- Don't reuse passwords across the internet
- Use only reliable VPN when accessing anything online
- Don't click links within emails that you're unsure of
- Be careful whom you give your details to
- Be sure to check the source of all URLs and ensure all apps and programmes you download are the original versions
- Update your system software and applications regularly.
Software for business protection
SonicWall-Sales firewalls help to provide the critical security business solutions that organisations need, now.
Also, providing remote connectivity, cloud application security, and endpoint protection, make sure to call the team to find out how SonicWall can help keep your business safe now and during a global crisis.
