• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Sonicwall training presentation
 

Sonicwall training presentation

on

  • 1,830 views

 

Statistics

Views

Total Views
1,830
Views on SlideShare
1,830
Embed Views
0

Actions

Likes
1
Downloads
167
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Sonicwall Provide a broad solution to network security.SMB - Small to mid-sized businesses Network security and wireless appliance -powerful and massively scalable multi-core architecture to deliver intrusion prevention, gateway anti- virus, gateway anti-spyware, and Application Intelligence and Control for businesses of all sizes.  -allows you to deploy seamless and secure 802.11 a/b/g/n wireless networks, protected by SonicWALL Clean Wireless™ technology and SonicWALL Application Intelligence and ControlEmail Security Appliances and Software -protection for inbound and outbound emailSecure Remote Access Appliances -solutions deliver a complete remote access control solution, without escalating infrastructure costs or complexityBackup and Recovery Appliance -CDP-Continuous Data Protection -solution that automatically preserves and protects business-relevant data assets against loss from file, device, and location based disasters. With support for Windows®, Linux® and Mac OS® through a single Web GUI, CDP provides granular, globally enforced policy controls over the entire backup operatio
  • All Sonicwall Appliances has 3 main a standard port namely: Console, X0,X1 Console – we all know what the console is for; for hard code configuration of the appliance X0 is a standard port for LAN X1 is a standard port for WAN other ports remaining can be configured as LAN, WAN and DMZ depending of what is the needed configuration for the network. Reset Button- use paper clip Resetting the sonicwall 1. press and hold the reset button 2. wait until the led light with a wrench icon blinks three time 3. depress the button
  • By default: Out of the box sonicwall has an IP address of 192.168.168.168 you can change the IP of the appliance subnet with your network.Network setup
  • Use a browser to access sonicwall(any browser) use the default IP address
  • Status page: this is where you can see the basic information about the sonicwall
  • How to register the appliance and how to input the activation key
  • On the status page; you can verify if the sonicwall is already registered or license is expired
  • In registering the product go to mysonicwall.com create an account on mysonicwall note: create an account for the end user. after creating the account go to home > register product enter the needed information click submit wait for confirmation
  • After the confirmation go to home you will see the product that is registered now this is for the activation code note: please see to it that the code you are entering is for the appliance intended for the key click the registered appliance
  • You will be prompted to the service management see the basic information of the registered appliance go to applicable services find the service intended for the key click the action Icon
  • Sonicwall engine SPI- Stateful packet inspection GAV – Gateway Anti-Virus IPS – Intrusion Prevention System AS – Anti-SpywareEach of these has its own work on the sonicwall appliance to ensure a tight network securitySonicwall has its own signature datebaseScans unlimited file size
  • On SPI- Stateful packet inspection this is only limited to blocking of ports it inspects only the header of the packet data is excluded
  • After the inspection of the packet header, intrusion prevention is nextThis inspects all traffic moving through the device.It inspects the data if it has a virus or spyware by comparing it to its signature database
  • After a thorough inspection, anti virus will now clean up or drop down the data with vulnerabilities
  • The IPS found a spyware an anti spyware is ready to drop down the data
  • If you can see yellow marks on you service logs, don’t worryIt doesn’t mean that your network is infected but rather its just somewhat an alert that the firewall has detected a virus or spyware wanting to penetrate your network
  • Note: even though you see all the services are licensed, it doesn’t mean that your UTM will work already. you need to enable these services to be usable.

Sonicwall training presentation Sonicwall training presentation Presentation Transcript

  • SONICWALL
    MEC NETWORKS CORPORATION
    TRAINING
    Edward Niels Gulane
    Technical Engineer
    MEC Networks Corporation
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ProductOverview
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    SonicWALL Broad Solution
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    SonicWALL Firewalls
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Small Business: TZ Series
    TZ 150
    • Supports Maximum 10 Nodes
    • 30+ Mbps Stateful Throughput
    • 5 Mbps Deep Packet Inspection Throughput
    • 10+ Mbps VPN Throughput
    • 2,000 Concurrent Connections
    • SonicOS Standard
    TZ 180
    • Supports 10 and 25 Nodes
    • 90+ Mbps Stateful Throughput
    • 10 Mbps Deep Packet Inspection Throughput
    • 30+ Mbps VPN Throughput
    • 6,000 Concurrent Connections
    • SonicOS Standard, Upgradeable
    TZ 190
    Supports Unrestricted Nodes
    • 90+ Mbps Stateful Throughput
    • 10 Mbps Deep Packet Inspection Throughput
    • 30+ Mbps VPN Throughput
    • 6,000 Concurrent Connections
    • SonicOS Enhanced
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Small Business: New TZ Series
    TZ 100 Wireless
    E-Class 5500
    • 100 - 200 Mbps Stateful Throughput
    • 25 -50 Mbps UTM Throughput
    • 6000 – 8000 Maximum Connections
    • 1000 - 1500 New Connections/Sec
    • 75 Mbps VPN Throughput
    • 5 - 15 Site-to-Site VPN Tunnels
    TZ 100
    TZ 200 Wireless
    TZ 200
    TZ 210 Wireless
    TZ 210
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Mid-Business: NSA Series
    NSA 2400
    • 775 Mbps Stateful Throughput
    • 235 Mbps UTM Throughput
    • 48,000 Maximum Connections
    • 4,000 New Connections/Sec
    • 300 Mbps VPN Throughput
    • 75 Site-to-Site VPN Tunnels
    NSA 3500
    • 1.5 GbpsStateful Throughput
    • 580 Mbps UTM Throughput
    • 128,000 Maximum Connections
    • 7,000 New Connections/Sec
    • 625 Mbps VPN Throughput
    • 800 Site-to-Site VPN Tunnels
    NSA 240
    • 600 Mbps Stateful Throughput
    • 110 Mbps UTM Throughput
    • 25,000 / 50,000* Maximum Connections
    • 2,000 New Connections/Sec
    • 150 Mbps VPN Throughput
    • 25/50* Site-to-Site VPN Tunnels
    NSA 5000
    • 3.5 GbpsStateful Throughput
    • 800 Mbps UTM Throughput
    • 600,000 Maximum Connections
    • 12,000 New Connections/Sec
    • 1.5 Gbps VPN Throughput
    • 2,500 Site-to-Site VPN Tunnels
    NSA 4500
    • 2.75 GbpsStateful Throughput
    • 600 Mbps UTM Throughput
    • 450,000 Maximum Connections
    • 10,000 New Connections/Sec
    • 1.0 Gbps VPN Throughput
    • 1,500 Site-to-Site VPN Tunnels
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Enterprise Business: NSA E-Class Series
    E-Class 6500
    • For Enterprise-class Deployments
    • 3 GbpsStateful Throughput
    • 750 Mbps UTM Performance Throughput
    • 750,000 Maximum Connections
    • 19,000 New Connections/Sec
    • 2.5 Gbps VPN Throughput
    • 6,000 Site-to-Site VPN Tunnels
    E-Class 7500
    • For Enterprise-class Deployments
    • 5.5 GbpsStateful Throughput
    • 1 Gbps UTM Performance Throughput
    • 1,000,000 Maximum Connections
    • 25,000 New Connections/Sec
    • 4 Gbps VPN Throughput
    • 10,000 Site-to-Site VPN Tunnels
    E-Class 5500
    • For Enterprise-class Deployments
    • 2 GbpsStateful Throughput
    • 400 Mbps UTM Performance Throughput
    • 700,000 Maximum Connections
    • 10,000 New Connections/Sec
    • 1.5 Gbps VPN Throughput
    • 4,000 Site-to-Site VPN Tunnels
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Continuous Data Protection Series
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    SSL VPN Secure Remote AccessSeries
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    NetworkSetup
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    TZ 100 Interface
    Reset Button
    X1 : WAN
    Console
    Power
    X2-X4 : INTERFACES
    X0 : LAN
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    INTERNET
    WAN
    modem
    TZ 100 SonicWALL Firewall
    Default IP
    192.168.168.168
    LAN
    IP Address: 192.168.168.2
    Subnet Mask: 255.255.255.0
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    LOG-IN PAGE
    Username: admin
    Password: password
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    STATUS PAGE
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Hands - on
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Register & Activate
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    REGISTRATION AND LICENSE ACTIVATION
    Go to:
    System > Status
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    REGISTRATION AND LICENSE ACTIVATION
    Go to: www.mysonicwall.com
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    REGISTRATION AND LICENSE ACTIVATION
    Go to Home
    Click the registered appliance
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    REGISTRATION AND LICENSE ACTIVATION
    Click this icon
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    REGISTRATION AND LICENSE ACTIVATION
    Enter here
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    REGISTRATION AND LICENSE ACTIVATION
    Confirmation message will appear after clicking submit. Verify the License Expiration Date must change.
    • Synchronize the License in Sonic WALL Appliace:
    • Manage your Sonic WALL Appliance
    • Go to System>Licenses
    • In Manage Security Services Online
    • Click Synchronize then confirm the Expiration Date
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Hands - on
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    SonicWALLFeatures
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    What is SonicWALL?
    • Firewall (UTM)
    Gateway Anti-virus
    Anti-Spyware
    Anti-Spam
    Website/Content Filtering
    Intrusion Prevention/Detection
    Email Filtering
    Zero Day Protection
    • Router
    • VPN Server (IP-Sec and SSL-VPN Remote Access)
    • ISP Load Balancer/Failover
    • Bandwidth Manager
    • IP and MAC Address Binding
    • Enforced Client Anti-virus (MacAfee)
    • Built-in DHCP Server
    • Network Monitoring and Reporting Tool - Viewpoint
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    SonicWALL Engine
    SPI
    DPI
    GAV
    SonicWALL Engine
    IPS
    AS
    • Signature Based
    • Scans on the Fly (unlimited file size)
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    INSPECT
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    IP Options
    SourceUDP Port
    Destination
    UDP Port
    UDP
    Length
    UDP
    Checksum
    DATA
    Stateful Packet Inspection (SPI)
    Source
    212.56.32.49
    Destination
    65.26.42.17
    Stateful is limited inspection that can only block on ports
    No Data Inspection!
    Source Port
    823747
    Dest Port
    80
    Sequence
    2821
    Sequence
    28474
    IP Option
    none
    Syn state
    SYN
    Stateful
    PacketInspection
    Firewall Traffic Path
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    INSPECT
    INSPECT
    Signature Database
    ATTACK-RESPONSES 14BACKDOOR 58BAD-TRAFFIC 15DDOS 33DNS 19DOS 18EXPLOIT >35FINGER 13FTP 50ICMP 115Instant Messenger 25IMAP 16INFO 7Miscellaneous44MS-SQL 24MS-SQL/SMB 19MULTIMEDIA 6MYSQL 2NETBIOS 25NNTP 2ORACLE 25P2P 51POLICY 21POP2 4POP3 18RPC 124RSERVICES 13SCAN 25SMTP 23SNMP 17TELNET 14TFTP 9VIRUS 3WEB-ATTACKS 47WEB-CGI 312WEB-CLIENT
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    IP Options
    SourceUDP Port
    Destination
    UDP Port
    UDP
    Length
    UDP
    Checksum
    DATA
    Intrusion Prevention System (IPS)
    IPS inspects all traffic moving through a device
    IPS
    Stateful
    PacketInspection
    Firewall Traffic Path
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    V
    I
    R
    U
    S
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    DATA
    DATA
    DATA
    DATA
    DATA
    DATA
    Gateway Anti-Virus
    Signature Database
    Comparing…
    ATTACK-RESPONSES 14BACKDOOR 58BAD-TRAFFIC 15DDOS 33DNS 19DOS 18EXPLOIT >35FINGER 13FTP 50ICMP 115Instant Messenger 25IMAP 16INFO 7Miscellaneous44MS-SQL 24MS-SQL/SMB 19MULTIMEDIA 6MYSQL 2NETBIOS 25NNTP 2ORACLE 25P2P 51POLICY 21POP2 4POP3 18RPC 124RSERVICES 13SCAN 25SMTP 23SNMP 17TELNET 14TFTP 9VIRUS 3WEB-ATTACKS 47WEB-CGI 312WEB-CLIENT
    V
    I
    R
    U
    S
    Application Attack, Worm or Trojan Found!
    Deep Packet Inspection with Intrusion Prevention can find and block, application vulnerabilities, worms or Trojans.
    Stateful
    PacketInspection
    IPS
    Anti-Virus
    Firewall Traffic Path
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    S
    P
    Y
    W
    A
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    Version | Service | Total Length
    ID | Flags | Fragment
    TTL | Protocol | IP Checksum
    Source IP Address
    Destination IP Address
    DATA
    DATA
    DATA
    DATA
    DATA
    DATA
    Anti-Spyware
    Signature Database
    Comparing…
    ATTACK-RESPONSES 14BACKDOOR 58BAD-TRAFFIC 15DDOS 33DNS 19DOS 18EXPLOIT >35FINGER 13FTP 50ICMP 115Instant Messenger 25IMAP 16INFO 7Miscellaneous44MS-SQL 24MS-SQL/SMB 19MULTIMEDIA 6MYSQL 2NETBIOS 25NNTP 2ORACLE 25P2P 51POLICY 21POP2 4POP3 18RPC 124RSERVICES 13SCAN 25SMTP 23SNMP 17TELNET 14TFTP 9VIRUS 3WEB-ATTACKS 47WEB-CGI 312WEB-CLIENT
    Spyware Found and Blocked
    Deep Packet Inspection with Intrusion Prevention can find and block, application vulnerabilities, worms or Trojans.
    Anti-Spyware
    Stateful
    PacketInspection
    IPS
    Anti-Virus
    Firewall Traffic Path
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Service Services Log Alerts
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Gateway Anti-Virus: Yahoo IM Virus
    • An instant messenger virus is introduced internally
    • Infects the other zones on network
    • GAV enabled on the zones
    • Gateway scans, stops and discards virus
    • A log VIRUS ALERT is sent to the admin
    Log Alert!
    V
    V
    V
    V
    VIRUS
    VIRUS
    VIRUS
    VIRUS
    Sales
    Technical
    Accounting
    Web Servers
    Email
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Intrusion Prevention and Prevention Scenario
    • Exploits port 80
    • Infects Web Servers and proliferates
    • DPI has signature to block
    • A worm alert sent to the admin
    Log Alert!
    V
    V
    V
    virus
    virus
    virus
    Zone #1
    Zone #2
    Zone #3
    Web Servers
    Email
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Anti-Spyware Security Scenario
    • User surfs the web
    • Unknowingly downloads spyware
    • Spyware communicates back to server
    • AS enabled, prevents outbound communication to server
    • A log Spyware is sent to the admin
    • Note: PC is still infected with Spyware.
    Http Request
    Log Alert!
    Sales
    Technical
    Accounting
    Web Servers
    Email
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    SonicWALL Deep Packet Inspection
    • Zone based security
    • Protects internally
    • Gateway Anti-Virus
    • Scans through unlimited files sizes
    • Scans through unlimited connections
    • Scans over more protocols than any similar solution
    • Anti-Spyware for protection against malicious programs
    • Blocks the installation of spyware
    • Blocks Spyware that is emailed and sent internally
    • Applications Layer Threat Protection:
    • Full protection from Trojan, worm, blended and polymorphic threats
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Complete UTM Security Scenario
    V
    V
    VIRUS
    NIMDA
    Sales
    Accounting
    Technical
    Web Servers
    Email
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ACTIVATINGUTM
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ENABLING UTM
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ENABLING UTM
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ENABLING UTM (SETTINGS FOR GATEWAY ANTI-VIRUS)
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ENABLING UTM (SETTINGS FOR INTRUSION PREVENTION)
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ENABLING UTM (SETTINGS FOR ANTI-SPYWARE)
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Hands - on
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ZERO DAYPROTECTION
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Zero Day Protection: How?
    New virus created and proliferates
    SonicWALL team identifies and creates signature for virus
    SonicWall forces signature update of all appliances
    Network protected
    1
    LAN
    4
    3
    2
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    CONTENTFILTERING
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Users
    SALES Department
    TECHNICAL Department
    CONTENT FILTERING
    www.friendster.com
    www.sex.com
    friends
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    CONTENT FILTERING: HOW?
    CFS Disabled
    Complies with policy
    Does not comply with policy
    CFS Cache on the appliance
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    CONTENT FILTERING : CONFIGURATION
    50
    SonicWALL CONFIDENTIAL All Rights Reserved
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Hands - on
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    LOAD BALANCING /
    FAILOVER
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ISP LOAD BALANCING / FAILOVER
    PLDT
    BAYANTEL
    • Failover to a secondary ISP should primary ISP fail
    • When the Primary ISP turns back, traffic will direct to Primary ISP
    WAN 1
    WAN 2
    www. facebook.com
    Technical
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ISP LOAD BALANCING / FAILOVER
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ISP LOAD BALANCING / FAILOVER
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ISP LOAD BALANCING / FAILOVER
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    ISP LOAD BALANCING / FAILOVER
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    DHCPSERVER
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    DHCP SERVER: CONFIGURATION
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    DHCP SERVER: CONFIGURATION
    NOTE:
    the number of IP address you can
    set on the DHCP server will depend on
    the appliance model
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    DHCP SERVER: CONFIGURATION
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Hands - on
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    NETWORKMONITORING
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    NETWORK MONITORING
    Deep Intelligence
    Network Visibility 
    Threat Information
    Top VPN Users
    Application Usage
    Bandwidth
    Misuse
    Bandwidth
    Intelligence
    VPN Reporting
    Employee Net Usage
    Pro-Active Alerting
    UTM Appliance
    IT Actionable Info
    Alert Your Staff
    No Intelligence
    HTTP
    FTP
    IM/P2P
    Mail
    VPN
    Threats
    Protocols
    Attacks
    Potential Threats
    End User Activities
    Network Traffic
    SonicWALL UTM & ViewPoint Delivers Deeper Business Intelligence
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    DHCP SERVER: CONFIGURATION
    SONICWALL
    MEC NETWORKS CORPORATION
  • SONICWALL
    MEC NETWORKS CORPORATION
    Questions
    SONICWALL
    MEC NETWORKS CORPORATION