Sonicwall training presentation

5,094 views

Published on

Published in: Technology
1 Comment
6 Likes
Statistics
Notes
No Downloads
Views
Total views
5,094
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
480
Comments
1
Likes
6
Embeds 0
No embeds

No notes for slide
  • Sonicwall Provide a broad solution to network security.SMB - Small to mid-sized businesses Network security and wireless appliance -powerful and massively scalable multi-core architecture to deliver intrusion prevention, gateway anti- virus, gateway anti-spyware, and Application Intelligence and Control for businesses of all sizes.  -allows you to deploy seamless and secure 802.11 a/b/g/n wireless networks, protected by SonicWALL Clean Wireless™ technology and SonicWALL Application Intelligence and ControlEmail Security Appliances and Software -protection for inbound and outbound emailSecure Remote Access Appliances -solutions deliver a complete remote access control solution, without escalating infrastructure costs or complexityBackup and Recovery Appliance -CDP-Continuous Data Protection -solution that automatically preserves and protects business-relevant data assets against loss from file, device, and location based disasters. With support for Windows®, Linux® and Mac OS® through a single Web GUI, CDP provides granular, globally enforced policy controls over the entire backup operatio
  • All Sonicwall Appliances has 3 main a standard port namely: Console, X0,X1 Console – we all know what the console is for; for hard code configuration of the appliance X0 is a standard port for LAN X1 is a standard port for WAN other ports remaining can be configured as LAN, WAN and DMZ depending of what is the needed configuration for the network. Reset Button- use paper clip Resetting the sonicwall 1. press and hold the reset button 2. wait until the led light with a wrench icon blinks three time 3. depress the button
  • By default: Out of the box sonicwall has an IP address of 192.168.168.168 you can change the IP of the appliance subnet with your network.Network setup
  • Use a browser to access sonicwall(any browser) use the default IP address
  • Status page: this is where you can see the basic information about the sonicwall
  • How to register the appliance and how to input the activation key
  • On the status page; you can verify if the sonicwall is already registered or license is expired
  • In registering the product go to mysonicwall.com create an account on mysonicwall note: create an account for the end user. after creating the account go to home > register product enter the needed information click submit wait for confirmation
  • After the confirmation go to home you will see the product that is registered now this is for the activation code note: please see to it that the code you are entering is for the appliance intended for the key click the registered appliance
  • You will be prompted to the service management see the basic information of the registered appliance go to applicable services find the service intended for the key click the action Icon
  • Sonicwall engine SPI- Stateful packet inspection GAV – Gateway Anti-Virus IPS – Intrusion Prevention System AS – Anti-SpywareEach of these has its own work on the sonicwall appliance to ensure a tight network securitySonicwall has its own signature datebaseScans unlimited file size
  • On SPI- Stateful packet inspection this is only limited to blocking of ports it inspects only the header of the packet data is excluded
  • After the inspection of the packet header, intrusion prevention is nextThis inspects all traffic moving through the device.It inspects the data if it has a virus or spyware by comparing it to its signature database
  • After a thorough inspection, anti virus will now clean up or drop down the data with vulnerabilities
  • The IPS found a spyware an anti spyware is ready to drop down the data
  • If you can see yellow marks on you service logs, don’t worryIt doesn’t mean that your network is infected but rather its just somewhat an alert that the firewall has detected a virus or spyware wanting to penetrate your network
  • Note: even though you see all the services are licensed, it doesn’t mean that your UTM will work already. you need to enable these services to be usable.
  • Sonicwall training presentation

    1. 1. SONICWALL<br />MEC NETWORKS CORPORATION<br />TRAINING<br />Edward Niels Gulane<br />Technical Engineer<br />MEC Networks Corporation<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    2. 2. SONICWALL<br />MEC NETWORKS CORPORATION<br />ProductOverview<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    3. 3. SONICWALL<br />MEC NETWORKS CORPORATION<br />SonicWALL Broad Solution<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    4. 4. SONICWALL<br />MEC NETWORKS CORPORATION<br />SonicWALL Firewalls<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    5. 5. SONICWALL<br />MEC NETWORKS CORPORATION<br />Small Business: TZ Series<br />TZ 150<br /><ul><li>Supports Maximum 10 Nodes
    6. 6. 30+ Mbps Stateful Throughput
    7. 7. 5 Mbps Deep Packet Inspection Throughput
    8. 8. 10+ Mbps VPN Throughput
    9. 9. 2,000 Concurrent Connections
    10. 10. SonicOS Standard </li></ul>TZ 180<br /><ul><li>Supports 10 and 25 Nodes
    11. 11. 90+ Mbps Stateful Throughput
    12. 12. 10 Mbps Deep Packet Inspection Throughput
    13. 13. 30+ Mbps VPN Throughput
    14. 14. 6,000 Concurrent Connections
    15. 15. SonicOS Standard, Upgradeable </li></ul>TZ 190<br />Supports Unrestricted Nodes <br /><ul><li>90+ Mbps Stateful Throughput
    16. 16. 10 Mbps Deep Packet Inspection Throughput
    17. 17. 30+ Mbps VPN Throughput
    18. 18. 6,000 Concurrent Connections
    19. 19. SonicOS Enhanced </li></ul>SONICWALL<br />MEC NETWORKS CORPORATION<br />
    20. 20. SONICWALL<br />MEC NETWORKS CORPORATION<br />Small Business: New TZ Series<br />TZ 100 Wireless<br />E-Class 5500<br /><ul><li>100 - 200 Mbps Stateful Throughput
    21. 21. 25 -50 Mbps UTM Throughput
    22. 22. 6000 – 8000 Maximum Connections
    23. 23. 1000 - 1500 New Connections/Sec
    24. 24. 75 Mbps VPN Throughput
    25. 25. 5 - 15 Site-to-Site VPN Tunnels </li></ul>TZ 100<br />TZ 200 Wireless<br />TZ 200<br />TZ 210 Wireless<br />TZ 210<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    26. 26. SONICWALL<br />MEC NETWORKS CORPORATION<br />Mid-Business: NSA Series <br />NSA 2400<br /><ul><li>775 Mbps Stateful Throughput
    27. 27. 235 Mbps UTM Throughput
    28. 28. 48,000 Maximum Connections
    29. 29. 4,000 New Connections/Sec
    30. 30. 300 Mbps VPN Throughput
    31. 31. 75 Site-to-Site VPN Tunnels </li></ul>NSA 3500<br /><ul><li>1.5 GbpsStateful Throughput
    32. 32. 580 Mbps UTM Throughput
    33. 33. 128,000 Maximum Connections
    34. 34. 7,000 New Connections/Sec
    35. 35. 625 Mbps VPN Throughput
    36. 36. 800 Site-to-Site VPN Tunnels </li></ul>NSA 240<br /><ul><li>600 Mbps Stateful Throughput
    37. 37. 110 Mbps UTM Throughput
    38. 38. 25,000 / 50,000* Maximum Connections
    39. 39. 2,000 New Connections/Sec
    40. 40. 150 Mbps VPN Throughput
    41. 41. 25/50* Site-to-Site VPN Tunnels </li></ul>NSA 5000<br /><ul><li>3.5 GbpsStateful Throughput
    42. 42. 800 Mbps UTM Throughput
    43. 43. 600,000 Maximum Connections
    44. 44. 12,000 New Connections/Sec
    45. 45. 1.5 Gbps VPN Throughput
    46. 46. 2,500 Site-to-Site VPN Tunnels </li></ul>NSA 4500<br /><ul><li>2.75 GbpsStateful Throughput
    47. 47. 600 Mbps UTM Throughput
    48. 48. 450,000 Maximum Connections
    49. 49. 10,000 New Connections/Sec
    50. 50. 1.0 Gbps VPN Throughput
    51. 51. 1,500 Site-to-Site VPN Tunnels </li></ul>SONICWALL<br />MEC NETWORKS CORPORATION<br />
    52. 52. SONICWALL<br />MEC NETWORKS CORPORATION<br />Enterprise Business: NSA E-Class Series<br />E-Class 6500<br /><ul><li>For Enterprise-class Deployments
    53. 53. 3 GbpsStateful Throughput
    54. 54. 750 Mbps UTM Performance Throughput
    55. 55. 750,000 Maximum Connections
    56. 56. 19,000 New Connections/Sec
    57. 57. 2.5 Gbps VPN Throughput
    58. 58. 6,000 Site-to-Site VPN Tunnels </li></ul>E-Class 7500<br /><ul><li>For Enterprise-class Deployments
    59. 59. 5.5 GbpsStateful Throughput
    60. 60. 1 Gbps UTM Performance Throughput
    61. 61. 1,000,000 Maximum Connections
    62. 62. 25,000 New Connections/Sec
    63. 63. 4 Gbps VPN Throughput
    64. 64. 10,000 Site-to-Site VPN Tunnels </li></ul>E-Class 5500<br /><ul><li>For Enterprise-class Deployments
    65. 65. 2 GbpsStateful Throughput
    66. 66. 400 Mbps UTM Performance Throughput
    67. 67. 700,000 Maximum Connections
    68. 68. 10,000 New Connections/Sec
    69. 69. 1.5 Gbps VPN Throughput
    70. 70. 4,000 Site-to-Site VPN Tunnels </li></ul>SONICWALL<br />MEC NETWORKS CORPORATION<br />
    71. 71. SONICWALL<br />MEC NETWORKS CORPORATION<br />Continuous Data Protection Series<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    72. 72. SONICWALL<br />MEC NETWORKS CORPORATION<br />SSL VPN Secure Remote AccessSeries<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    73. 73. SONICWALL<br />MEC NETWORKS CORPORATION<br />NetworkSetup<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    74. 74. SONICWALL<br />MEC NETWORKS CORPORATION<br />TZ 100 Interface<br />Reset Button<br />X1 : WAN<br />Console<br />Power <br />X2-X4 : INTERFACES<br />X0 : LAN<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    75. 75. SONICWALL<br />MEC NETWORKS CORPORATION<br />INTERNET<br />WAN<br />modem<br />TZ 100 SonicWALL Firewall<br />Default IP<br /> 192.168.168.168<br />LAN<br />IP Address: 192.168.168.2<br />Subnet Mask: 255.255.255.0<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    76. 76. SONICWALL<br />MEC NETWORKS CORPORATION<br />LOG-IN PAGE<br />Username: admin<br />Password: password<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    77. 77. SONICWALL<br />MEC NETWORKS CORPORATION<br />STATUS PAGE<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    78. 78. SONICWALL<br />MEC NETWORKS CORPORATION<br />Hands - on<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    79. 79. SONICWALL<br />MEC NETWORKS CORPORATION<br />Register & Activate<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    80. 80. SONICWALL<br />MEC NETWORKS CORPORATION<br />REGISTRATION AND LICENSE ACTIVATION<br />Go to:<br />System > Status<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    81. 81. SONICWALL<br />MEC NETWORKS CORPORATION<br />REGISTRATION AND LICENSE ACTIVATION<br />Go to: www.mysonicwall.com<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    82. 82. SONICWALL<br />MEC NETWORKS CORPORATION<br />REGISTRATION AND LICENSE ACTIVATION<br />Go to Home<br />Click the registered appliance<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    83. 83. SONICWALL<br />MEC NETWORKS CORPORATION<br />REGISTRATION AND LICENSE ACTIVATION<br />Click this icon<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    84. 84. SONICWALL<br />MEC NETWORKS CORPORATION<br />REGISTRATION AND LICENSE ACTIVATION<br />Enter here<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    85. 85. SONICWALL<br />MEC NETWORKS CORPORATION<br />REGISTRATION AND LICENSE ACTIVATION<br />Confirmation message will appear after clicking submit. Verify the License Expiration Date must change.<br /><ul><li>Synchronize the License in Sonic WALL Appliace:
    86. 86. Manage your Sonic WALL Appliance
    87. 87. Go to System>Licenses
    88. 88. In Manage Security Services Online
    89. 89. Click Synchronize then confirm the Expiration Date</li></ul>SONICWALL<br />MEC NETWORKS CORPORATION<br />
    90. 90. SONICWALL<br />MEC NETWORKS CORPORATION<br />Hands - on<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    91. 91. SONICWALL<br />MEC NETWORKS CORPORATION<br />SonicWALLFeatures<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    92. 92. SONICWALL<br />MEC NETWORKS CORPORATION<br />What is SonicWALL?<br /><ul><li>Firewall (UTM) </li></ul>Gateway Anti-virus<br />Anti-Spyware<br />Anti-Spam<br />Website/Content Filtering<br />Intrusion Prevention/Detection<br />Email Filtering <br />Zero Day Protection<br /><ul><li>Router
    93. 93. VPN Server (IP-Sec and SSL-VPN Remote Access)
    94. 94. ISP Load Balancer/Failover
    95. 95. Bandwidth Manager
    96. 96. IP and MAC Address Binding
    97. 97. Enforced Client Anti-virus (MacAfee)
    98. 98. Built-in DHCP Server
    99. 99. Network Monitoring and Reporting Tool - Viewpoint</li></ul>SONICWALL<br />MEC NETWORKS CORPORATION<br />
    100. 100. SONICWALL<br />MEC NETWORKS CORPORATION<br />SonicWALL Engine<br />SPI<br />DPI<br />GAV<br />SonicWALL Engine<br />IPS<br />AS<br /><ul><li>Signature Based
    101. 101. Scans on the Fly (unlimited file size)</li></ul>SONICWALL<br />MEC NETWORKS CORPORATION<br />
    102. 102. SONICWALL<br />MEC NETWORKS CORPORATION<br />INSPECT<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />IP Options<br />SourceUDP Port<br />Destination<br />UDP Port<br />UDP<br />Length<br />UDP<br /> Checksum<br />DATA<br />Stateful Packet Inspection (SPI)<br />Source<br />212.56.32.49<br />Destination<br />65.26.42.17<br />Stateful is limited inspection that can only block on ports<br />No Data Inspection!<br />Source Port<br />823747<br />Dest Port<br />80<br />Sequence<br />2821<br />Sequence<br />28474<br />IP Option<br />none<br />Syn state<br />SYN<br />Stateful<br />PacketInspection<br />Firewall Traffic Path<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    103. 103. SONICWALL<br />MEC NETWORKS CORPORATION<br />INSPECT<br />INSPECT<br />Signature Database<br />ATTACK-RESPONSES 14BACKDOOR 58BAD-TRAFFIC 15DDOS 33DNS 19DOS 18EXPLOIT >35FINGER 13FTP 50ICMP 115Instant Messenger 25IMAP 16INFO 7Miscellaneous44MS-SQL 24MS-SQL/SMB 19MULTIMEDIA 6MYSQL 2NETBIOS 25NNTP 2ORACLE 25P2P 51POLICY 21POP2 4POP3 18RPC 124RSERVICES 13SCAN 25SMTP 23SNMP 17TELNET 14TFTP 9VIRUS 3WEB-ATTACKS 47WEB-CGI 312WEB-CLIENT<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />IP Options<br />SourceUDP Port<br />Destination<br />UDP Port<br />UDP<br />Length<br />UDP<br /> Checksum<br />DATA<br />Intrusion Prevention System (IPS)<br />IPS inspects all traffic moving through a device<br />IPS<br />Stateful<br />PacketInspection<br />Firewall Traffic Path<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    104. 104. SONICWALL<br />MEC NETWORKS CORPORATION<br />V<br />I<br />R<br />U<br />S<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />DATA<br />DATA<br />DATA<br />DATA<br />DATA<br />DATA<br />Gateway Anti-Virus<br />Signature Database<br />Comparing…<br />ATTACK-RESPONSES 14BACKDOOR 58BAD-TRAFFIC 15DDOS 33DNS 19DOS 18EXPLOIT >35FINGER 13FTP 50ICMP 115Instant Messenger 25IMAP 16INFO 7Miscellaneous44MS-SQL 24MS-SQL/SMB 19MULTIMEDIA 6MYSQL 2NETBIOS 25NNTP 2ORACLE 25P2P 51POLICY 21POP2 4POP3 18RPC 124RSERVICES 13SCAN 25SMTP 23SNMP 17TELNET 14TFTP 9VIRUS 3WEB-ATTACKS 47WEB-CGI 312WEB-CLIENT<br />V<br />I<br />R<br />U<br />S<br />Application Attack, Worm or Trojan Found! <br />Deep Packet Inspection with Intrusion Prevention can find and block, application vulnerabilities, worms or Trojans.<br />Stateful<br />PacketInspection<br />IPS<br />Anti-Virus<br />Firewall Traffic Path<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    105. 105. SONICWALL<br />MEC NETWORKS CORPORATION<br />S<br />P<br />Y<br />W<br />A<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />Version | Service | Total Length<br />ID | Flags | Fragment<br />TTL | Protocol | IP Checksum<br />Source IP Address<br />Destination IP Address<br />DATA<br />DATA<br />DATA<br />DATA<br />DATA<br />DATA<br />Anti-Spyware<br />Signature Database<br />Comparing…<br />ATTACK-RESPONSES 14BACKDOOR 58BAD-TRAFFIC 15DDOS 33DNS 19DOS 18EXPLOIT >35FINGER 13FTP 50ICMP 115Instant Messenger 25IMAP 16INFO 7Miscellaneous44MS-SQL 24MS-SQL/SMB 19MULTIMEDIA 6MYSQL 2NETBIOS 25NNTP 2ORACLE 25P2P 51POLICY 21POP2 4POP3 18RPC 124RSERVICES 13SCAN 25SMTP 23SNMP 17TELNET 14TFTP 9VIRUS 3WEB-ATTACKS 47WEB-CGI 312WEB-CLIENT<br />Spyware Found and Blocked<br />Deep Packet Inspection with Intrusion Prevention can find and block, application vulnerabilities, worms or Trojans.<br />Anti-Spyware<br />Stateful<br />PacketInspection<br />IPS<br />Anti-Virus<br />Firewall Traffic Path<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    106. 106. SONICWALL<br />MEC NETWORKS CORPORATION<br />Service Services Log Alerts<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    107. 107. SONICWALL<br />MEC NETWORKS CORPORATION<br />Gateway Anti-Virus: Yahoo IM Virus<br /><ul><li>An instant messenger virus is introduced internally
    108. 108. Infects the other zones on network
    109. 109. GAV enabled on the zones
    110. 110. Gateway scans, stops and discards virus
    111. 111. A log VIRUS ALERT is sent to the admin </li></ul>Log Alert!<br />V<br />V<br />V<br />V<br /> VIRUS<br /> VIRUS<br /> VIRUS<br /> VIRUS<br />Sales<br />Technical<br />Accounting<br />Web Servers<br />Email<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    112. 112. SONICWALL<br />MEC NETWORKS CORPORATION<br />Intrusion Prevention and Prevention Scenario<br /><ul><li>Exploits port 80
    113. 113. Infects Web Servers and proliferates
    114. 114. DPI has signature to block
    115. 115. A worm alert sent to the admin </li></ul>Log Alert!<br />V<br />V<br />V<br /> virus<br /> virus<br /> virus<br /> Zone #1<br /> Zone #2<br /> Zone #3<br />Web Servers<br />Email<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    116. 116. SONICWALL<br />MEC NETWORKS CORPORATION<br />Anti-Spyware Security Scenario<br /><ul><li>User surfs the web
    117. 117. Unknowingly downloads spyware
    118. 118. Spyware communicates back to server
    119. 119. AS enabled, prevents outbound communication to server
    120. 120. A log Spyware is sent to the admin
    121. 121. Note: PC is still infected with Spyware. </li></ul>Http Request<br />Log Alert!<br />Sales<br />Technical<br />Accounting<br />Web Servers<br />Email<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    122. 122. SONICWALL<br />MEC NETWORKS CORPORATION<br />SonicWALL Deep Packet Inspection<br /><ul><li>Zone based security
    123. 123. Protects internally
    124. 124. Gateway Anti-Virus
    125. 125. Scans through unlimited files sizes
    126. 126. Scans through unlimited connections
    127. 127. Scans over more protocols than any similar solution
    128. 128. Anti-Spyware for protection against malicious programs
    129. 129. Blocks the installation of spyware
    130. 130. Blocks Spyware that is emailed and sent internally
    131. 131. Applications Layer Threat Protection:
    132. 132. Full protection from Trojan, worm, blended and polymorphic threats</li></ul>SONICWALL<br />MEC NETWORKS CORPORATION<br />
    133. 133. SONICWALL<br />MEC NETWORKS CORPORATION<br />Complete UTM Security Scenario<br />V<br />V<br /> VIRUS<br /> NIMDA<br />Sales<br />Accounting<br />Technical<br />Web Servers<br />Email<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    134. 134. SONICWALL<br />MEC NETWORKS CORPORATION<br />ACTIVATINGUTM<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    135. 135. SONICWALL<br />MEC NETWORKS CORPORATION<br />ENABLING UTM<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    136. 136. SONICWALL<br />MEC NETWORKS CORPORATION<br />ENABLING UTM<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    137. 137. SONICWALL<br />MEC NETWORKS CORPORATION<br />ENABLING UTM (SETTINGS FOR GATEWAY ANTI-VIRUS)<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    138. 138. SONICWALL<br />MEC NETWORKS CORPORATION<br />ENABLING UTM (SETTINGS FOR INTRUSION PREVENTION)<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    139. 139. SONICWALL<br />MEC NETWORKS CORPORATION<br />ENABLING UTM (SETTINGS FOR ANTI-SPYWARE)<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    140. 140. SONICWALL<br />MEC NETWORKS CORPORATION<br />Hands - on<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    141. 141. SONICWALL<br />MEC NETWORKS CORPORATION<br />ZERO DAYPROTECTION<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    142. 142. SONICWALL<br />MEC NETWORKS CORPORATION<br />Zero Day Protection: How?<br />New virus created and proliferates<br />SonicWALL team identifies and creates signature for virus<br />SonicWall forces signature update of all appliances<br />Network protected<br />1<br />LAN<br />4 <br />3 <br />2<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    143. 143. SONICWALL<br />MEC NETWORKS CORPORATION<br />CONTENTFILTERING<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    144. 144. SONICWALL<br />MEC NETWORKS CORPORATION<br />Users<br /> SALES Department<br />TECHNICAL Department<br />CONTENT FILTERING<br />www.friendster.com<br />www.sex.com<br />friends<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    145. 145. SONICWALL<br />MEC NETWORKS CORPORATION<br />CONTENT FILTERING: HOW?<br />CFS Disabled<br />Complies with policy<br />Does not comply with policy<br />CFS Cache on the appliance<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    146. 146. SONICWALL<br />MEC NETWORKS CORPORATION<br />CONTENT FILTERING : CONFIGURATION<br />50<br />SonicWALL CONFIDENTIAL All Rights Reserved<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    147. 147. SONICWALL<br />MEC NETWORKS CORPORATION<br />Hands - on<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    148. 148. SONICWALL<br />MEC NETWORKS CORPORATION<br />LOAD BALANCING /<br />FAILOVER<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    149. 149. SONICWALL<br />MEC NETWORKS CORPORATION<br />ISP LOAD BALANCING / FAILOVER<br />PLDT<br />BAYANTEL<br /><ul><li>Failover to a secondary ISP should primary ISP fail
    150. 150. When the Primary ISP turns back, traffic will direct to Primary ISP </li></ul>WAN 1<br />WAN 2<br />www. facebook.com<br />Technical<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    151. 151. SONICWALL<br />MEC NETWORKS CORPORATION<br />ISP LOAD BALANCING / FAILOVER<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    152. 152. SONICWALL<br />MEC NETWORKS CORPORATION<br />ISP LOAD BALANCING / FAILOVER<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    153. 153. SONICWALL<br />MEC NETWORKS CORPORATION<br />ISP LOAD BALANCING / FAILOVER<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    154. 154. SONICWALL<br />MEC NETWORKS CORPORATION<br />ISP LOAD BALANCING / FAILOVER<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    155. 155. SONICWALL<br />MEC NETWORKS CORPORATION<br />DHCPSERVER<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    156. 156. SONICWALL<br />MEC NETWORKS CORPORATION<br />DHCP SERVER: CONFIGURATION<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    157. 157. SONICWALL<br />MEC NETWORKS CORPORATION<br />DHCP SERVER: CONFIGURATION<br />NOTE:<br /> the number of IP address you can<br /> set on the DHCP server will depend on <br />the appliance model<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    158. 158. SONICWALL<br />MEC NETWORKS CORPORATION<br />DHCP SERVER: CONFIGURATION<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    159. 159. SONICWALL<br />MEC NETWORKS CORPORATION<br />Hands - on<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    160. 160. SONICWALL<br />MEC NETWORKS CORPORATION<br />NETWORKMONITORING<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    161. 161. SONICWALL<br />MEC NETWORKS CORPORATION<br />NETWORK MONITORING<br />Deep Intelligence<br />Network Visibility <br />Threat Information<br />Top VPN Users<br />Application Usage<br />Bandwidth<br />Misuse<br />Bandwidth <br />Intelligence<br />VPN Reporting<br />Employee Net Usage<br />Pro-Active Alerting<br />UTM Appliance<br />IT Actionable Info<br />Alert Your Staff<br />No Intelligence<br />HTTP<br />FTP<br />IM/P2P<br />Mail<br />VPN<br />Threats<br />Protocols<br />Attacks<br />Potential Threats<br />End User Activities<br />Network Traffic<br />SonicWALL UTM & ViewPoint Delivers Deeper Business Intelligence<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    162. 162. SONICWALL<br />MEC NETWORKS CORPORATION<br />DHCP SERVER: CONFIGURATION<br />SONICWALL<br />MEC NETWORKS CORPORATION<br />
    163. 163. SONICWALL<br />MEC NETWORKS CORPORATION<br />Questions <br />SONICWALL<br />MEC NETWORKS CORPORATION<br />

    ×