Quiz
107 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are two probe methods that you can use for logical probes? (Select all that apply)

  • Ping (correct)
  • ICMP
  • TCP (correct)
  • UDP
  • Which action object is used to throttle the traffic?

    BWM

    Which of the following Address Object types is selected by default in the firewall?

    Host

    Which diagnostic utility on the SonicWall firewall allows you to look at the contents of IP packets traversing the firewall?

    <p>Packet Monitor</p> Signup and view all the answers

    Where is the real-time data on the Dashboard compiled and summarized from?

    <p>AppFlow</p> Signup and view all the answers

    What type of information is displayed on the Live Monitor panel? (Select all that apply)

    <p>Connection Count</p> Signup and view all the answers

    Which file types can be used to export the logs? (Select all that apply)

    <p>CSV</p> Signup and view all the answers

    What is the default timeout setting for administrator inactivity?

    <p>5 Minutes</p> Signup and view all the answers

    What type of encoding format is supported when importing an end-user certificate with a private key?

    <p>PKCS#12</p> Signup and view all the answers

    Which SonicOS GUI option is used to create a snapshot of the current system state?

    <p>Create Backup</p> Signup and view all the answers

    Which interface is used by SonicOS as the backup heartbeat link?

    <p>X3</p> Signup and view all the answers

    The firewall snapshot section displays the percentage of encrypted traffic flowing through the firewall.

    <p>True</p> Signup and view all the answers

    Which setting is used to turn on the CFS Security Service?

    <p>Enable Content Filtering Service</p> Signup and view all the answers

    Which Security Configuration menu option is used to enable client DPI-SSL?

    <p>Decryption Services</p> Signup and view all the answers

    Which Match Object will control what type of policy it can be used in?

    <p>Match object type</p> Signup and view all the answers

    What are the key components of a CFS policy? (Select all that apply)

    <p>Bandwidth Management</p> Signup and view all the answers

    Which Logs panel depicts the Eicar test virus file download?

    <p>AppFlow Logs</p> Signup and view all the answers

    A Site-to-Site VPN can allow simultaneous access to multiple remote servers.

    <p>True</p> Signup and view all the answers

    Which statement about SonicWall Gateway Anti-Virus service is correct?

    <p>Scans TCP stream-based protocols, in addition to common Web and email protocols</p> Signup and view all the answers

    Which of the following sentences is correct about HA configuration?

    <p>High Availability cannot be configured while there are ports participating in PortShield</p> Signup and view all the answers

    What type of NAT policies does a Public Server wizard create?

    <p>Inbound, Outbound, and Loopback NAT Policies</p> Signup and view all the answers

    Which of the following are included in the output of a network probe? (Select all that apply)

    <p>Probe Target and Type</p> Signup and view all the answers

    What are two route policy modes that are enabled by Dynamic Routing?

    <p>Advanced Routing and Simple RIP Advertisement</p> Signup and view all the answers

    Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway?

    <p>LAN Settings</p> Signup and view all the answers

    Which Load Balancing/Failover method helps specify the amount of outbound traffic to be sent through the primary and secondary WAN interfaces?

    <p>Ratio based</p> Signup and view all the answers

    Which of the following are required for WAN ISP Failover and Load balancing? (Select all that apply)

    <p>A second ISP connection</p> Signup and view all the answers

    What does a WAN Failover solution enable? (Select all that apply)

    <p>Directing redundant routes to one or more secondary service providers</p> Signup and view all the answers

    In the Event Logs, which of the following will generate a log message for any dropped packets?

    <p>The action for the policy is set to reset/drop</p> Signup and view all the answers

    What type of certificate store can be used to install the certificate?

    <p>Trusted Root Certification Authorities</p> Signup and view all the answers

    What is the SonicOS navigation path to begin configuring the VPN on the firewall?

    <p>Manage&gt;Connectivity&gt;VPN</p> Signup and view all the answers

    What type of object is created to configure a VPN host when implementing a Site-to-site VPN?

    <p>Network Address Object</p> Signup and view all the answers

    What is the default encryption method for both of the IKE phases when configuring a VPN on the firewall?

    <p>SHA1</p> Signup and view all the answers

    Which feature facilitates the setup and deployment of multiple global VPN clients?

    <p>Group VPN Policies</p> Signup and view all the answers

    What does the LDAP server provide to allow or deny user authorization?

    <p>Active Directory Membership</p> Signup and view all the answers

    Which group of Security Services uses the SonicWall Deep Packet Inspection engine?

    <p>IPS, GAV, and Anti-Spyware</p> Signup and view all the answers

    Which of the following are SonicWall's Advanced Threat Protection features? (Select all that apply)

    <p>Deep Packet Inspection</p> Signup and view all the answers

    In order for SonicWall's Deep Packet Inspection engine to provide protection, where must GAV, IPS, and Gateway Anti-Spyware be enabled? (Select all that apply)

    <p>Security Services</p> Signup and view all the answers

    Which packet status types are indicated by the Packet Monitor? (Select all that apply)

    <p>Consumed</p> Signup and view all the answers

    Which option enables the capture buffer data to be wrapped and retained to save externally when full, instead of being overwritten?

    <p>Wrap Capture Buffer once Full</p> Signup and view all the answers

    Which diagnostic tool tests for MySonicWall server connectivity?

    <p>Check Network Settings</p> Signup and view all the answers

    What options are used to preempt an administrator logged into the firewall? (Select all that apply)

    <p>Change to read-only access</p> Signup and view all the answers

    Which policy types are used in the App Rule Quick Configuration wizard? (Select all that apply)

    <p>SMTP Client</p> Signup and view all the answers

    What type of information does the DHCP server help distribute to network clients? (Select all that apply)

    <p>Gateway Address</p> Signup and view all the answers

    When configuring the Web proxy feature, the proxy server must be placed in the DMZ or WAN zones.

    <p>True</p> Signup and view all the answers

    Which of the following DDNS Providers are supported in SonicOS? (Select all that apply)

    <p>changeip.com</p> Signup and view all the answers

    Which of the following are predefined zones in SonicOS? (Select all that apply)

    <p>VPN</p> Signup and view all the answers

    Sub-interfaces on the SonicWall firewall add support for VLANs.

    <p>True</p> Signup and view all the answers

    Which of the following networking tasks are feasible when a DNS server is configured? (Select all that apply)

    <p>Signature Downloads</p> Signup and view all the answers

    Where do you configure the User Authentication method in SonicOS?

    <p>Manage&gt;Users&gt;Settings</p> Signup and view all the answers

    Which authentication method is recommended for a relatively small and limited number of users?

    <p>Local Users</p> Signup and view all the answers

    Which of the following are built-in user groups in a SonicWall firewall? (Select all that apply)

    <p>SonicWall Administrators</p> Signup and view all the answers

    Who among the following can manage Guest Accounts and Sessions?

    <p>Guest Administrators</p> Signup and view all the answers

    Which of the following are predefined Schemas that are available when configuring LDAP? (Select all that apply)

    <p>Novel eDirectory</p> Signup and view all the answers

    Which of the following variables are used to configure static routes to forward traffic? (Select all that apply)

    <p>Zones</p> Signup and view all the answers

    Static routes, by default, take precedence over VPN traffic.

    <p>True</p> Signup and view all the answers

    Which feature is used to create a predefined email notification with a defined subject?

    <p>Automation</p> Signup and view all the answers

    Which log setting is used to change event attributes globally, using flexible match conditions?

    <p>Go to Configure Log</p> Signup and view all the answers

    What type of information is displayed on the Protocol Monitor? (Select all that apply)

    <p>Ingress/Egress IPV4 Rate</p> Signup and view all the answers

    Choose two methods that SonicWall provides for managing global IPs and Anti-Spyware attack threats.

    <p>Prevent All and Detect All</p> Signup and view all the answers

    Which of the following are SonicWall outbound failover mechanisms? (Select all that apply)

    <p>Spillover-Based Ratio</p> Signup and view all the answers

    What is the navigation to configuring the Advanced App Control settings in SonicOS?

    <p>Manage&gt;Policies&gt;Rules&gt;App Control&gt; App Control Advanced</p> Signup and view all the answers

    Identify the best practices that are related to configuring App Control. (Select all that apply)

    <p>Enable logging, as needed, per application</p> Signup and view all the answers

    Which of the following will enable you to implement transparent role-based security management?

    <p>Implementing Single Sign-On</p> Signup and view all the answers

    Which Security Configuration menu option is used to enable client DPI-SSL?

    <p>Manage&gt;Decryption Service&gt;DPI-SSL/TLS Client</p> Signup and view all the answers

    Which of the following are supported by DPI-SSL? (Select all that apply)

    <p>TLS 1.2 Protocol</p> Signup and view all the answers

    What is the SonicOS navigation path to begin configuring the SSL-VPN on the firewall?

    <p>Manage&gt;Connectivity&gt;SSL-VPN</p> Signup and view all the answers

    Which policy type is selected when configuring the security policy of a Route-based VPN?

    <p>Tunnel Interface</p> Signup and view all the answers

    Which of the following services must be enabled to use Capture ATP?

    <p>AntiVirus</p> Signup and view all the answers

    Which of the following are Address Object types? (Select all that apply)

    <p>Network</p> Signup and view all the answers

    What do virtual interfaces enable?

    <p>Functional segregation of business operations</p> Signup and view all the answers

    In which of the following formats can a snapshot of the Packet Monitor output be exported? (Select all that apply)

    <p>Plain Text</p> Signup and view all the answers

    Where are the results of network probes displayed? (Select all that apply)

    <p>Network Probes panel</p> Signup and view all the answers

    Which result field of the Packet Monitor displays the firewall interface on which a packet was captured when sent out?

    <p>Egress</p> Signup and view all the answers

    What type of information is displayed on the Appliance Health panel? (Select all that apply)

    <p>Live Monitor</p> Signup and view all the answers

    Which tab on the SonicOS management interface displays the visualization Dashboard?

    <p>Monitor</p> Signup and view all the answers

    Which Connection monitor depicts the number of active connections?

    <p>Connection Count</p> Signup and view all the answers

    Which of the following are default Event Log Filters? (Select all that apply)

    <p>Priority</p> Signup and view all the answers

    Which Event Log categories are available by default in a SonicWall firewall? (Select all that apply)

    <p>Security Services</p> Signup and view all the answers

    Which option is a common mechanism for preventing routing loops?

    <p>Split Horizon</p> Signup and view all the answers

    Policy-Based Routing routes traffic based on various user-defined variables.

    <p>True</p> Signup and view all the answers

    Which of the following are Single Sign-On (SSO) authentication options in a SonicWall firewall?

    <p>LDAP Authentication</p> Signup and view all the answers

    Where do you add a Guest Services profile in SonicOS?

    <p>Manage&gt;Users&gt;Guest Services</p> Signup and view all the answers

    Which Advanced interface setting allows initial packets or response packets to pass through other interfaces?

    <p>Asymmetric Routing</p> Signup and view all the answers

    What types of mapping does ARP enable?

    <p>IP Addresses to MAC Addresses</p> Signup and view all the answers

    Which local network resource is selected by default in the SonicWall firewall when connecting with the VPN?

    <p>Firewalled Subnets</p> Signup and view all the answers

    Which setup feature also requires a string password setting to avoid potential security vulnerabilities?

    <p>Allow HTTPS on this WAN interface</p> Signup and view all the answers

    Which panel of the SonicOS management interface is used to define password restrictions?

    <p>Manage&gt;Appliance&gt;Base settings&gt;Login Security</p> Signup and view all the answers

    Select the two methods you can use to register the SonicWall appliance. (Select all that apply)

    <p>From MySonicWall.com</p> Signup and view all the answers

    If the Logging Level filter is defined as Error, which of the following alert types will also be displayed in the results? (Select all that apply)

    <p>Critical</p> Signup and view all the answers

    Select the default server types that are available when configuring the Public Server wizard. (Select all that apply)

    <p>Web Server</p> Signup and view all the answers

    SonicWall Administrator has modified the default LAN>WAN Access Rule from 'Allow' to 'Deny', blocking all outbound WAN traffic. Which of the following statements is applicable in this context?

    <p>LAN user cannot access the Internet, but the appliance can still register with MySonicWall.com and update the UTM signatures.</p> Signup and view all the answers

    Which Filtering option allows you to exclude events at lower priority?

    <p>Logging Level</p> Signup and view all the answers

    Which of the following user variables are defined to configure static routes to forward traffic? (Select all that apply)

    <p>Source and Destination Addresses</p> Signup and view all the answers

    What type of system schedule options can be defined in SonicOS? (Select all that apply)

    <p>Mixed</p> Signup and view all the answers

    Which option is recommended to be left unchecked when using Stateful HA?

    <p>Enable Preempt Mode</p> Signup and view all the answers

    What type of intermediate traffic is monitored by the Packet Monitor? (Select all that apply)

    <p>IP Helper-generated packets</p> Signup and view all the answers

    What type of information is displayed on the Threat Protection panel? (Select all that apply)

    <p>Spyware blocked</p> Signup and view all the answers

    How do you enable dynamic OSF routing on the SonicWall firewall?

    <p>Change the routing mode to Advanced Routing on the Settings tab</p> Signup and view all the answers

    DPI-SSL examines SSL traffic, regardless of the port number.

    <p>True</p> Signup and view all the answers

    Where is the SonicOS navigation path for HA configuration?

    <p>Manage&gt;High Availability&gt; Base Setup</p> Signup and view all the answers

    Which DPI-SSL setting is used to allow new connections to bypass decryption instead of being dropped when the connection limit is crossed?

    <p>Allow SSL without decryption (bypass) when connection limit exceeded</p> Signup and view all the answers

    What is the navigation path to configure Failover and Load Balancing in SonicOS?

    <p>Manage&gt;Network&gt;Failover &amp; Load Balancing</p> Signup and view all the answers

    Which object type represents the conditions that must be met in an App Rule policy?

    <p>Match Object</p> Signup and view all the answers

    Where is the real-time data collection enabled and configured from in the SonicOS management interface?

    <p>Manage&gt;AppFlow Reporting&gt;Settings</p> Signup and view all the answers

    What type of real-time data can be viewed in the AppFlow logs? (Select all that apply)

    <p>Applications</p> Signup and view all the answers

    Which user group can have Bookmarks configured for them?

    <p>SSL-VPN Users</p> Signup and view all the answers

    The Public Server guide assigns the server automatically to the zone to which its IP address belongs.

    <p>False</p> Signup and view all the answers

    Study Notes

    SonicWall Firewall Concepts

    • Ping and TCP are two probe methods for logical probes.
    • BWM action object controls traffic throttling for a specific category.
    • The Host address object type is the default selection for firewall settings.
    • The Packet Monitor diagnostic utility allows inspection of IP packet content traversing the firewall.
    • AppFlow provides real-time data that's summarized and displayed on the Dashboard.
    • Multi-Core Monitor and Connection Count are displayed by the Live Monitor panel.
    • CSV and Email file types are supported for log exporting.
    • The SonicOS GUI Create Backup option creates a snapshot of the current system state.
    • The X3 interface serves as the backup heartbeat link in SonicOS.
    • The Firewall Snapshot displays the percentage of encrypted traffic flowing through the firewall.
    • Enabling the Content Filtering Service activates the CFS Security Service.
    • Decryption Services in the Security Configuration menu enables client DPI-SSL.
    • Match Object Type determines the policy an object can be used with.
    • Bandwidth Management, authentication and block are the key components of a CFS policy.
    • The AppFlow Logs panel displays Eicar test virus file download activity.
    • Site-to-Site VPNs allow simultaneous access to multiple remote servers.
    • SonicWall Gateway Anti-Virus service scans TCP stream-based protocols beyond common web and email protocols.
    • High Availability configuration cannot be completed while PortShield is active.
    • Inbound, Outbound, and Loopback NAT Policies are created by the Public Server Wizard.
    • IP Addressing, Probe Target and Type, and Interface Details are included in network probe output.
    • Advanced Routing and Simple RIP Advertisement are two route policy modes enabled by Dynamic Routing.
    • The LAN Settings panel in the Setup Guide configures the firewall as the default gateway.
    • Ratio based Load Balancing/Failover method determines outbound traffic distribution between primary and secondary WAN interfaces.
    • A second ISP connection and separate subnets for each WAN are required for WAN ISP Failover and Load balancing.
    • Maintaining a persistent connection for WAN port traffic through failover to the secondary WAN port and directing redundant routes to secondary service providers are enabled by a WAN Failover solution.
    • A log message for dropped packets is generated whenever the policy's action is set to reset/drop.
    • Trusted Root Certification Authorities certificate store is used during certificate installation.
    • The SonicOS navigation path to configure VPN is Manage>Connectivity>VPN.
    • Network Address Object is created for configuring a VPN host in a Site-to-Site VPN.
    • SHA1 is the default encryption method for both IKE phases when configuring a VPN.
    • Group VPN Policies simplify setup and deployment of multiple global VPN clients.
    • The LDAP server provides Active Directory Membership for user authorization.
    • IPS, GAV, and Anti-Spyware security services use the SonicWall Deep Packet Inspection engine.
    • Deep Packet Inspection and Geo-IP are the SonicWall Advanced Threat Protection features.
    • Zones and Security Services are where GAV, IPS, and Gateway Anti-Spyware need to be enabled for the SonicWall Deep Packet Inspection engine to provide protection.
    • Forwarded and Consumed are the packet status types indicated by the Packet Monitor.
    • Wrap Capture Buffer once Full enables the capture buffer to wrap and save externally when full, instead of overwriting data.
    • The Check Network Settings diagnostic tool tests connectivity to the MySonicWall server.
    • Change to read-only access and Dropped to Non-Config mode are options used to preempt an administrator logged into the firewall.
    • FTP Data Transfer and SMTP Client are policy types used in the App Rule Quick Configuration wizard.
    • Gateway Address, IP Address, and Dns Server Settings are the types of information distributed by the DHCP server to network clients.
    • When configuring the Web proxy feature, the proxy server should be placed in the DMZ or WAN zones.
    • dyn.com, no-IP.com, and changeip.com are supported DDNS Providers in SonicOS.
    • VPN and LAN are pre-defined zones in SonicOS.
    • Sub-interfaces on the SonicWall firewall add support for VLANs.
    • Signature Downloads and CFS server name resolution are networking tasks facilitated by a configured DNS server.
    • The Manage>Users>Settings panel in SonicOS is where you configure the User Authentication method.
    • Local Users is the recommended authentication method for a smaller, limited number of users.
    • Trusted Users, Everyone, and Sonicwall Administrators are built-in user groups on a Sonicwall firewall.
    • Guest Administrators manage Guest Accounts and Sessions.
    • Novel eDirectory and MS Active Directory are pre-defined Schemas that work when configuring LDAP.
    • Zones and Services are the variables used to configure static routes for traffic forwarding.
    • Static routes take precedence over VPN traffic by default.
    • Automation is used create a predefined email notification with a defined subject.
    • Configure Log is used to change event attributes globally using flexible match conditions.
    • Ingress/Egress ARP Rate, Ingress/Egress IPV4 Rate, and Ingress/Egress TCP Rate are displayed by the Protocol Monitor.
    • Prevent All and Detect All are two SonicWall methods for managing global IPs and Anti-Spyware attack threats.
    • Round Robin and Spillover-Based Ratio are SonicWall outbound failover mechanisms.
    • The SonicOS navigation path to configure Advanced App Control settings is Manage>Policies>Rules>App Control> App Control Advanced.
    • Enable logging, as needed, per application and Assign common access rules to all users, regardless of groups are best practices when configuring App Control.
    • Single Sign-On implements transparent role-based security management.
    • The SonicOS navigation path for configuring DPI-SSL is Manage>Decryption Service>DPI-SSL TLS Client.
    • TLS 1.2 Protocol is supported by DPI-SSL.
    • The SonicOS navigation path to configure SSL-VPN is Manage>Connectivity>SSL-VPN.
    • **Tunnel Interface ** policy type is used when configuring the security policy for a Route-based VPN.
    • AntiVirus service must be enabled to use Capture ATP.
    • Network, Range, and Host are Address Object types.
    • Functional segregation of business operations is enabled by virtual interfaces.
    • Plain Text, HTML, and Pcap formats are used to export a snapshot of the Packet Monitor output.
    • Client Computers, System Logs, and the Network Probes panel are where network probe results are displayed.
    • Egress is the result field within the Packet Monitor that shows which firewall interface a packet went out of.
    • Bandwidth Monitor, Live Monitor, and Protocol Monitor display information on the Appliance Health panel.
    • The Monitor tab on the SonicOS management interface shows the visualization Dashboard.
    • The Connection Count Connection monitor shows active connections.
    • Category and Priority are default Event Log Filters.
    • System, Security Services, and Firewall Settings are Event Log categories available in a SonicWall firewall by default.
    • **Split Horizon ** is a common mechanism for preventing routing loops.
    • Policy-Based Routing routes traffic based on user-defined variables.
    • LDAP Authentication is a Single Sign-On (SSO) authentication option in a Sonicwall firewall.
    • Manage>Users>Guest Services is where you add a Guest Services profile in SonicOS.
    • Asymetric Routing allows initial or response packets to pass through other interfaces.
    • IP Addresses to MAC Addresses are the type of mapping ARP enables.
    • **Firewalled Subnets ** is the default local network resource selected when connecting a VPN.
    • Allow HTTPS on this WAN interface setup feature also requires a string password setting.
    • The Manage>Appliance>Base settings>Login Security panel in the SonicOS management interface defines password restrictions.
    • Using the Getting Started Guide and From MySonicWall.com are methods for registering the SonicWall appliance.
    • If the Logging Level filter is set to Error, Critial, Alert, and Emergency alert types are also shown in the results.
    • Citrix ICA Server, Mail Server, and Web Server are default server types available when configuring the Public Server wizard.
    • When the Sonicwall Adminstrator changes the LAN>WAN Access Rule from "Allow" to "Deny", LAN users cannot access the internet, but the appliance can still register with MySonicWall.com and update UTM signatures.
    • Logging Level Filtering option excludes lower-priority events.
    • The default Gateway, Metrics, and Source and Destination Addresses are user variables used to configure static routes to forward traffic.
    • Once, Recurring, and Mixed are system schedule options available in SonicOS.
    • Enable Preempt Mode is recommended to be left unchecked when using Stateful HA.
    • Encrypted Packets, Multicast packets that are replicates, and IP Helper-generated packets are types of intermediate traffic monitored by the Packet Monitor.
    • Spyware blocked, Virusses blocked, and Intrusions prevented are displayed on the Threat Protection panel.
    • Changing the routing mode to **Advanced Routing on the Settings tab ** activates dynamic OSF routing on the SonicWall firewall.
    • DPI-SSL examines SSL traffic, regardless of the port number.
    • The SonicOS navigation path for HA configuration is **Manage>High Availability> Base Setup **.
    • The Allow SSL without decryption (bypass) when connection limit exceeded DPI-SSL setting bypasses decryption for new connections when the connection limit is reached.
    • Manage>Network>Failover & Load Balancing is the SonicOS navigation path for configuring Failover and Load Balancing.
    • Math Object represents the conditions met in an App Rule policy.
    • Manage>Appflow Reporting>Settings is where real-time data collection is enabled and configured in the SonicOS management interface.
    • Users and Applications are types of real-time data displayed in the AppFlow logs.
    • SSL-VPN Users can have Bookmarks configured for them.
    • The Public Server guide does not automatically assign the server to the zone its IP address belongs to.
    • The SonicOS navigation path for configuring the SSL-VPN is Manage>Connectivity>SSL-VPN.
    • Network Address Object is created for configuring a VPN host in a Site-to-Site VPN.

    SonicWall Firewall Essentials

    • Packet Monitor
      • Exportable formats: Plain Text, HTML, Pcap
      • Displays results on Client Computers, System Logs, Network Probes panel
      • "Egress" field indicates the firewall interface on which a packet was captured when sent out
    • Appliance Health Panel
      • Displays information about Bandwidth Monitor, Live Monitor, and Protocol Monitor
    • SonicOS Management Interface
      • "Monitor" tab displays the visualization Dashboard
      • "Connection Count" monitor depicts the number of active connections
    • Event Logs
      • Default filters: Category and Priority
      • Default categories: System, Security Services, Firewall Settings
    • Routing
      • Common mechanism for preventing routing loops: Split Horizon
      • Policy-Based Routing: Routes traffic based on user-defined variables
    • Authentication
      • Single Sign-On (SSO) options: LDAP Authentication
    • Guest Services
      • Added under Manage > Users > Guest Services
    • Advanced Interface Settings
      • Asymmetric Routing: Allows initial or response packets to pass through other interfaces
    • ARP
      • Enables mapping of IP Addresses to MAC Addresses
    • VPN
      • Default local network resource: Firewalled Subnets
      • "Allow HTTPS on this WAN interface" setting requires a string password for security
    • Password Restrictions
      • Defined in Manage > Appliance > Base settings > Login Security
    • SonicWall Appliance Registration
      • Two methods: MySonicWall.com and Getting Started Guide
    • Network Probes
      • Two probe methods: Ping and TCP
    • Action Objects
      • "BWM" action object used to throttle traffic
    • Address Objects
      • Default type: Host
    • Diagnostic Utilities
      • Packet Monitor: Allows inspecting IP packet contents traversing the firewall
    • Dashboard
      • Real-time data compiled from AppFlow
    • Live Monitor Panel
      • Displays information about Multi-Core Monitor and Connection Count
    • Logs
      • Exportable file types: Email and CSV
      • Default administrator inactivity timeout: 5 Minutes
    • Certificates
      • Supported encoding format for importing certificates: PKCS#12
    • System State Snapshot
      • Created using "Create Backup" option in the SonicOS GUI
    • Heartbeat Link
      • X3 interface used as backup heartbeat link
    • Firewall Snapshot
      • Displays percentage of encrypted traffic
    • CFS Security Service
      • Enabled using "Enable Content Filtering Service" setting
    • Client DPI-SSL
      • Enabled in Decryption Services menu option
    • Match Objects
      • Determine the type of policy they can be used in
    • CFS Policy
      • Key components: Bandwidth Management, authentication, and blocking
    • AppFlow Logs
      • Display Eicar test virus file download
    • Site-to-Site VPN
      • Allows simultaneous access to multiple remote servers
    • SonicWall Gateway Anti-Virus
      • Scans common Web and email protocols, as well as TCP stream-based protocols
    • High Availability (HA)
      • Cannot be configured while PortShield ports are active
    • Public Server Wizard
      • Creates Inbound, Outbound, and Loopback NAT Policies
    • Network Probe Output
      • Includes: IP Addressing, Probe Target and Type, and Interface Details
    • Dynamic Routing
      • Two route policy modes: Advanced Routing and Simple RIP Advertisement
    • Default Gateway
      • Configured in LAN Settings panel of the Setup Guide
    • Load Balancing/Failover Method
      • Ratio based method specifies outbound traffic distribution between primary and secondary WAN interfaces
    • WAN ISP Failover and Load Balancing
      • Requires: A second ISP connection and placing each WAN on separate subnets
    • WAN Failover Solution
      • Enables persistent connection for WAN port traffic by failing over to the secondary WAN port and directing redundant routes to secondary service providers
    • Event Logs and Packet Dropping
      • Log message generated for dropped packets if the policy action is set to reset/drop
    • Certificate Store
      • Trusted Root Certification Authorities used to install certificates
    • VPN Configuration
      • Navigation path: Manage > Connectivity > VPN
    • Site-to-Site VPN Host Configuration
      • Use Network Address Object
    • VPN Encryption
      • Default method for IKE phases: SHA1
    • Group VPN Policies
      • Facilitate setup and deployment of multiple global VPN clients
    • LDAP Server
      • Provides Active Directory Membership for user authorization
    • LDAP Schema
      • Predefined schemas: Novel eDirectory and MS Active Directory
    • Static Routes
      • Configured using: Zones and Services
      • Take precedence over VPN traffic by default
    • Email Notifications
      • Created using Automation feature
    • Log Setting
      • "Configure Log" used to change event attributes globally with flexible match conditions
    • Protocol Monitor
      • Displays information about: Ingress/Egress ARP Rate, Ingress/Egress IPV4 Rate, and Ingress/Egress TCP Rate
    • Global IPs and Anti-Spyware Threats
      • SonicWall provides two management methods: Prevent All and Detect All
    • Outbound Failover Mechanisms
      • SonicWall provides two mechanisms: Round Robin and Spillover-Based Ratio
    • App Control Advanced Settings
      • Navigation path: Manage > Policies > Rules > App Control > App Control Advanced
    • App Control Best Practices
      • Enable logging per application as needed
      • Assign common access rules to all users, regardless of groups
    • Role-Based Security Management
      • Enabled through Single Sign-On (SSO) implementation
    • DPI-SSL Enablement
      • SonicOS navigation path: Manage > Decryption Service > DPI-SSL/TLS Client
    • DPI-SSL Support
      • Supports TLS 1.2 protocol
    • SSL-VPN Configuration
      • SonicOS navigation path: Manage > Connectivity > SSL-VPN
    • Route-based VPN Security Policy
      • Select Tunnel Interface policy type
    • Capture ATP
      • Requires AntiVirus service to be enabled
    • Address Object Types
      • Network, Range, and Host
    • Virtual Interfaces
      • Enable using SonicWall Getting Started Guide or MySonicWall.com
    • Logging Level Filter
      • If set to Error, Critical, Alert, and Emergency alert types will also be displayed
    • Public Server Wizard Default Server Types
      • Citrix ICA Server, Mail Server, and Web Server
    • LAN > WAN Access Rule Modification
      • Changing the default rule from "Allow" to "Deny" blocks outbound WAN traffic
      • LAN users cannot access the internet but the appliance can still register with MySonicWall.com and update UTM signatures
    • Filtering Option for Excluding Events at Lower Priority
      • Logging Level
    • Static Route Configuration Variables
      • Default Gateway, Metrics, Source and Destination Addresses
    • System Schedule Options in SonicOS
      • Once, Recurring, and Mixed
    • Stateful HA
      • Recommended to leave "Enable Preempt Mode" unchecked
    • Packet Monitor Traffic
      • Monitors Encrypted Packets, Multicast packets that are replicates, and IP Helper-generated packets
    • Threat Protection Panel
      • Displays information about Spyware blocked, viruses blocked, and intrusions prevented
    • Dynamic OSF Routing Enablement
      • Change the routing mode to Advanced Routing on the Settings tab
    • DPI-SSL Traffic Examination
      • DPI-SSL examines SSL traffic regardless of the port number
    • HA Interfaces Tab
      • Used to define the mode for the primary firewall
    • HA Configuration Navigation Path
      • Manage > High Availability > Base Setup
    • DPI-SSL Bypass Setting
      • "Allow SSL without decryption (bypass) when connection limit exceeded" setting allows new connections to bypass decryption instead of being dropped when the connection limit is crossed
    • Failover and Load Balancing Configuration
      • SonicOS navigation path: Manage > Network > Failover & Load Balancing
    • App Rule Policy Conditions
      • Represented by Match Object type
    • Intermediate Traffic
      • Packets captured by SonicWall Packet Monitor

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Sonicwall SNSA

    More Like This

    Quiz
    5 questions
    Quiz de Pisco
    5 questions

    Quiz de Pisco

    LuxuriantMeadow avatar
    LuxuriantMeadow
    Use Quizgecko on...
    Browser
    Browser