Podcast
Questions and Answers
What are two probe methods that you can use for logical probes? (Select all that apply)
What are two probe methods that you can use for logical probes? (Select all that apply)
Which action object is used to throttle the traffic?
Which action object is used to throttle the traffic?
BWM
Which of the following Address Object types is selected by default in the firewall?
Which of the following Address Object types is selected by default in the firewall?
Host
Which diagnostic utility on the SonicWall firewall allows you to look at the contents of IP packets traversing the firewall?
Which diagnostic utility on the SonicWall firewall allows you to look at the contents of IP packets traversing the firewall?
Signup and view all the answers
Where is the real-time data on the Dashboard compiled and summarized from?
Where is the real-time data on the Dashboard compiled and summarized from?
Signup and view all the answers
What type of information is displayed on the Live Monitor panel? (Select all that apply)
What type of information is displayed on the Live Monitor panel? (Select all that apply)
Signup and view all the answers
Which file types can be used to export the logs? (Select all that apply)
Which file types can be used to export the logs? (Select all that apply)
Signup and view all the answers
What is the default timeout setting for administrator inactivity?
What is the default timeout setting for administrator inactivity?
Signup and view all the answers
What type of encoding format is supported when importing an end-user certificate with a private key?
What type of encoding format is supported when importing an end-user certificate with a private key?
Signup and view all the answers
Which SonicOS GUI option is used to create a snapshot of the current system state?
Which SonicOS GUI option is used to create a snapshot of the current system state?
Signup and view all the answers
Which interface is used by SonicOS as the backup heartbeat link?
Which interface is used by SonicOS as the backup heartbeat link?
Signup and view all the answers
The firewall snapshot section displays the percentage of encrypted traffic flowing through the firewall.
The firewall snapshot section displays the percentage of encrypted traffic flowing through the firewall.
Signup and view all the answers
Which setting is used to turn on the CFS Security Service?
Which setting is used to turn on the CFS Security Service?
Signup and view all the answers
Which Security Configuration menu option is used to enable client DPI-SSL?
Which Security Configuration menu option is used to enable client DPI-SSL?
Signup and view all the answers
Which Match Object will control what type of policy it can be used in?
Which Match Object will control what type of policy it can be used in?
Signup and view all the answers
What are the key components of a CFS policy? (Select all that apply)
What are the key components of a CFS policy? (Select all that apply)
Signup and view all the answers
Which Logs panel depicts the Eicar test virus file download?
Which Logs panel depicts the Eicar test virus file download?
Signup and view all the answers
A Site-to-Site VPN can allow simultaneous access to multiple remote servers.
A Site-to-Site VPN can allow simultaneous access to multiple remote servers.
Signup and view all the answers
Which statement about SonicWall Gateway Anti-Virus service is correct?
Which statement about SonicWall Gateway Anti-Virus service is correct?
Signup and view all the answers
Which of the following sentences is correct about HA configuration?
Which of the following sentences is correct about HA configuration?
Signup and view all the answers
What type of NAT policies does a Public Server wizard create?
What type of NAT policies does a Public Server wizard create?
Signup and view all the answers
Which of the following are included in the output of a network probe? (Select all that apply)
Which of the following are included in the output of a network probe? (Select all that apply)
Signup and view all the answers
What are two route policy modes that are enabled by Dynamic Routing?
What are two route policy modes that are enabled by Dynamic Routing?
Signup and view all the answers
Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway?
Which configuration panel in the Setup Guide is used to configure the firewall as the default gateway?
Signup and view all the answers
Which Load Balancing/Failover method helps specify the amount of outbound traffic to be sent through the primary and secondary WAN interfaces?
Which Load Balancing/Failover method helps specify the amount of outbound traffic to be sent through the primary and secondary WAN interfaces?
Signup and view all the answers
Which of the following are required for WAN ISP Failover and Load balancing? (Select all that apply)
Which of the following are required for WAN ISP Failover and Load balancing? (Select all that apply)
Signup and view all the answers
What does a WAN Failover solution enable? (Select all that apply)
What does a WAN Failover solution enable? (Select all that apply)
Signup and view all the answers
In the Event Logs, which of the following will generate a log message for any dropped packets?
In the Event Logs, which of the following will generate a log message for any dropped packets?
Signup and view all the answers
What type of certificate store can be used to install the certificate?
What type of certificate store can be used to install the certificate?
Signup and view all the answers
What is the SonicOS navigation path to begin configuring the VPN on the firewall?
What is the SonicOS navigation path to begin configuring the VPN on the firewall?
Signup and view all the answers
What type of object is created to configure a VPN host when implementing a Site-to-site VPN?
What type of object is created to configure a VPN host when implementing a Site-to-site VPN?
Signup and view all the answers
What is the default encryption method for both of the IKE phases when configuring a VPN on the firewall?
What is the default encryption method for both of the IKE phases when configuring a VPN on the firewall?
Signup and view all the answers
Which feature facilitates the setup and deployment of multiple global VPN clients?
Which feature facilitates the setup and deployment of multiple global VPN clients?
Signup and view all the answers
What does the LDAP server provide to allow or deny user authorization?
What does the LDAP server provide to allow or deny user authorization?
Signup and view all the answers
Which group of Security Services uses the SonicWall Deep Packet Inspection engine?
Which group of Security Services uses the SonicWall Deep Packet Inspection engine?
Signup and view all the answers
Which of the following are SonicWall's Advanced Threat Protection features? (Select all that apply)
Which of the following are SonicWall's Advanced Threat Protection features? (Select all that apply)
Signup and view all the answers
In order for SonicWall's Deep Packet Inspection engine to provide protection, where must GAV, IPS, and Gateway Anti-Spyware be enabled? (Select all that apply)
In order for SonicWall's Deep Packet Inspection engine to provide protection, where must GAV, IPS, and Gateway Anti-Spyware be enabled? (Select all that apply)
Signup and view all the answers
Which packet status types are indicated by the Packet Monitor? (Select all that apply)
Which packet status types are indicated by the Packet Monitor? (Select all that apply)
Signup and view all the answers
Which option enables the capture buffer data to be wrapped and retained to save externally when full, instead of being overwritten?
Which option enables the capture buffer data to be wrapped and retained to save externally when full, instead of being overwritten?
Signup and view all the answers
Which diagnostic tool tests for MySonicWall server connectivity?
Which diagnostic tool tests for MySonicWall server connectivity?
Signup and view all the answers
What options are used to preempt an administrator logged into the firewall? (Select all that apply)
What options are used to preempt an administrator logged into the firewall? (Select all that apply)
Signup and view all the answers
Which policy types are used in the App Rule Quick Configuration wizard? (Select all that apply)
Which policy types are used in the App Rule Quick Configuration wizard? (Select all that apply)
Signup and view all the answers
What type of information does the DHCP server help distribute to network clients? (Select all that apply)
What type of information does the DHCP server help distribute to network clients? (Select all that apply)
Signup and view all the answers
When configuring the Web proxy feature, the proxy server must be placed in the DMZ or WAN zones.
When configuring the Web proxy feature, the proxy server must be placed in the DMZ or WAN zones.
Signup and view all the answers
Which of the following DDNS Providers are supported in SonicOS? (Select all that apply)
Which of the following DDNS Providers are supported in SonicOS? (Select all that apply)
Signup and view all the answers
Which of the following are predefined zones in SonicOS? (Select all that apply)
Which of the following are predefined zones in SonicOS? (Select all that apply)
Signup and view all the answers
Sub-interfaces on the SonicWall firewall add support for VLANs.
Sub-interfaces on the SonicWall firewall add support for VLANs.
Signup and view all the answers
Which of the following networking tasks are feasible when a DNS server is configured? (Select all that apply)
Which of the following networking tasks are feasible when a DNS server is configured? (Select all that apply)
Signup and view all the answers
Where do you configure the User Authentication method in SonicOS?
Where do you configure the User Authentication method in SonicOS?
Signup and view all the answers
Which authentication method is recommended for a relatively small and limited number of users?
Which authentication method is recommended for a relatively small and limited number of users?
Signup and view all the answers
Which of the following are built-in user groups in a SonicWall firewall? (Select all that apply)
Which of the following are built-in user groups in a SonicWall firewall? (Select all that apply)
Signup and view all the answers
Who among the following can manage Guest Accounts and Sessions?
Who among the following can manage Guest Accounts and Sessions?
Signup and view all the answers
Which of the following are predefined Schemas that are available when configuring LDAP? (Select all that apply)
Which of the following are predefined Schemas that are available when configuring LDAP? (Select all that apply)
Signup and view all the answers
Which of the following variables are used to configure static routes to forward traffic? (Select all that apply)
Which of the following variables are used to configure static routes to forward traffic? (Select all that apply)
Signup and view all the answers
Static routes, by default, take precedence over VPN traffic.
Static routes, by default, take precedence over VPN traffic.
Signup and view all the answers
Which feature is used to create a predefined email notification with a defined subject?
Which feature is used to create a predefined email notification with a defined subject?
Signup and view all the answers
Which log setting is used to change event attributes globally, using flexible match conditions?
Which log setting is used to change event attributes globally, using flexible match conditions?
Signup and view all the answers
What type of information is displayed on the Protocol Monitor? (Select all that apply)
What type of information is displayed on the Protocol Monitor? (Select all that apply)
Signup and view all the answers
Choose two methods that SonicWall provides for managing global IPs and Anti-Spyware attack threats.
Choose two methods that SonicWall provides for managing global IPs and Anti-Spyware attack threats.
Signup and view all the answers
Which of the following are SonicWall outbound failover mechanisms? (Select all that apply)
Which of the following are SonicWall outbound failover mechanisms? (Select all that apply)
Signup and view all the answers
What is the navigation to configuring the Advanced App Control settings in SonicOS?
What is the navigation to configuring the Advanced App Control settings in SonicOS?
Signup and view all the answers
Identify the best practices that are related to configuring App Control. (Select all that apply)
Identify the best practices that are related to configuring App Control. (Select all that apply)
Signup and view all the answers
Which of the following will enable you to implement transparent role-based security management?
Which of the following will enable you to implement transparent role-based security management?
Signup and view all the answers
Which Security Configuration menu option is used to enable client DPI-SSL?
Which Security Configuration menu option is used to enable client DPI-SSL?
Signup and view all the answers
Which of the following are supported by DPI-SSL? (Select all that apply)
Which of the following are supported by DPI-SSL? (Select all that apply)
Signup and view all the answers
What is the SonicOS navigation path to begin configuring the SSL-VPN on the firewall?
What is the SonicOS navigation path to begin configuring the SSL-VPN on the firewall?
Signup and view all the answers
Which policy type is selected when configuring the security policy of a Route-based VPN?
Which policy type is selected when configuring the security policy of a Route-based VPN?
Signup and view all the answers
Which of the following services must be enabled to use Capture ATP?
Which of the following services must be enabled to use Capture ATP?
Signup and view all the answers
Which of the following are Address Object types? (Select all that apply)
Which of the following are Address Object types? (Select all that apply)
Signup and view all the answers
What do virtual interfaces enable?
What do virtual interfaces enable?
Signup and view all the answers
In which of the following formats can a snapshot of the Packet Monitor output be exported? (Select all that apply)
In which of the following formats can a snapshot of the Packet Monitor output be exported? (Select all that apply)
Signup and view all the answers
Where are the results of network probes displayed? (Select all that apply)
Where are the results of network probes displayed? (Select all that apply)
Signup and view all the answers
Which result field of the Packet Monitor displays the firewall interface on which a packet was captured when sent out?
Which result field of the Packet Monitor displays the firewall interface on which a packet was captured when sent out?
Signup and view all the answers
What type of information is displayed on the Appliance Health panel? (Select all that apply)
What type of information is displayed on the Appliance Health panel? (Select all that apply)
Signup and view all the answers
Which tab on the SonicOS management interface displays the visualization Dashboard?
Which tab on the SonicOS management interface displays the visualization Dashboard?
Signup and view all the answers
Which Connection monitor depicts the number of active connections?
Which Connection monitor depicts the number of active connections?
Signup and view all the answers
Which of the following are default Event Log Filters? (Select all that apply)
Which of the following are default Event Log Filters? (Select all that apply)
Signup and view all the answers
Which Event Log categories are available by default in a SonicWall firewall? (Select all that apply)
Which Event Log categories are available by default in a SonicWall firewall? (Select all that apply)
Signup and view all the answers
Which option is a common mechanism for preventing routing loops?
Which option is a common mechanism for preventing routing loops?
Signup and view all the answers
Policy-Based Routing routes traffic based on various user-defined variables.
Policy-Based Routing routes traffic based on various user-defined variables.
Signup and view all the answers
Which of the following are Single Sign-On (SSO) authentication options in a SonicWall firewall?
Which of the following are Single Sign-On (SSO) authentication options in a SonicWall firewall?
Signup and view all the answers
Where do you add a Guest Services profile in SonicOS?
Where do you add a Guest Services profile in SonicOS?
Signup and view all the answers
Which Advanced interface setting allows initial packets or response packets to pass through other interfaces?
Which Advanced interface setting allows initial packets or response packets to pass through other interfaces?
Signup and view all the answers
What types of mapping does ARP enable?
What types of mapping does ARP enable?
Signup and view all the answers
Which local network resource is selected by default in the SonicWall firewall when connecting with the VPN?
Which local network resource is selected by default in the SonicWall firewall when connecting with the VPN?
Signup and view all the answers
Which setup feature also requires a string password setting to avoid potential security vulnerabilities?
Which setup feature also requires a string password setting to avoid potential security vulnerabilities?
Signup and view all the answers
Which panel of the SonicOS management interface is used to define password restrictions?
Which panel of the SonicOS management interface is used to define password restrictions?
Signup and view all the answers
Select the two methods you can use to register the SonicWall appliance. (Select all that apply)
Select the two methods you can use to register the SonicWall appliance. (Select all that apply)
Signup and view all the answers
If the Logging Level filter is defined as Error, which of the following alert types will also be displayed in the results? (Select all that apply)
If the Logging Level filter is defined as Error, which of the following alert types will also be displayed in the results? (Select all that apply)
Signup and view all the answers
Select the default server types that are available when configuring the Public Server wizard. (Select all that apply)
Select the default server types that are available when configuring the Public Server wizard. (Select all that apply)
Signup and view all the answers
SonicWall Administrator has modified the default LAN>WAN Access Rule from 'Allow' to 'Deny', blocking all outbound WAN traffic. Which of the following statements is applicable in this context?
SonicWall Administrator has modified the default LAN>WAN Access Rule from 'Allow' to 'Deny', blocking all outbound WAN traffic. Which of the following statements is applicable in this context?
Signup and view all the answers
Which Filtering option allows you to exclude events at lower priority?
Which Filtering option allows you to exclude events at lower priority?
Signup and view all the answers
Which of the following user variables are defined to configure static routes to forward traffic? (Select all that apply)
Which of the following user variables are defined to configure static routes to forward traffic? (Select all that apply)
Signup and view all the answers
What type of system schedule options can be defined in SonicOS? (Select all that apply)
What type of system schedule options can be defined in SonicOS? (Select all that apply)
Signup and view all the answers
Which option is recommended to be left unchecked when using Stateful HA?
Which option is recommended to be left unchecked when using Stateful HA?
Signup and view all the answers
What type of intermediate traffic is monitored by the Packet Monitor? (Select all that apply)
What type of intermediate traffic is monitored by the Packet Monitor? (Select all that apply)
Signup and view all the answers
What type of information is displayed on the Threat Protection panel? (Select all that apply)
What type of information is displayed on the Threat Protection panel? (Select all that apply)
Signup and view all the answers
How do you enable dynamic OSF routing on the SonicWall firewall?
How do you enable dynamic OSF routing on the SonicWall firewall?
Signup and view all the answers
DPI-SSL examines SSL traffic, regardless of the port number.
DPI-SSL examines SSL traffic, regardless of the port number.
Signup and view all the answers
Where is the SonicOS navigation path for HA configuration?
Where is the SonicOS navigation path for HA configuration?
Signup and view all the answers
Which DPI-SSL setting is used to allow new connections to bypass decryption instead of being dropped when the connection limit is crossed?
Which DPI-SSL setting is used to allow new connections to bypass decryption instead of being dropped when the connection limit is crossed?
Signup and view all the answers
What is the navigation path to configure Failover and Load Balancing in SonicOS?
What is the navigation path to configure Failover and Load Balancing in SonicOS?
Signup and view all the answers
Which object type represents the conditions that must be met in an App Rule policy?
Which object type represents the conditions that must be met in an App Rule policy?
Signup and view all the answers
Where is the real-time data collection enabled and configured from in the SonicOS management interface?
Where is the real-time data collection enabled and configured from in the SonicOS management interface?
Signup and view all the answers
What type of real-time data can be viewed in the AppFlow logs? (Select all that apply)
What type of real-time data can be viewed in the AppFlow logs? (Select all that apply)
Signup and view all the answers
Which user group can have Bookmarks configured for them?
Which user group can have Bookmarks configured for them?
Signup and view all the answers
The Public Server guide assigns the server automatically to the zone to which its IP address belongs.
The Public Server guide assigns the server automatically to the zone to which its IP address belongs.
Signup and view all the answers
Study Notes
SonicWall Firewall Concepts
- Ping and TCP are two probe methods for logical probes.
- BWM action object controls traffic throttling for a specific category.
- The Host address object type is the default selection for firewall settings.
- The Packet Monitor diagnostic utility allows inspection of IP packet content traversing the firewall.
- AppFlow provides real-time data that's summarized and displayed on the Dashboard.
- Multi-Core Monitor and Connection Count are displayed by the Live Monitor panel.
- CSV and Email file types are supported for log exporting.
- The SonicOS GUI Create Backup option creates a snapshot of the current system state.
- The X3 interface serves as the backup heartbeat link in SonicOS.
- The Firewall Snapshot displays the percentage of encrypted traffic flowing through the firewall.
- Enabling the Content Filtering Service activates the CFS Security Service.
- Decryption Services in the Security Configuration menu enables client DPI-SSL.
- Match Object Type determines the policy an object can be used with.
- Bandwidth Management, authentication and block are the key components of a CFS policy.
- The AppFlow Logs panel displays Eicar test virus file download activity.
- Site-to-Site VPNs allow simultaneous access to multiple remote servers.
- SonicWall Gateway Anti-Virus service scans TCP stream-based protocols beyond common web and email protocols.
- High Availability configuration cannot be completed while PortShield is active.
- Inbound, Outbound, and Loopback NAT Policies are created by the Public Server Wizard.
- IP Addressing, Probe Target and Type, and Interface Details are included in network probe output.
- Advanced Routing and Simple RIP Advertisement are two route policy modes enabled by Dynamic Routing.
- The LAN Settings panel in the Setup Guide configures the firewall as the default gateway.
- Ratio based Load Balancing/Failover method determines outbound traffic distribution between primary and secondary WAN interfaces.
- A second ISP connection and separate subnets for each WAN are required for WAN ISP Failover and Load balancing.
- Maintaining a persistent connection for WAN port traffic through failover to the secondary WAN port and directing redundant routes to secondary service providers are enabled by a WAN Failover solution.
- A log message for dropped packets is generated whenever the policy's action is set to reset/drop.
- Trusted Root Certification Authorities certificate store is used during certificate installation.
- The SonicOS navigation path to configure VPN is Manage>Connectivity>VPN.
- Network Address Object is created for configuring a VPN host in a Site-to-Site VPN.
- SHA1 is the default encryption method for both IKE phases when configuring a VPN.
- Group VPN Policies simplify setup and deployment of multiple global VPN clients.
- The LDAP server provides Active Directory Membership for user authorization.
- IPS, GAV, and Anti-Spyware security services use the SonicWall Deep Packet Inspection engine.
- Deep Packet Inspection and Geo-IP are the SonicWall Advanced Threat Protection features.
- Zones and Security Services are where GAV, IPS, and Gateway Anti-Spyware need to be enabled for the SonicWall Deep Packet Inspection engine to provide protection.
- Forwarded and Consumed are the packet status types indicated by the Packet Monitor.
- Wrap Capture Buffer once Full enables the capture buffer to wrap and save externally when full, instead of overwriting data.
- The Check Network Settings diagnostic tool tests connectivity to the MySonicWall server.
- Change to read-only access and Dropped to Non-Config mode are options used to preempt an administrator logged into the firewall.
- FTP Data Transfer and SMTP Client are policy types used in the App Rule Quick Configuration wizard.
- Gateway Address, IP Address, and Dns Server Settings are the types of information distributed by the DHCP server to network clients.
- When configuring the Web proxy feature, the proxy server should be placed in the DMZ or WAN zones.
- dyn.com, no-IP.com, and changeip.com are supported DDNS Providers in SonicOS.
- VPN and LAN are pre-defined zones in SonicOS.
- Sub-interfaces on the SonicWall firewall add support for VLANs.
- Signature Downloads and CFS server name resolution are networking tasks facilitated by a configured DNS server.
- The Manage>Users>Settings panel in SonicOS is where you configure the User Authentication method.
- Local Users is the recommended authentication method for a smaller, limited number of users.
- Trusted Users, Everyone, and Sonicwall Administrators are built-in user groups on a Sonicwall firewall.
- Guest Administrators manage Guest Accounts and Sessions.
- Novel eDirectory and MS Active Directory are pre-defined Schemas that work when configuring LDAP.
- Zones and Services are the variables used to configure static routes for traffic forwarding.
- Static routes take precedence over VPN traffic by default.
- Automation is used create a predefined email notification with a defined subject.
- Configure Log is used to change event attributes globally using flexible match conditions.
- Ingress/Egress ARP Rate, Ingress/Egress IPV4 Rate, and Ingress/Egress TCP Rate are displayed by the Protocol Monitor.
- Prevent All and Detect All are two SonicWall methods for managing global IPs and Anti-Spyware attack threats.
- Round Robin and Spillover-Based Ratio are SonicWall outbound failover mechanisms.
- The SonicOS navigation path to configure Advanced App Control settings is Manage>Policies>Rules>App Control> App Control Advanced.
- Enable logging, as needed, per application and Assign common access rules to all users, regardless of groups are best practices when configuring App Control.
- Single Sign-On implements transparent role-based security management.
- The SonicOS navigation path for configuring DPI-SSL is Manage>Decryption Service>DPI-SSL TLS Client.
- TLS 1.2 Protocol is supported by DPI-SSL.
- The SonicOS navigation path to configure SSL-VPN is Manage>Connectivity>SSL-VPN.
- **Tunnel Interface ** policy type is used when configuring the security policy for a Route-based VPN.
- AntiVirus service must be enabled to use Capture ATP.
- Network, Range, and Host are Address Object types.
- Functional segregation of business operations is enabled by virtual interfaces.
- Plain Text, HTML, and Pcap formats are used to export a snapshot of the Packet Monitor output.
- Client Computers, System Logs, and the Network Probes panel are where network probe results are displayed.
- Egress is the result field within the Packet Monitor that shows which firewall interface a packet went out of.
- Bandwidth Monitor, Live Monitor, and Protocol Monitor display information on the Appliance Health panel.
- The Monitor tab on the SonicOS management interface shows the visualization Dashboard.
- The Connection Count Connection monitor shows active connections.
- Category and Priority are default Event Log Filters.
- System, Security Services, and Firewall Settings are Event Log categories available in a SonicWall firewall by default.
- **Split Horizon ** is a common mechanism for preventing routing loops.
- Policy-Based Routing routes traffic based on user-defined variables.
- LDAP Authentication is a Single Sign-On (SSO) authentication option in a Sonicwall firewall.
- Manage>Users>Guest Services is where you add a Guest Services profile in SonicOS.
- Asymetric Routing allows initial or response packets to pass through other interfaces.
- IP Addresses to MAC Addresses are the type of mapping ARP enables.
- **Firewalled Subnets ** is the default local network resource selected when connecting a VPN.
- Allow HTTPS on this WAN interface setup feature also requires a string password setting.
- The Manage>Appliance>Base settings>Login Security panel in the SonicOS management interface defines password restrictions.
- Using the Getting Started Guide and From MySonicWall.com are methods for registering the SonicWall appliance.
- If the Logging Level filter is set to Error, Critial, Alert, and Emergency alert types are also shown in the results.
- Citrix ICA Server, Mail Server, and Web Server are default server types available when configuring the Public Server wizard.
- When the Sonicwall Adminstrator changes the LAN>WAN Access Rule from "Allow" to "Deny", LAN users cannot access the internet, but the appliance can still register with MySonicWall.com and update UTM signatures.
- Logging Level Filtering option excludes lower-priority events.
- The default Gateway, Metrics, and Source and Destination Addresses are user variables used to configure static routes to forward traffic.
- Once, Recurring, and Mixed are system schedule options available in SonicOS.
- Enable Preempt Mode is recommended to be left unchecked when using Stateful HA.
- Encrypted Packets, Multicast packets that are replicates, and IP Helper-generated packets are types of intermediate traffic monitored by the Packet Monitor.
- Spyware blocked, Virusses blocked, and Intrusions prevented are displayed on the Threat Protection panel.
- Changing the routing mode to **Advanced Routing on the Settings tab ** activates dynamic OSF routing on the SonicWall firewall.
- DPI-SSL examines SSL traffic, regardless of the port number.
- The SonicOS navigation path for HA configuration is **Manage>High Availability> Base Setup **.
- The Allow SSL without decryption (bypass) when connection limit exceeded DPI-SSL setting bypasses decryption for new connections when the connection limit is reached.
- Manage>Network>Failover & Load Balancing is the SonicOS navigation path for configuring Failover and Load Balancing.
- Math Object represents the conditions met in an App Rule policy.
- Manage>Appflow Reporting>Settings is where real-time data collection is enabled and configured in the SonicOS management interface.
- Users and Applications are types of real-time data displayed in the AppFlow logs.
- SSL-VPN Users can have Bookmarks configured for them.
- The Public Server guide does not automatically assign the server to the zone its IP address belongs to.
- The SonicOS navigation path for configuring the SSL-VPN is Manage>Connectivity>SSL-VPN.
- Network Address Object is created for configuring a VPN host in a Site-to-Site VPN.
SonicWall Firewall Essentials
-
Packet Monitor
- Exportable formats: Plain Text, HTML, Pcap
- Displays results on Client Computers, System Logs, Network Probes panel
- "Egress" field indicates the firewall interface on which a packet was captured when sent out
-
Appliance Health Panel
- Displays information about Bandwidth Monitor, Live Monitor, and Protocol Monitor
-
SonicOS Management Interface
- "Monitor" tab displays the visualization Dashboard
- "Connection Count" monitor depicts the number of active connections
-
Event Logs
- Default filters: Category and Priority
- Default categories: System, Security Services, Firewall Settings
-
Routing
- Common mechanism for preventing routing loops: Split Horizon
- Policy-Based Routing: Routes traffic based on user-defined variables
-
Authentication
- Single Sign-On (SSO) options: LDAP Authentication
-
Guest Services
- Added under Manage > Users > Guest Services
-
Advanced Interface Settings
- Asymmetric Routing: Allows initial or response packets to pass through other interfaces
-
ARP
- Enables mapping of IP Addresses to MAC Addresses
-
VPN
- Default local network resource: Firewalled Subnets
- "Allow HTTPS on this WAN interface" setting requires a string password for security
-
Password Restrictions
- Defined in Manage > Appliance > Base settings > Login Security
-
SonicWall Appliance Registration
- Two methods: MySonicWall.com and Getting Started Guide
-
Network Probes
- Two probe methods: Ping and TCP
-
Action Objects
- "BWM" action object used to throttle traffic
-
Address Objects
- Default type: Host
-
Diagnostic Utilities
- Packet Monitor: Allows inspecting IP packet contents traversing the firewall
-
Dashboard
- Real-time data compiled from AppFlow
-
Live Monitor Panel
- Displays information about Multi-Core Monitor and Connection Count
-
Logs
- Exportable file types: Email and CSV
- Default administrator inactivity timeout: 5 Minutes
-
Certificates
- Supported encoding format for importing certificates: PKCS#12
-
System State Snapshot
- Created using "Create Backup" option in the SonicOS GUI
-
Heartbeat Link
- X3 interface used as backup heartbeat link
-
Firewall Snapshot
- Displays percentage of encrypted traffic
-
CFS Security Service
- Enabled using "Enable Content Filtering Service" setting
-
Client DPI-SSL
- Enabled in Decryption Services menu option
-
Match Objects
- Determine the type of policy they can be used in
-
CFS Policy
- Key components: Bandwidth Management, authentication, and blocking
-
AppFlow Logs
- Display Eicar test virus file download
-
Site-to-Site VPN
- Allows simultaneous access to multiple remote servers
-
SonicWall Gateway Anti-Virus
- Scans common Web and email protocols, as well as TCP stream-based protocols
-
High Availability (HA)
- Cannot be configured while PortShield ports are active
-
Public Server Wizard
- Creates Inbound, Outbound, and Loopback NAT Policies
-
Network Probe Output
- Includes: IP Addressing, Probe Target and Type, and Interface Details
-
Dynamic Routing
- Two route policy modes: Advanced Routing and Simple RIP Advertisement
-
Default Gateway
- Configured in LAN Settings panel of the Setup Guide
-
Load Balancing/Failover Method
- Ratio based method specifies outbound traffic distribution between primary and secondary WAN interfaces
-
WAN ISP Failover and Load Balancing
- Requires: A second ISP connection and placing each WAN on separate subnets
-
WAN Failover Solution
- Enables persistent connection for WAN port traffic by failing over to the secondary WAN port and directing redundant routes to secondary service providers
-
Event Logs and Packet Dropping
- Log message generated for dropped packets if the policy action is set to reset/drop
-
Certificate Store
- Trusted Root Certification Authorities used to install certificates
-
VPN Configuration
- Navigation path: Manage > Connectivity > VPN
-
Site-to-Site VPN Host Configuration
- Use Network Address Object
-
VPN Encryption
- Default method for IKE phases: SHA1
-
Group VPN Policies
- Facilitate setup and deployment of multiple global VPN clients
-
LDAP Server
- Provides Active Directory Membership for user authorization
-
LDAP Schema
- Predefined schemas: Novel eDirectory and MS Active Directory
-
Static Routes
- Configured using: Zones and Services
- Take precedence over VPN traffic by default
-
Email Notifications
- Created using Automation feature
-
Log Setting
- "Configure Log" used to change event attributes globally with flexible match conditions
-
Protocol Monitor
- Displays information about: Ingress/Egress ARP Rate, Ingress/Egress IPV4 Rate, and Ingress/Egress TCP Rate
-
Global IPs and Anti-Spyware Threats
- SonicWall provides two management methods: Prevent All and Detect All
-
Outbound Failover Mechanisms
- SonicWall provides two mechanisms: Round Robin and Spillover-Based Ratio
-
App Control Advanced Settings
- Navigation path: Manage > Policies > Rules > App Control > App Control Advanced
-
App Control Best Practices
- Enable logging per application as needed
- Assign common access rules to all users, regardless of groups
-
Role-Based Security Management
- Enabled through Single Sign-On (SSO) implementation
-
DPI-SSL Enablement
- SonicOS navigation path: Manage > Decryption Service > DPI-SSL/TLS Client
-
DPI-SSL Support
- Supports TLS 1.2 protocol
-
SSL-VPN Configuration
- SonicOS navigation path: Manage > Connectivity > SSL-VPN
-
Route-based VPN Security Policy
- Select Tunnel Interface policy type
-
Capture ATP
- Requires AntiVirus service to be enabled
-
Address Object Types
- Network, Range, and Host
-
Virtual Interfaces
- Enable using SonicWall Getting Started Guide or MySonicWall.com
-
Logging Level Filter
- If set to Error, Critical, Alert, and Emergency alert types will also be displayed
-
Public Server Wizard Default Server Types
- Citrix ICA Server, Mail Server, and Web Server
-
LAN > WAN Access Rule Modification
- Changing the default rule from "Allow" to "Deny" blocks outbound WAN traffic
- LAN users cannot access the internet but the appliance can still register with MySonicWall.com and update UTM signatures
-
Filtering Option for Excluding Events at Lower Priority
- Logging Level
-
Static Route Configuration Variables
- Default Gateway, Metrics, Source and Destination Addresses
-
System Schedule Options in SonicOS
- Once, Recurring, and Mixed
-
Stateful HA
- Recommended to leave "Enable Preempt Mode" unchecked
-
Packet Monitor Traffic
- Monitors Encrypted Packets, Multicast packets that are replicates, and IP Helper-generated packets
-
Threat Protection Panel
- Displays information about Spyware blocked, viruses blocked, and intrusions prevented
-
Dynamic OSF Routing Enablement
- Change the routing mode to Advanced Routing on the Settings tab
-
DPI-SSL Traffic Examination
- DPI-SSL examines SSL traffic regardless of the port number
-
HA Interfaces Tab
- Used to define the mode for the primary firewall
-
HA Configuration Navigation Path
- Manage > High Availability > Base Setup
-
DPI-SSL Bypass Setting
- "Allow SSL without decryption (bypass) when connection limit exceeded" setting allows new connections to bypass decryption instead of being dropped when the connection limit is crossed
-
Failover and Load Balancing Configuration
- SonicOS navigation path: Manage > Network > Failover & Load Balancing
-
App Rule Policy Conditions
- Represented by Match Object type
-
Intermediate Traffic
- Packets captured by SonicWall Packet Monitor
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Sonicwall SNSA