1 SonicWALL Security Appliance Administrator Guide Version 7.3 SonicWALL, Inc Logic Drive San Jose, CA Phone: Fax: Part Number: Rev B
2 CHAPTER 1 About this Guide Preface SonicWALL s threat protection solution is a dynamic, self-learning, and self-running system, providing IT departments with the protection they need for inbound and outbound . SonicWALL Security offers redundancy, comprehensive reporting and central administration across multiple data centers. The solution scales for organizations with 10 employees to enterprises with 100,000 or more employees. This guide describes how to configure SonicWALL Security and the SonicWALL Security appliances. Information that is specifically about SonicWALL Security appliances is indicated by a footnote at the bottom of the page. Documentation Conventions Font Bold Italic Courier Bold Courier Meaning Terms you see in a SonicWALL Security window Variable names Text on a command line Text that you type in a command line Documentation Overview Finding Online Help SonicWALL Security provides Administrator s Guides, Getting Started Guides, and User s Guides to help in the installation, administration, and use of its products to protect users from phishing, spam, viruses, and to manage the security policies you define for your organization. Click the What is this? button for in-depth online help on a specific area of the SonicWALL Security interface. Click the Help button on any UI web page for information on how to use the UI features on that page.
3 Planning SonicWALL Security Deployment CHAPTER 2 Determine the appropriate architecture for SonicWALL Security before you deploy it in your network. This section discusses the different modules available in SonicWALL Security and network topology planning. Note For installation and set up instructions for your SonicWALL Security appliance, refer to the SonicWALL Security Series Getting Started Guide document. SonicWALL Security and Mail Threats SonicWALL Security determines that an fits only one of the following threats: Spam, Likely Spam, Phishing, Likely Phishing, Virus, Likely Virus, Policy Violation, or Directory Harvest Attack (DHA). It uses the following precedence order when evaluating threats in messages: Virus Likely Virus Policy Trigger Phishing Likely Phishing Spam Likely Spam For example, if a message is both a virus and a spam, the message will be categorized as a virus since virus is higher in precedence than spam. If SonicWALL Security determines that the message is not any of the above threats, it is deemed to be good and is delivered to the destination server. Licensing SonicWALL Security Modules SonicWALL Security provides multiple modules to protect an organization s gateway. When you activate SonicWALL Security, the following modules are licensed: Security Base Key (Server Configuration, Policy & Compliance, User & Group Management, Junk Box, and Reports & Monitoring) Protection Subscription and Dynamic Support (Anti-Spam Anti-Phishing) In addition, you can optionally license one or more of the following modules for an additional cost: Compliance Subscription (compliance functionality under Policy and Compliance) SonicWALL Anti-Virus (McAfee and SonicWALL Time Zero) Subscription SonicWALL Anti-Virus (Kaspersky and SonicWALL Time Zero) Subscription
4 SonicWALL Security Administrator s Guide 9 SonicWALL recommends that you deploy SonicWALL Security with one or both of the antivirus modules to provide the best protection and management capabilities for your organization s inbound and outbound traffic. Defining SonicWALL Security Deployment Architecture SonicWALL Security can be configured in two ways: All in One: In this configuration, all machines running SonicWALL Security analyze , quarantine junk mail, and allow for management of administrator and user settings. A typical All in One configuration: In an All in One configuration, you can also deploy multiple SonicWALL Security servers in a cluster setup wherein all of the gateways share the same configuration and data files. To set up such a cluster, begin by creating a shared directory, on either one of the SonicWALL Security servers or on another dedicated server (preferred) running the same operating system. This shared directory will be used to store data including user settings, quarantine , etc., from all the SonicWALL Security servers in the cluster. Split: In a Split network configuration, there are two kinds of servers: Control Centers and Remote Analyzers. In this configuration there is typically one Control Center and multiple Remote Analyzers, but the Control Center can be set up in a cluster as well. The Split configuration is designed for organizations with remote physical data centers. The Split configuration allows you to manage SonicWALL Security so that messages are filtered in multiple remote locations through multiple Remote Analyzers. The entire setup is centrally managed from a single location through the Control Center.
5 SonicWALL Security Administrator s Guide 10 Control Center clusters are not supported by SonicWALL Security appliance. The Control Center, in addition to managing all data files, controls, monitors and communicates with all Remote Analyzers. The data files consist of statistical data such as how much has been received, network usage, remote hardware space used, and hourly spam statistics. The Control Center stores or quarantines junk it receives from the Remote Analyzers. It also queries LDAP servers to ensure valid users are logging in to SonicWALL Security. End users can log in to a Control Center to manage their junk mail. Remote Analyzers analyze incoming to determine whether it is good or junk. It sends junk to the Control Center where it is quarantined. It routes good mail to its destination server. Only administrators can log in to a Remote Analyzer. Note: The Replicator is the SonicWALL Security component that automatically sends data updates from the Control Center to the Remote Analyzer, ensuring that these components are always synchronized. Replicator logs are stored in the Control Center s logs directory. You can review replication activity from these logs for troubleshooting purposes. Inbound and Outbound Flow SonicWALL Security can process both inbound and outbound on the same machine. In an All in One configuration, each SonicWALL Security instance can support both inbound and outbound . In a Split configuration, each Remote Analyzer can support both inbound and outbound . For inbound flow, DNS configuration and firewall rules need to be set to direct traffic to SonicWALL Security. Whereas, for outbound flow, the downstream server must be configured to send all to Security (Smart Host Configuration).
6 SonicWALL Security Administrator s Guide 11 Proxy versus MTA SonicWALL Security can run either as an SMTP proxy or an MTA (Mail Transfer Agent). The SMTP proxy operates by connecting to a destination SMTP server before accepting messages from a sending SMTP server. Note that SMTP proxies can only send to one server. Some benefits of the SMTP proxy are: All processing occurs in memory, significantly reducing the latency and providing higher throughput There is no queue and SonicWALL Security does not lose any messages. SonicWALL Security automatically respects your existing fail over strategies if your mail infrastructure experiences a failure. The MTA service operates by writing messages to disk and allows for routing of a message. Some benefits of the MTA are: Can route messages to different domains based on MX records or LDAP mapping. Can queue messages by temporarily storing messages on disk and retrying delivery later in case the receiving server is not ready. Allows SonicWALL Security to be the last touch mail gateway for outbound traffic Should You Choose an All in One or a Split Architecture? SonicWALL recommends the All in One configuration whenever possible because of its simplicity. Choose a Split configuration to support multiple physical data centers and if you want to centrally manage this deployment from a single location. SonicWALL strongly recommends that after you deploy the chosen architecture, you do not change the setup from a Control Center to a Remote Analyzer or vice versa, as there are no obvious advantages, and some data might be lost. Thus, it is important to make the deployment architecture decision before installing SonicWALL Security.
7 SonicWALL Security Administrator s Guide 12 Typical SonicWALL Security Deployments SonicWALL Security as the First-Touch / Last-Touch Server In a deployment with first-touch and last-touch in the DMZ, change your MX records to point to the SonicWALL Security setup. Also, all the inbound and outbound connections (typically port 25) for SonicWALL Security must be properly configured in your firewalls. In this configuration, SonicWALL Security can be configured on the inbound path to be either a SMTP Proxy or a MTA. On the outbound path, it must be configured to be a MTA. This setup also can be extended to a cluster with multiple SonicWALL Security servers all using a shared drive for data location. For more information on routing using Smart Host, refer to Adding an Inbound Mail Server for All in One Architecture on page 19. To configure SonicWALL Security in this configuration, you also need to: 1. Configure SonicWALL Security server with a static IP address on your DMZ. 2. In your firewall, add an inbound NAT Rules s private IP address to an Internet addressable IP address for TCP port 25 (SMTP). 3. In the public DNS server on the Internet, create an A record, mapping a name such as smtp.my_domain.com, to the Internet addressable IP address you assigned in step Update your domain s MX record to point to the new a record. You need to deploy the SonicWALL Security for each MX record.
8 SonicWALL Security Administrator s Guide 13 SonicWALL Security Not as a First-Touch / Last Touch Server A network topology where Security is not the first-touch and last-touch SMTP server. is not recommended because security mechanisms such as SPF and Connection Management cannot be used. In this configuration SonicWALL Security can be configured to be either an MTA or a proxy.
9 CHAPTER 3 Getting Started Introduction This chapter describes configuring SonicWALL Security to match your environment and user needs. Notes: Initial Configuration Configure your web browser s pop-up blockers to allow pop-ups from your organization s SonicWALL Security server before using SonicWALL Security, because many of the windows are pop-up windows. For security purposes, SonicWALL Security terminates your session if there is no activity for 10 minutes. You must log in again if this occurs. SonicWALL Security Master Account Logging In Each SonicWALL Security setup has a Master Account which is a master administrative account. You use this account to initially configure the server, configure for LDAP synchronization and assign administrative privileges to other accounts. The Master Account s user name is admin and the password is password. Log in to your SonicWALL Security as a user with administrator privileges. Example: To log in with the Master Account, type User Name: admin Password: password The first time you log in to the SonicWALL Security system, you go to the license settings screen where you can: Change Account password Confirm license keys in the License Management section Perform Quick Configuration of the system
10 SonicWALL Security Administrator s Guide 15 Change Master Account Password Quick Configuration After you login using the Master Account, you can change the password. SonicWALL strongly recommends that you change the Master Account password. To change password 1. Type admin for the username. 2. Type a new password in the Password text box. 3. Type the same password in the Confirm password text box. 4. Click Apply Changes. If you plan to install SonicWALL Security in an All in One Configuration for inbound and outbound message processing with only one downstream server, no SSL, and routine LDAP options, click the Quick Configuration link from the License Management window. Quick Configuration allows you to set up SonicWALL Security in a default configuration. Quick Configuration also allows you to choose whether to quarantine junk messages in the Junk Box or to pass messages through to users. However, Quick Configuration requires that you configure all modules similarly; that is, if you store spam messages in the Junk Box, you must also store messages with viruses in the Junk Box. Note: If you have previously configured your SonicWALL Security with more complex settings than are supported by Quick Configuration, an alert will appear. If this alert window or a similar alert window appears, you must either configure all of the modules to pass through without filtering or to store it in the Junk Box. To configure SonicWALL Security using the Quick Configuration window, select the radio buttons and enter values for the following configuration variables: 1. Network Architecture 1. Enter the Inbound Destination server name or IP address and port number. 2. Select the Inbound SMTP setup: Allow SMTP recipient addresses to all domains Only allow SMTP recipients addresses to these domains and enter the domains 3. Click Test Mail Servers to determine that the flow of from the SonicWALL Security server to downstream mail server is able to process Select the Outbound Path setup checkbox if the specified Inbound Destination Server will be the only server passing outbound messages to SonicWALL Security. 2. LDAP Configuration 1. Add your LDAP Server name or IP address. This is the hostname or IP address of the LDAP server. Frequently, this is the name of your Exchange server or your server. 2. Select the LDAP Server type from the drop-down list. 3. Enter your Login name in the format indicated by the type of LDAP server. Active Directory - The login name is commonly of the form domain\username; for example: sales\john Exchange The login name is commonly of the form CN=username, for example: CN=john
11 SonicWALL Security Administrator s Guide 16 Note: To use NTLM authentication, add the LDAP domains on the LDAP configuration page. Lotus Notes/Domino - The login name is commonly of the form username, for example: john SunOne/iPlanet - The login name can either be the exact string "CN=Directory Manager" or a user's X.400-style login. Consider both examples below: CN=Directory Manager UID=john,OU=people,O=xyz.com,O=internet For Other LDAP Servers, see the documentation that shipped with that product. 4. Enter your password. 5. Click the Test LDAP Login button to ensure that LDAP you can log in to your LDAP server. 6. Click the Test LDAP Query button to ensure that LDAP you can query your LDAP server. 7. Enter the Windows NT/NetBIOS domain name if you have an Active Directory or an Exchange 5.5 server. 3. Message Management 1. Select the action SonicWALL Security should take for messages identified as junk: Click Quarantine junk to cause SonicWALL Security to store all messages in the Junk Box. Click Deliver all messages to users to allow all messages to pass through to users without filtering for threats. 4. Junk Box Summary 1. Check the Send summaries daily check box to send users daily summaries of their quarantined , if you selected Quarantine junk in step Check the Users can preview their own quarantined junk mail check box to allow users to preview their junked messages. 3. Enter the URL for the user view. This text box is filled in automatically based on your server configuration and is included in the Junk Box Summary Click Test this Link to ensure that you have configured a link for users to connect to SonicWALL Security. 5. Updates 1. Click the Test Connectivity to SonicWALL button to ensure that you can connect to the SonicWALL Security data center. Click Apply Changes to save your Quick Configuration settings. Your server is now ready to process messages and stop threats. Understanding the SonicWALL Security User Interface The upper right corner displays the role of the user logged in: Admin, Manager, Help Desk, Group Admin or User. See SonicWALL Security Roles on page 3 for more information about roles. The current login name is displayed next to the role. Use the left navigation pane to select the different modules, such as spam management or server configuration. Each button brings up a unique menu on the left side. Click the links on the lower margin of the window for the following information: Contact us: Click this link for a Contact Technical Support form and other support information. About: Click this link to display a window that contains information about SonicWALL Security.
12 SonicWALL Security Administrator s Guide 17 Sign in as any user: Click this link if you are signed in as the administrator and would like to login as a user. System host name: SonicWALL Security can run on more than one server. The lower right corner of your window displays the host name for the server to which you are currently logged in. Language: Click this drop-down box to change SonicWALL Security s user interface in any of the languages shown in the Preferred Languange section. By default, SonicWALL Security automatically senses the language that you have configured your Web browser. Automatically Download Updates for SonicWALL Security To provide the best protection against latest threats, SonicWALL periodically releases updates to its software. SonicWALL recommends that you keep your software version up-to-date to ensure that you get the best protection available. Configuring Spam, Phishing, and Virus Updates Updates To configure automatic software downloads for SonicWALL Security servers that run All in One configuration on Windows 1. Click System > Updates. SonicWALL Security displays the Updates window. 2. Select the time interval from the Check for Spam, Fraud, and Virus Blocking Updates drop-down list to configure how often to receive junk-blocking updates. 3. Check the Submit unjunk thumbprints check box to send unjunked thumbprints to SonicWALL Security s Research Laboratory. Note: When users unjunk a message, a thumbprint of that message can be sent to SonicWALL Security. These unjunked messages are used to improve the collaborative settings for all users, which tracks new trends in spam and other junk , and helps prevent unwanted . The thumbprints sent optionally from SonicWALL Security contain absolutely no readable information. 4. Check the Submit generic spam blocking data check box to send spam-blocking data to SonicWALL Security s Research Laboratory. Generic spam blocking data is sent to SonicWALL Security to assist in customer support and to help improve spam blocking. No messages, content, header information or any other uniquely identifiable information is ever sent. Sample information that is sent includes the following data: Volume of messages processed and junked Success of various junking methods Number of users protected When a new SonicWALL Security software update becomes available, the SonicWALL Security appliance automatically downloads the update and alerts the administrator via that it is available. Upon logging in to the SonicWALL Security administrative interface, a pop-up screen displays, prompting the administrator to either click to update now or wait to update later. Note The administrator should choose the appropriate time to complete the update while considering the delay in traffic flow. The installation will take less than ten minutes. Once the Update Now button is selected, the update file is extracted. When the process is complete, the SonicWALL Security appliance will automatically reboot.
13 SonicWALL Security Administrator s Guide 18 Note: SonicWALL recommends that you download and install major updates as soon as possible. Windows OS For Windows based installations, when a minor software update is available, SonicWALL Security automatically downloads the newer version and alerts the administrator that a newer version is available and can be installed. If you want to use the Update Now button to upgrade the software and you are administering the system from a remote machine, you must install Java Runtime Environment (JRE) 1.4.2_05 or later from on the remote machine first. If you are running SonicWALL Security with a load balancer, you must log in directly to the server on which SonicWALL Security runs to update the software. Using SafeMode SafeMode is a fall back option when a normal upgrade fails to patch and the administrator wants to restore the appliance using a different image. Warning This is not a function that administrators should choose unless a patch installation from the UI has failed. To restore the appliance using SafeMode, perform the following steps: 1. Reboot the appliance to view the GRUB loader options. Either connect a console and keyboard to the appliance or use the serial port and redirect the output to another system. The GRUB menu allows the administrator to chose which firmware image to boot. Available options are the following: " Security SonicWALL MFL" - the default option which boots into current Security firmware "SonicWALL MFL [Verbose Startup Mode]" - this option boots the same firmware as above, but outputs debugging information on startup "SonicWALL Authentication Reset" - this option allows administrative credentials to reset to default values "SonicWALL Safe Mode" - boots into special firmware image, which allows a firmware update to perform, in case normal update procedure resulted in an unbootable firmware. 2. Using the arrow keys on your keyboard, select the Safe Mode option to boot into SafeMode and display the command line option to set the IP, subnet mask, and gateway. 3. Access the SafeMode user interface by entering the URL in the browser as for example 4. Use the Browse button to point to the firmware to be imaged. 5. Click the Upload button to upload the file. 6. Click the Reboot button. The system reboots and the information posts back on the web browser.
14 CHAPTER 4 System Introduction In this chapter, you will learn how to configure the system more extensively and learn more about additional system administration capabilities. This chapter contains the following sections: Setting Your Network Architecture on page 19 LDAP Configuration on page 25 Default Message Management Settings on page 30 Junk Box Summary on page 31 User View Setup on page 32 Updates on page 33 Monitoring on page 33 Connection Management on page 36 Backup/Restore Settings on page 44 Host Configuration on page 45 Configuring Advanced Settings on page 46 Branding on page 48 Setting Your Network Architecture There are different ways to configure and deploy SonicWALL Security, and the first decision to make is the choice of network architecture. See Planning SonicWALL Security Deployment on page 8 for more information on what network architecture is appropriate for your need. You must decide whether you are setting up a Split or All in One architecture, as that choice impacts other configuration options. You can change the architecture later, but if you do so, you will need to add your mail servers and reset configuration options again. To configure SonicWALL Security as your desired network architecture, click System > Network Architecture. Adding an Inbound Mail Server for All in One Architecture Set this server to All in One configuration by choosing the radio button next to All in One. Click the Add Path button in the Inbound Flow section. The Add Inbound Path window appears.
15 SonicWALL Security Administrator s Guide 20 Source IP Contacting Path! 1. In this section you can configure from where you accept . You can choose to Accept connections for all senders. Use of this setting can make the product an open relay. SonicWALL Security strongly recommends against an open relay. Open relays can reduce the security of your network and allow malicious users to spoof your domain. Accept connections for all senders sending to the specified domains. Accept connections from the specified senders 2. Path Listens On. In this section, you can specific which IP addresses and port number the service is listening on for incoming . Listen for all IP address on this port - This is the typical setting for most environment as the service listens on the specified port using the machine s default IP address. The usual port number for incoming traffic is 25. Listen only on this IP address and port - If you have multiple IP addresses configured in this machine, you can specify which IP address and port number to listen on. 3. Destination of Path. In this section, you can specify the destination server for incoming traffic in this path. This is a proxy. Pass all to destination server - This setting configures this path to act as a proxy and relay messages to a downstream server. If the downstream server is unavailable, incoming messages will not be accepted. This is an MTA. Route using SmartHost to destination server - This setting is the same as the above Proxy option, except that incoming messages will be accepted and queued if the downstream server is unavailable. In this instance, this path acts as a SMTP smarthost. However, you can configure the following domain exceptions: - These domains should use MX record routing Instead of being routed to the destination server specified above, messages sent to the domains listed in this box are routed using MX record routing. For example, the default downstream server is an Exchange server at IP address All mail is routed directly to that Exchange server with two exceptions: addressed to mailfrontier.com or mailfrontier.net is routed using MX records. - These domains should use the associated IP address or hostname Instead of being routed to the destination server specified above, sent to the domains listed in this box are routed to the associated IP address or hostname. For example, the default downstream server is an Exchange server at IP address All mail is routed directly to that Exchange server with two exceptions: addressed to engr.sonicwall.com is routed directly to IP address , and addressed to sales.sonicwall.com is routed directly to IP address This is an MTA. Route using SmartHost with load balancing to the following multiple destination servers - When a path is configured with this choice, messages received will be routed to multiple downstream servers as follows. If Round robin is specified, will be load-balanced by sending a portion of the flow through each of the servers specified in the text box in round-robin order. All of the servers will process all the time. If Fail over is specified, the first server listed will handle all processing under normal operation. If the first server cannot be reached, will be routed through the second server. If the second server cannot be reached, will be routed through the third server, and so on. MTA with MX record routing - This setting configures this path to route messages by standard MX (Mail Exchange) records. To use this option, your DNS server must be configured to specify the MX records of your internal mail servers that need to receive the .
16 SonicWALL Security Administrator s Guide 21 Note: MTA with MX record routing (with exceptions) - This setting configures this path to route messages by standard MX (Mail Exchange) records, except for the specified domains. For the specified domains, route messages directly to the listed IP address. You can specify addresses in addition to domains in this routing table. Also, hostnames can be specified instead of IP addresses. For example, if you want to route customer service s to one downstream server and the rest of the traffic to a different downstream server, you can specify something like: mycompany.com internal_mailserver.mycompany.com 4. Advanced Settings 5. Use this text instead of a host name in the SMTP banner - Use this text to customize the HELO banner. By default, the fully qualified domain name will be used 6. Set the action you want to take for messages for recipients who are not listed in your LDAP server. Typically, it is a good practice to set this path to adhere to corporate settings. 7. Enable StartTLS on this path - Check this check box if you want a secure internet connection for . If the check box is checked, SonicWALL Security uses Transport Layer Security (TLS) to provide the secure internet connection. When StartTLS is enabled, can be sent and received over a secure socket. The source and destination addresses and the entire message contents are all encrypted during transfer. 8. Click Add to add an inbound path for this All in One server. Adding an Outbound Mail Server for All in One Architecture 1. Click the Add Path button in the Outbound Flow section. The Add Outbound Path window appears. 2. Source IP Contacting Path. In this section, you can specify which servers within your organization can connect to this path to relay outgoing . Any source IP address is allowed to connect to this path - This setting configures this path to receive outgoing from any server. Using this option could make your server an open relay. Only these IP addresses can connect and relay - This setting configures this path to accept only from the specified IP addresses. Note: You need to use this setting if you configure your SonicWALL Security installation to listen for both inbound and outbound traffic on the same IP address on port Path Listens On. In this section, you can specify the IP addresses and port number on which this path listens for connections. Listen for all IP address on this port - This is the typical setting for most environment as the service listens on the specified port using the machine s default IP address. Listen only on this IP address and port - If you have multiple IP addresses configured in this machine, you can specify which IP address and port number to listen to. 4. Destination of Path. In this section, you can specify the destination server for outgoing traffic in this path. This is a Proxy. Pass all to destination server - Use this setting if you want this path to act as a proxy and relay messages to an upstream MTA. Enter the host name or IP address of the upstream MTA and the port on which it should be contacted. If the upstream MTA is unavailable, outgoing messages will not be accepted. This is an MTA. Route using SmartHost to - This setting is same as the Proxy option above except that outgoing messages will be accepted and queued if the upstream MTA is unavailable.
17 SonicWALL Security Administrator s Guide 22 This is an MTA. Route using SmartHost with load balancing to the following multiple destination servers - When a path is configured with this choice, outbound messages will be routed to multiple upstream MTAs as follows. If Round robin is specified, will be load-balanced by sending a portion of the flow through each of the MTAs specified in the text box in round-robin order. All of the MTAs will process all the time. If Fail over is specified, the first MTA listed will handle all processing under normal operation. If the first MTA cannot be reached, will be routed through the second MTA. If the second MTA cannot be reached, will be routed through the third MTA, and so on. This is an MTA. Route using MX record routing - Use this setting to configure this path to route outbound messages by standard MX (Mail Exchange) records. This is an MTA. Route using MX record routing with these exceptions - Use this setting to configure this path to route outbound messages by standard MX (Mail Exchange) records except for the specified domains. For the specified domains, route messages directly to the listed IP address. 5. Advanced Settings Use this string instead of a host name in the SMTP banner - Use this string to customize the HELO banner. By default, the fully qualified domain name will be used. Adding a Server for Split Architecture If you chose Split Architecture, you must define whether the server is the Control Center or Remote Analyzer, and then let each know about the other. 1. Go to System > Network Architecture. 2. Choose Split. Adding a Control Center 3. Click Control Center to configure the server as a Control Center or click Remote Analyzer to configure the server as a Remote Analyzer. 4. Click Apply. To add a Control Center: 1. Click Add Server in the Control Center section of the Network Architecture window. 2. Enter the Control Center hostname. 3. If feasible, use the default port number. If not, enter a new Control Center Server Address Port Number. 4. Click Add. Adding a Remote Analyzer You must add one or more Remote Analyzers to a Split Configuration. Remote Analyzers can process inbound messages or outbound messages or both. 1. Click the Add Server button in the Inbound Remote Analyzer or Outbound Remote Analyzer section based on your need. 2. Enter the Remote Analyzer s hostname or IP address. 3. Enter the Remote Analyzer Server Address Port number. 4. If your network requires SSL, check the Requires SSL check box. 5. Click the Add button. Note: If there is a high volume of network traffic, it might take some time before the new Remote Analyzer is displayed in the System>Network Architecture window.
18 SonicWALL Security Administrator s Guide 23 Any changes you make at the Control Center are propagated to the Remote Analyzers you just added. You can monitor their status on the Reports page as well. Configuring Inbound Flow for a Remote Analyzer While logged into the Control Center, Click the Add Path button next to the Inbound Remote Analyzer. An Add Inbound Path window appears. Follow the instructions in Adding an Inbound Mail Server for All in One Architecture on page 19. Configuring Outbound Flow for a Remote Analyzer While logged into the Control Center, Click the Add Path button next to the Outbound Remote Analyzer. An Add Outbound Path window appears. Follow the instructions in Adding an Outbound Mail Server for All in One Architecture on page 21. Make sure that the Control Center can connect and relay messages through this path - Step 1 in the Add Outbound Path dialog. Configuring Remote Analyzers to Communicate with Control Centers After you have set up the Control Center, configure each Remote Analyzer so that it can communicate with its Control Center. 1. Log in to each server set up as a Remote Analyzer and go to Network Architecture. 2. Click the Add button to identify from which Control Center this Remote Analyzer will accept instructions. 3. An Add Control Center screen appears. Enter the hostname of your Control Center. If your Control Center is a cluster, you must add each individual hostname as a valid Control Center. Note: If your Control Center is a cluster, add each individual hostname as a valid Control Center by repeating steps 2-3. All other configuration options for the Remote Analyzer are managed by the Control Center. Deleting a Remote Analyzer from a Split Configuration Before deleting a Remote Analyzer, ensure there are no messages in the queue for quarantine 1. Stop SMTP traffic to the Remote Analyzer by turning off the SonicWALL Security Service. Click Control Panel>Administrative Tools>Services>MlfASG Software> Stop. 2. After a few minutes, view the last entry in the mfe log on the Remote Analyzer log. 3. View the mfe log in the Control Center logs directory to ensure the last entry in the mfe log for the Remote Analyzer is there: this can take a few moments. Turn off the ability of the associated server to send mail to this Remote Analyzer, and/or point the associated server to another installed and configured Remote Analyzer. Testing the Mail Servers Click the Test Mail Servers button. SonicWALL Security displays a window that indicates either a successful test or an unsuccessful test.
19 SonicWALL Security Administrator s Guide 24 Note: It takes 15 seconds for SonicWALL Security to refresh its settings. If the first test fails, try the test again. Changing from an All in One Configuration to a Split Configuration There are only two situations that warrant changing your configuration: You are a current SonicWALL Security customer running All in One architecture and want to upgrade to a Split Network configuration. You are a new customer and have incorrectly configured for All in One architecture and you want to configure for Split Network, or vice versa. Configure MTA You can configure the Mail Transfer Agent (MTA) Settings by navigating to the System>Network Architecture> MTA Configuration screen. You can specify how the MTA will handle a case in which Security is unable to deliver a message right away. Note that most installations will not require any change to the MTA settings. Delivery Messages are bounced if the recipient domain returns a permanent failure (5xxx error code). In the case of transient failures (4xx error codes, indicating a delay), the MTA will retry delivery of the message periodically based on the schedule specified in the Retry interval field. Delayed messages that cannot be delivered within the time period specified in the Bounce after field will be bounced; no further attempts will be made to deliver them. Non-Delivery Reports (NDR) When an cannot be sent due to either a transient delay or a permanent failure, the sender may receive a notification , or a Non-Delivery Report (NDR), describing the failure. Administrators can use this pane to customize the schedule and contents of those notification s. Transient Failure Settings To enable Transient NDR, select the Send NDR for transient failures check box. Specify the interval (days, hours, minutes) at which notifications are sent, the sender name and address (for example, Colin Brown and ), a customized subject line for the NDR (for example, Delay in sending your ), and a customized body for the NDR. Permanent Failure Settings Choose a name and address from which NDRs will be sent (for example, Colin Brown and ), a customized subject line for the NDR (for example, Your could not be sent ), and a customized body for the NDR. Note that Permanent Failure Settings cannot be disabled.
20 SonicWALL Security Administrator s Guide 25 General Settings All NDRs include a diagnostic report about the problem that prevented delivery, including the headers of the original message. Permanent NDRs may optionally have the contents of the original message attached. Customized Fields Certain fields in the subject line, body, and sender of the DSN can be specified by the administrator: $subject - the subject of the original $hostname - the hostname from which the NDR is sent $originator - the sender of the original $recipient - the intended recipient of the original $timequeued - the time at which the original was queued $date - the current date $retryafter - the interval at which delivery of delayed s is retried $bounceafter - the time after which delivery attempts will cease for delayed s Example Sender - Example Subject - Delivery Status Notification (re: $subject) Example Body - Your from $originator regarding $subject has bounced. It was sent on $timequeued to $recipient. No further attempts at delivery will be made. Have a nice day! Note: LDAP Configuration Some mail servers, such as Microsoft Exchange, may send their own NDRs or rewrite the contents of NDRs sent from other products. Please see the Administrator's Guide for information on integrating this product's NDR functionality with Microsoft Exchange. Address Rewriting Use this dialog to rewrite addresses for inbound or outbound s. These operations affect only the envelope (the RFC 2821 fields): the headers are not affected in any way. For inbound , the To field (the RCPT TO field) is rewritten. For outbound , the From field (the MAIL FROM field) is rewritten. Trusted Networks When the SonicWALL Security receives messages from an upstream server that uses a non-reserved or public IP address, the GRID Network effectiveness may degrade. To avoid this degradation on the GRID Network, users can put public IP addresses on a privatized list. To add IP addresses to a Trusted Network, click the Add Server button. In the box that displays, type in the IP addresses you want to add, then click Save. The IP addresses will now appear on the Server List. SonicWALL Security uses Lightweight Directory Access Protocol (LDAP) to integrate with your organization s environment. LDAP is an Internet protocol that programs use to look up users contact information from a server. As users and distribution lists are defined in your mail server, this information is automatically reflected in SonicWALL Security in real time. Many enterprise network use directory servers like Active Directory or Lotus Domino to manage user information. These directory servers support LDAP and SonicWALL Security can automatically get user information from these directories using the LDAP. You can run SonicWALL Security without access to an LDAP server as well. If your organization does not use a directory server, users cannot access their Junk Boxes, and all inbound is managed by the message-management settings defined by the administrator. SonicWALL Security uses the following data from your mail environment.
Barracuda Load Balancer Administrator s Guide Version 2.3 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2008, Barracuda Networks
Manual POLICY PATROL EMAIL MAIL SECURITY MANUAL Policy Patrol Email Mail Security This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
M86 MailMarshal Exchange USER GUIDE Software Version: 7.1 M86 MAILMARSHAL EXCHANGE USER GUIDE 2011 M86 Security All rights reserved. Published November 2011 for software release 7.1 No part of this Documentation
LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System
Trend Micro Incorporated reserves the right to make changes to this document and to Hosted Email Security described herein without notice. Before installing and using Hosted Email Security, please review
Kerio Connect Administrator s Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Connect, version 7.2. All additional modifications
Dell KACE K1000 Management Appliance Service Desk Administrator Guide Release 5.3 Revision Date: May 13, 2011 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and
4. Client-Level Administration Introduction to Client Usage The Client Home Page Overview Managing Your Client Account o Editing Your Client Record View Account Status Report Domain Administration Page
DocuFire for Windows User Manual Version: 5.20 Date: February 19, 2010 Web: http://www.docufire.com TABLE OF CONTENTS Introduction to DocuFire for Windows... 4 Contacting Technical Support... 4 Getting
June 17, 2013 Web Mail Guide Version 5.0.1 Client Services Table of Contents 1 Introduction to Web Mail... 4 1.1 Requirements... 4 1.2 Recommendations for using Web Mail... 4 1.3 Accessing your Web Mail...
ESET Remote Administrator Installation Manual and User Guide we protect your digital worlds contents Contents 1. Introduction... 4 2. ERA client/server architecture... 5 2.1 ERA Server (ERAS)...5 2.1.1
IceWarp Unified Communications IceWarp Outlook Sync User Guide Version 10.5 Printed on 20 December, 2012 Contents IceWarp Outlook Sync User Guide 1 Installation... 2 Installation Pre-requisites... 3 Installation
Cumulus 8.1 Administrator Guide Copyright 2010, Canto GmbH. All rights reserved. Canto, the Canto logo, the Cumulus logo, and Cumulus are registered trademarks of Canto, registered in the U.S. and other
SWsoft, Inc. Virtuozzo for Windows User's Guide Version 3.5 (c) 1999-2005 ISBN: N/A SWsoft Inc 13755 Sunrise Valley Drive Suite 325 Herndon, VA 20171 USA Tel: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright
FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski email@example.com All rights reserved. Redistribution
IceWarp Unified Communications Reference Version 11.1 Published on 11/4/2014 Contents... 4 About... 5 The Big Picture... 7 Reference... 8 General... 8 Dial Plan... 9 Dial Plan Examples... 12 Devices...
Iomega EZ Media and Backup Center User Guide Table of Contents Setting up Your Device... 1 Setup Overview... 1 Set up My Iomega StorCenter If It's Not Discovered... 2 Discovering with Iomega Storage Manager...
CLOUD INFRASTRUCTURE MANAGED VIRTUAL SERVER (DEDICATED) USER GUIDE WELCOME TO MANAGED VIRTUAL SERVER ON DEDICATED COMPUTE For sales, account set-up enquiries and technical support, contact your Telstra
Symantec Encryption Management Server Administrator's Guide 3.3 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.