SonicWALL Secure Wireless Network



Similar documents
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2?

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Move over, TMG! Replacing TMG with Sophos UTM

Dell SonicWALL Portfolio

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Release Notes. SonicOS is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

SSL-VPN 200 Getting Started Guide

Clean wireless. High-performance clean wireless solutions

SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control

Platform Compatibility... 1 Key Features... 2 Known Issues... 4 Upgrading SonicOS Image Procedures... 6 Related Technical Documentation...

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. Get Started Now: to learn more.

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Clean wireless. High-performance clean wireless solutions

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Using SonicWALL NetExtender to Access FTP Servers

Clean VPN Approach to Secure Remote Access

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Best Practices in Deploying a Secure Wireless Network

Next Gen Firewall and UTM Buyers Guide

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Achieving PCI-Compliance through Cyberoam

Keeping your VPN protected

Clean VPN Approach to Secure Remote Access for the SMB

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Simple security is better security Or: How complexity became the biggest security threat

Deploying Cisco ASA VPN Solutions Exam.

SonicWALL PCI 1.1 Implementation Guide

Virtual Private Network (VPN)

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

Designing a Windows Server 2008 Network Infrastructure

1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:

Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

SonicWALL Corporate Design System. The SonicWALL Brand Identity

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues...

Network protection and UTM Buyers Guide

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

PortWise Access Management Suite

Global VPN Client Getting Started Guide

Is Your Network Ready for VoIP?

Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading

Managed Services. Business Intelligence Solutions

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

Securing the Small Business Network. Keeping up with the changing threat landscape

PCI Solution for Retail: Addressing Compliance and Security Best Practices

The Fortinet Secure Health Architecture

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

DIGIPASS Authentication for SonicWALL SSL-VPN

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

Application Intelligence, Control and Visualization

Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

Securing the Service Desk in the Cloud

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

13 Ways Through A Firewall

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Sophos Roadshow. Complete Security Vision

Product Line Brochure

Best Practices for Outdoor Wireless Security

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Contents. Platform Compatibility. Browser Support. SonicOS

NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation

Contents. Release Purpose. Platform Compatibility. SonicOS TZ 105 / TZ 205 Series Release Notes. SonicOS

Simplify Your Network Security with All-In-One Unified Threat Management

The User is Evolving. July 12, 2011

D-View 7 Network Management System

PortWise Access Management Suite

NX 9500 INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD

The Fortinet Secure Health Architecture

PCI v2.0 Compliance for Wireless LAN

Analyzer 7.1 Administrator s Guide

Payment Card Industry Data Security Standard

Developing Network Security Strategies

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Cisco Small Business ISA500 Series Integrated Security Appliances

Who s Endian?

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

WatchGuard SSL 2.0 New Features

SonicWALL Security Dashboard

How To Secure Your Store Data With Fortinet

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

Clavister InSight TM. Protecting Values

COMPREHENSIVE INTERNET SECURITY. SonicWALL Secure Wireless Solution. SonicPoint and SonicPoint G Getting Started Guide

How to configure WFS (Windows File Sharing ) Acceleration on SonicWALL WAN Acceleration Appliances

SonicOS Release Notes

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

The Bomgar Appliance in the Network

Transcription:

SONICWALL Ä SonicWALL Secure Wireless Network Integrated Solutions Guide ^ Official guide from SonicWALL Written by SonicWALL engineers and documentation specialists Appropriate for all audiences, from the small proprietor to the enterprise IT specialist A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings Joe Levy KhaiTran Patrick Lydon Jeremy Pollock Dave Parry Susan Weigand with Zhong Chen, Hung Ha, John Gmuender, Mike Massing SYNGRESS

Preface xj Approaching Security by Joe Levy xj Using This Book xvjj Abstract Intended Audience lcons '.'.'. xv x '.'.'.'.'.'. '.'.'. '. j jx xx Part 1: Planning Chapter 1: Introduction to Secure Wireless Networking 1 Introduction A Short History of Wireless Security Standards and Technology The Growth of Internet Usage The Evolution of Malware Top Five Wireless Threats Chapter Knowledge Check i 2 7 g 15 22 Chapter 2: Planning Wireless Access Point Deployments Introduction Choosing a Wireless Standard Preparing the Deployment Site Wireless Firewalling Placing the Access Points Wireless Antennas SonicPoints and Switches Chapter Knowledge Check Chapter 3: Creating and Defining a Network Security Policy Introduction What Is a Security Policy? Infrastructure Elements Controlling the Wireless Space User Authentication 25 25 26 28 31 32 43 50 52 55 55 56 56 63 64

User Training 69 Controlling Spam and Email Threats 70 Data Protection and Backup 70 Protecting Users with Unified Threat Management 70 Chapter Knowledge Check 77 Chapter 4: Wireless Solutions for Vertical Markets 79 Introduction 79 Technology Overview 80 Education 82 Healthcare 85 Retail and Hospitality 88 Government 91 Regulatory and Compliance Requirements 93 Chapter Knowledge Check 99 Part 2: Designing Chapter 5: SonicWALL Product Solutions Library 105 Introduction 105 SonicWALL UTM Products 106 SonicWALL Wireless Enabler Products 107 SonicWALL Secure Remote Access Products 108 SonicWALL Global Management System Products 109 Chapter Knowledge Check 110 Chapter 6: Three Phases for a Secure Wireless Network 111 Introduction 111 Three Phases Overview 112 Phase 1: Deploying Gateway UTM Services 114 Phase 2: Deploying VPN Solutions 127 Phase 3: Scaling with SonicWALL GMS 142 Chapter Knowledge Check 147 Chapter 7: Designing for User Segmentation 149 Introduction 149 Zone Security 150 Address Objects 152 User Authentication Mechanisms 157 Going Virtual with LANs and WLANs 170 Application Firewall 174 Wireless User Class Implementation Examples 178 Chapter Knowledge Check 183

Part 3: Implementing Phase 1: Deploying the UTM Gateway 187 Chapter 8: Configuring SonicWALL UTM Gateway Appliances 189 Introduction 189 Using the SonicOS Management Interface 190 Configuring Basic Settings 192 Licensing Security Services 196 Configuring Security Services 197 Configuring Enforced Client Anti-Virus Endpoint Security 207 Advanced Gateway Configuration Options 209 Chapter Knowledge Check 216 Chapter 9: Configuring User Segmentation 219 Introduction 219 Configuring Global User Settings 220 Configuring Local Users and Groups 224 Configuring RADIUS Authentication 228 Configuring LDAP Integration 228 Configuring Single Sign-On 228 Using Dynamic Address Objects 240 Extending the VLAN to Wireless with VAPs 245 Configuring Application Firewall 245 Chapter Knowledge Check 251 Chapter 10: Configuring Distributed Wireless Devices 255 Introduction 255 Deployment Checklist 256 Best Practices 256 Configuring an Interface with a WLAN Zone 259 Configuring Physical and Virtual Interfaces 264 External Authentication 265 Managing SonicPoints after Initial Configuration 273 Configuring a Secure Wireless Bridge 278 Chapter Knowledge Check 281 Chapter 11: Configuring Wireless Guest Services for Hotspots... 283 Introduction 283 Free Wi-Fi Hotspot Access 284 Typical WGS Deployment Scenario 285 Custom Authentication Interfaces with LHM 286 Managing Guest Services and Guest Accounts 301 Adding Guest Accounts 304 Chapter Knowledge Check 308

Chapter 12: Configuring Virtual Access Points 311 Introduction 311 SonicPoint VAP Configuration Overview 312 Thinking Critically about VAPs 326 Deploying VAPs to a SonicPoint 329 Chapter Knowledge Check 332 Chapter 13: Configuring RF Monitoring and Protection 335 Introduction 335 Wireless Intrusion Detection Services 336 Enabling RF Monitoring on SonicPoints 339 Using the RF Monitoring Interface 339 Types of RF Threat Detection 342 Practical RF Monitoring Field Applications 343 Chapter Knowledge Check 345 Phase 2: Deploying Secure Remote Access Solutions 347 Chapter 14: Configuring Secure Remote Access Solutions 349 Introduction 349 Connecting with SonicWALL NetExtender 350 Configuring Two-Factor Authentication 352 Deploying One-Time Password (OTP) Security 354 Deploying Virtual Assist 357 Configuring the SonicWALL Global VPN Client 358 SonicWALL / Aventail Connect Mobile Client Integration 362 Chapter Knowledge Check 364 Phase 3: Deploying Centralized Management Solutions 367 Chapter 15: Configuring SonicWALL Global Management System 369 Introduction 369 Deploying SonicWALL GMS for Centralized Management 370 Adding Appliances to SonicWALL GMS 371 Managing Appliances with SonicWALL GMS 373 Chapter Knowledge Check 377 Part 4: Optimizing Chapter 16: Optimizing Your Secure Wireless Network 381 Introduction 381 Customizing Real-Time Reports and Email Alert Notifications 382 Monitoring Your Wireless Network 397 Chapter Knowledge Check 400

Appendices Appendix A: Configuring External Authentication Servers 405 Introduction 405 Configuring RADIUS Authentication 405 Configuring LDAP Integration 409 Configuring LHM Integration 419 Appendix B: SonicWALL Knowledge Check 435 Appendix C: Answers to SonicWALL Knowledge Check 445 Answers 445 Rankings 461 References 463 Acknowledgements 471 Lead Authors 471 Contributing Authors 472 Technical Reviewers 473 List of Figures 475 Index 477