SONICWALL Ä SonicWALL Secure Wireless Network Integrated Solutions Guide ^ Official guide from SonicWALL Written by SonicWALL engineers and documentation specialists Appropriate for all audiences, from the small proprietor to the enterprise IT specialist A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings Joe Levy KhaiTran Patrick Lydon Jeremy Pollock Dave Parry Susan Weigand with Zhong Chen, Hung Ha, John Gmuender, Mike Massing SYNGRESS
Preface xj Approaching Security by Joe Levy xj Using This Book xvjj Abstract Intended Audience lcons '.'.'. xv x '.'.'.'.'.'. '.'.'. '. j jx xx Part 1: Planning Chapter 1: Introduction to Secure Wireless Networking 1 Introduction A Short History of Wireless Security Standards and Technology The Growth of Internet Usage The Evolution of Malware Top Five Wireless Threats Chapter Knowledge Check i 2 7 g 15 22 Chapter 2: Planning Wireless Access Point Deployments Introduction Choosing a Wireless Standard Preparing the Deployment Site Wireless Firewalling Placing the Access Points Wireless Antennas SonicPoints and Switches Chapter Knowledge Check Chapter 3: Creating and Defining a Network Security Policy Introduction What Is a Security Policy? Infrastructure Elements Controlling the Wireless Space User Authentication 25 25 26 28 31 32 43 50 52 55 55 56 56 63 64
User Training 69 Controlling Spam and Email Threats 70 Data Protection and Backup 70 Protecting Users with Unified Threat Management 70 Chapter Knowledge Check 77 Chapter 4: Wireless Solutions for Vertical Markets 79 Introduction 79 Technology Overview 80 Education 82 Healthcare 85 Retail and Hospitality 88 Government 91 Regulatory and Compliance Requirements 93 Chapter Knowledge Check 99 Part 2: Designing Chapter 5: SonicWALL Product Solutions Library 105 Introduction 105 SonicWALL UTM Products 106 SonicWALL Wireless Enabler Products 107 SonicWALL Secure Remote Access Products 108 SonicWALL Global Management System Products 109 Chapter Knowledge Check 110 Chapter 6: Three Phases for a Secure Wireless Network 111 Introduction 111 Three Phases Overview 112 Phase 1: Deploying Gateway UTM Services 114 Phase 2: Deploying VPN Solutions 127 Phase 3: Scaling with SonicWALL GMS 142 Chapter Knowledge Check 147 Chapter 7: Designing for User Segmentation 149 Introduction 149 Zone Security 150 Address Objects 152 User Authentication Mechanisms 157 Going Virtual with LANs and WLANs 170 Application Firewall 174 Wireless User Class Implementation Examples 178 Chapter Knowledge Check 183
Part 3: Implementing Phase 1: Deploying the UTM Gateway 187 Chapter 8: Configuring SonicWALL UTM Gateway Appliances 189 Introduction 189 Using the SonicOS Management Interface 190 Configuring Basic Settings 192 Licensing Security Services 196 Configuring Security Services 197 Configuring Enforced Client Anti-Virus Endpoint Security 207 Advanced Gateway Configuration Options 209 Chapter Knowledge Check 216 Chapter 9: Configuring User Segmentation 219 Introduction 219 Configuring Global User Settings 220 Configuring Local Users and Groups 224 Configuring RADIUS Authentication 228 Configuring LDAP Integration 228 Configuring Single Sign-On 228 Using Dynamic Address Objects 240 Extending the VLAN to Wireless with VAPs 245 Configuring Application Firewall 245 Chapter Knowledge Check 251 Chapter 10: Configuring Distributed Wireless Devices 255 Introduction 255 Deployment Checklist 256 Best Practices 256 Configuring an Interface with a WLAN Zone 259 Configuring Physical and Virtual Interfaces 264 External Authentication 265 Managing SonicPoints after Initial Configuration 273 Configuring a Secure Wireless Bridge 278 Chapter Knowledge Check 281 Chapter 11: Configuring Wireless Guest Services for Hotspots... 283 Introduction 283 Free Wi-Fi Hotspot Access 284 Typical WGS Deployment Scenario 285 Custom Authentication Interfaces with LHM 286 Managing Guest Services and Guest Accounts 301 Adding Guest Accounts 304 Chapter Knowledge Check 308
Chapter 12: Configuring Virtual Access Points 311 Introduction 311 SonicPoint VAP Configuration Overview 312 Thinking Critically about VAPs 326 Deploying VAPs to a SonicPoint 329 Chapter Knowledge Check 332 Chapter 13: Configuring RF Monitoring and Protection 335 Introduction 335 Wireless Intrusion Detection Services 336 Enabling RF Monitoring on SonicPoints 339 Using the RF Monitoring Interface 339 Types of RF Threat Detection 342 Practical RF Monitoring Field Applications 343 Chapter Knowledge Check 345 Phase 2: Deploying Secure Remote Access Solutions 347 Chapter 14: Configuring Secure Remote Access Solutions 349 Introduction 349 Connecting with SonicWALL NetExtender 350 Configuring Two-Factor Authentication 352 Deploying One-Time Password (OTP) Security 354 Deploying Virtual Assist 357 Configuring the SonicWALL Global VPN Client 358 SonicWALL / Aventail Connect Mobile Client Integration 362 Chapter Knowledge Check 364 Phase 3: Deploying Centralized Management Solutions 367 Chapter 15: Configuring SonicWALL Global Management System 369 Introduction 369 Deploying SonicWALL GMS for Centralized Management 370 Adding Appliances to SonicWALL GMS 371 Managing Appliances with SonicWALL GMS 373 Chapter Knowledge Check 377 Part 4: Optimizing Chapter 16: Optimizing Your Secure Wireless Network 381 Introduction 381 Customizing Real-Time Reports and Email Alert Notifications 382 Monitoring Your Wireless Network 397 Chapter Knowledge Check 400
Appendices Appendix A: Configuring External Authentication Servers 405 Introduction 405 Configuring RADIUS Authentication 405 Configuring LDAP Integration 409 Configuring LHM Integration 419 Appendix B: SonicWALL Knowledge Check 435 Appendix C: Answers to SonicWALL Knowledge Check 445 Answers 445 Rankings 461 References 463 Acknowledgements 471 Lead Authors 471 Contributing Authors 472 Technical Reviewers 473 List of Figures 475 Index 477