Руководство по эксплуатации SonicWALL UTM Appliance

Руководство по эксплуатации для устройства SonicWALL UTM Appliance

Устройство: SonicWALL UTM Appliance
Категория: Сварочная система
Производитель: SonicWALL
Размер: 1.57 MB
Добавлено: 6/28/2013
Количество страниц: 57
Печатать инструкцию

Скачать

Как пользоваться?

Наша цель - обеспечить Вам самый быстрый доступ к руководству по эксплуатации устройства SonicWALL UTM Appliance. Пользуясь просмотром онлайн Вы можете быстро просмотреть содержание и перейти на страницу, на которой найдете решение своей проблемы с SonicWALL UTM Appliance.

Для Вашего удобства

Если просмотр руководства SonicWALL UTM Appliance непосредственно на этой странице для Вас неудобен, Вы можете воспользоваться двумя возможными решениями:

  • Полноэкранный просмотр -, Чтобы удобно просматривать инструкцию (без скачивания на компьютер) Вы можете использовать режим полноэкранного просмотра. Чтобы запустить просмотр инструкции SonicWALL UTM Appliance на полном экране, используйте кнопку Полный экран.
  • Скачивание на компьютер - Вы можете также скачать инструкцию SonicWALL UTM Appliance на свой компьютер и сохранить ее в своем архиве. Если ты все же не хотите занимать место на своем устройстве, Вы всегда можете скачать ее из ManualsBase.
SonicWALL UTM Appliance Руководство по эксплуатации - Online PDF
Advertisement
« Page 1 of 57 »
Advertisement
Печатная версия

Многие предпочитают читать документы не на экране, а в печатной версии. Опция распечатки инструкции также предусмотрена и Вы можете воспользоваться ею нажав на ссылку, находящуюся выше - Печатать инструкцию. Вам не обязательно печатать всю инструкцию SonicWALL UTM Appliance а только некоторые страницы. Берегите бумагу.

Резюме

Ниже Вы найдете заявки которые находятся на очередных страницах инструкции для SonicWALL UTM Appliance. Если Вы хотите быстро просмотреть содержимое страниц, которые находятся на очередных страницах инструкции, Вы воспользоваться ими.

Краткое содержание
Краткое содержание страницы № 1




LDAP Leveraging LDAP Groups/ Users with SonicWALL UTM Appliance




Contents
Contents .............................................................................................................................................................. 1
Integrating LDAP/Active Directory with Sonicwall UTM ...................................................................................... 3
LDAP over SSL ...................................................................................

Краткое содержание страницы № 2

Blocking IM Traffic Categorically............................................................................................................... 51 Applying Granular IM Policies ................................................................................................................... 52 Applying VPN Access Policies to Groups/Users............................................................................................... 53 Global VPN Client (GVC) .................................

Краткое содержание страницы № 3

Integrating LDAP/Active Directory with Sonicwall UTM SonicOS supports a range of different LDAP servers, the most popular being Active Directory (AD). AD is also an LDAP implementation. Please refer to the following paper as a supplement on how to configure LDAP settings. http://www.sonicwall.com/downloads/LDAP_Integration_Feature_Module.pdf LDAP over SSL Integrating your SonicWALL appliance with an LDAP directory service using SSL requires configuring your LDAP server for certificate m

Краткое содержание страницы № 4

Exporting the CA Certificate from the Active Directory Server To export the CA certificate from the AD server: Step 1: Launch the Certification Authority application: Start > Run > certsrv.msc. Step 2: Right click on the CA you created and select Properties. Step 3: On the General tab, click the View Certificate button. Step 4: On the Details tab, select Copy to File. Step 5: Follow through the wizard, and select the Base-64 Encoded X.509 (.cer) format. Step 6: Specify a path and filename

Краткое содержание страницы № 5

Step 5: On the Settings tab of the LDAP Configuration window, configure the following fields: • Name or IP Address – The FQDN or the IP address of the LDAP server against which you wish to authenticate. If using a name, be certain that it can be resolved by your DNS server. Also, if using TLS with the ‘Require valid certificate from server’ option, the name provided here must match the name to which the server certificate was issued (i.e. the CN) or the TLS exchange will fail. • Por

Краткое содержание страницы № 6

• Send LDAP ‘Start TLS’ Request – Some LDAP server implementations support the Start TLS directive rather than using native LDAP over TLS. This allows the LDAP server to listen on one port (normally 389) for LDAP connections, and to switch to TLS as directed by the client. Active Directory does not use this option, and it should only be selected if required by your LDAP server. • Require valid certificate from server – Validates the certificate presented by the server during the TLS exchang

Краткое содержание страницы № 7

Selecting any of the predefined schemas will automatically populate the fields used by that schema with their correct values. Selecting ‘User Defined’ will allow you to specify your own values – use this only if you have a specific or proprietary LDAP schema configuration. • Object class – Select the attribute that represents the individual user account to which the next two fields apply. • Login name attribute – Select one of the following to define the attribute that is used for login

Краткое содержание страницы № 8

• Primary Domain – The user domain used by your LDAP implementation. For AD, this will be the Active Directory domain name, e.g. yourADdomain.com. Changes to this field will, optionally, automatically update the tree information in the rest of the page. This is set to mydomain.com by default for all schemas except Novell eDirectory, for which it is set to o=mydomain. • User tree for login to server – The location of where the tree is that the user specified in the settings tab. For exampl

Краткое содержание страницы № 9

trees are best ordered with those on the primary server first, and the rest in the same order that they will be referred. NOTE: When working with AD, to determine the location of a user in the directory for the ‘User tree for login to server’ field, the directory can be searched manually from the Active Directory Users and Settings control panel applet on the server, or a directory search utility such as queryad.vbs in the Windows NT/2000/XP Resource Kit can be run from any PC in the domain

Краткое содержание страницы № 10

Step 10: On the LDAP Users tab, configure the following fields: • Allow only users listed locally – Requires that LDAP users also be present in the SonicWALL local user database for logins to be allowed. • User group membership can be set locally by duplicating LDAP user names – Allows for group membership (and privileges) to be determined by the intersection of local user and LDAP user configurations. • Default LDAP User Group – A default group on the SonicWALL to which LDAP users will

Краткое содержание страницы № 11

In the LDAP Import User Groups dialog box, select the checkbox for each group that you want to import into the SonicWALL, and then click Save. Having user groups on the SonicWALL with the same name as existing LDAP/AD user groups allows SonicWALL group memberships and privileges to be granted upon successful LDAP authentication. Alternatively, you can manually create user groups on the LDAP/AD server with the same names as SonicWALL built-in groups (such as ‘Guest Services’, ‘Content Filt

Краткое содержание страницы № 12

Step 11: On the LDAP Relay tab, configure the following fields: The RADIUS to LDAP Relay feature is designed for use in a topology where there is a central site with an LDAP/AD server and a central SonicWALL with remote satellite sites connected into it via older low-end SonicWALL security appliances that may not support LDAP. In that case the central SonicWALL can operate as a RADIUS server for the remote SonicWALLs, acting as a gateway between RADIUS and LDAP, and relaying authenticatio

Краткое содержание страницы № 13

configurable. Step 12: Select the Test tab to test the configured LDAP settings: The Test LDAP Settings page allows for the configured LDAP settings to be tested by attempting authentication with specified user and password credentials. Any user group memberships and/or framed IP address configured on the LDAP/AD server for the user will be displayed. Authentication There are two mechanisms available for having a user authenticate to the SonicWALL firewall. The first mechanism is the S

Краткое содержание страницы № 14

Logon to Appliance – Configuring User Level Authentication Settings This is the other method of authenticating users, and requires the user to login to the appliance. Please refer to the following paper for more details on ULA: http://www.sonicwall.com/downloads/SonicOS_Standard_2.1_User-Level_Authentication.pdf In this example, the LAN zone will be configured for ULA: Step 1: Go to Network>Interfaces>X0 (or appropriate interface). Step 2: Under General enable HTTPS User Login. Also

Краткое содержание страницы № 15

Step 5: Click Add, then create the following two rules as depicted below. The order is important. The new first rule allows any DNS queries out. The new second rule forces all users (Everyone) to be challenged before accessing the Internet for HTTP only. NOTE: This configuration will allow any traffic out other than HTTP, even without first authenticating. If you want to block ALL traffic before authenticating for HTTP, then disable the default ‘Any, Any, Any, Allow’ rule as depicte

Краткое содержание страницы № 16

NOTE: The difference between “All” and “Everyone” in a policy rule. Selecting “All” will allow all matching traffic, regardless from an authenticated user or not. Selecting the “Everyone” user group will allow traffic from any logged in user, but not from a user who has not logged in. 16

Краткое содержание страницы № 17

If everything is working correctly, you should then see users authenticated on the Log>View page. SonicOS Options That Leverage Groups/Users Now that we have a means of authenticating users to the SonicWALL firewall, we can leverage the groups/users that are in LDAP/Active Directory for a myriad of options: • Create firewall rules for specific groups/users • Create different content filtering policies for different groups • Create Application Firewall policies for specific groups

Краткое содержание страницы № 18

• Rule processing stops as soon as there is a match (with some caveats – see below) • Rule logic first looks at Source, then Destination, Service, and Action. If there is a match there, rule processing stops and then further subset rule processing can happen (rules set for schedules, users/groups, or BWM) for that specific rule. o What cannot occur is two overlapping rules for the same service for different groups. For example, if you had a FW rule that allowed FTP for Group 1, and below

Краткое содержание страницы № 19

allowed access through it. Matching traffic from the user or members of the user group will be given access, and matching traffic from anyone else will be denied access. For multiple user groups to be allowed access, create a single parent group user containing all of them as members and set a single rule specifying that parent group as the users allowed. A shortcoming in the rule configuration does allow rules to be created that are identical in all but the user group information. If two

Краткое содержание страницы № 20

Firewall Rules with Bandwidth Management & Logging It is possible to leverage FW rules simply for logging and/or bandwidth management (BWM). To enable BWM, it is first necessary to go to Network > Interfaces and configure the WAN interface. Click the Advanced tab, and then enable ingress and egress rates for your network. These rates should correspond with what your Internet provider is capable of providing you. 20


Скачавание инструкции
# Руководство по эксплуатации Категория Скачать
1 Sony 6 Руководство по эксплуатации Сварочная система 0
2 ADTRAN NT1 T400 Руководство по эксплуатации Сварочная система 1
3 AEG 2000 Руководство по эксплуатации Сварочная система 2
4 AEG PV 2000 Руководство по эксплуатации Сварочная система 8
5 Agilent Technologies AC Power Solutions 6814B Руководство по эксплуатации Сварочная система 8
6 Agilent Technologies 5743A Руководство по эксплуатации Сварочная система 0
7 Agilent Technologies 4291B Руководство по эксплуатации Сварочная система 4
8 Agilent Technologies 08131-90001 Руководство по эксплуатации Сварочная система 0
9 Agilent Technologies 5745A Руководство по эксплуатации Сварочная система 2
10 Agilent Technologies 5742A Руководство по эксплуатации Сварочная система 0
11 Agilent Technologies AC Power Solutions 6843A Руководство по эксплуатации Сварочная система 0
12 Agilent Technologies AC Power Solutions 6813B Руководство по эксплуатации Сварочная система 1
13 Agilent Technologies 35665-90026 Руководство по эксплуатации Сварочная система 0
14 Agilent Technologies 5749A Руководство по эксплуатации Сварочная система 1
15 Agilent Technologies 6012b Руководство по эксплуатации Сварочная система 0