NSA2400MX
NSA2400MX
NSA2400MX
NSA 2400MX
Setup
Step Procedure Est. Time
1 2 3 4
Pre-Configuration Tasks - page 1 Registering Your Appliance - page 5 Deployment Scenarios - page 13 Enabling Essential Security Services - page 23
Status Lights
Provides dedicated LAN/WAN port status as follows: M0 module 0 is inserted M1 module 1 is inserted ALARM minor/major alarm* TEST rmware loading/booting/safemode* POWER unit is powered on
2400MX
CLI Port
For connection to SonicOS command line interface
USB Ports
For use with SonicWALL approved modules
Power Switch
On (I) and Off (o) power switch for the SonicWALL appliance
AC Power Supply
AC power connection for use with the supplied power cable
PML
I o
M1 / M0 Expansion Bays
Expansion bays for additional SonicWALL modular accessories
Pre-Configuration Tasks
In this Section:
1
1
This section provides pre-configuration information. Review this section before setting up your SonicWALL NSA 2400MX appliance. Checking NSA 2400MX Package Contents - page 2 Obtaining Configuration Information - page 3 Verifying System Requirements - page 4
2400MX
(x2)
(x6)
Registration Information
Serial Number: Record the serial number found on the bottom panel of your SonicWALL appliance. Record the authentication code found on the bottom panel of your SonicWALL appliance.
DHCP
Authentication Code:
Networking Information
LAN IP Address: Select a static IP address for your SonicWALL appliance that is within the range of your local subnet. If you are unsure, you can use the default IP address (192.168.168.168). Record the subnet mask for the local subnet where you are installing your SonicWALL appliance. Select a static IP address for your Ethernet WAN. This setting only applies if you are already using an ISP that assigns a static IP address.
. Subnet Mask: .
Note:
If you are not using one of the network configurations above, refer to <http://www.sonicwall.com/us/support.html>.
Administrator Information
Admin Name: Select an administrator account name. (default is admin) Select an administrator password. (default is password)
Admin Password:
In this Section:
This section provides instructions for registering your SonicWALL NSA 2400MX appliance. Creating a MySonicWALL Account - page 6 Registering and Licensing Your Appliance - page 6 Upgrading Firmware on Your SonicWALL - page 9
2
2
Note: Registration is an important part of the setup process and is necessary to receive the benefits of SonicWALL security services,
firmware updates, and technical support.
Product Registration
You must register your SonicWALL security appliance on MySonicWALL to enable full functionality. 1. 2. 3. Login to your MySonicWALL account. If you do not have an account, you can create one at www.mysonicwall.com. On the main page, type the appliance serial number in the Register A Product field. Then click Next. On the My Products page, under Add New Product, type the friendly name for the appliance, select the Product Group if any, type the authentication code into the appropriate text boxes, and then click Register. On the Product Survey page, fill in the requested information and then click Continue.
3. 4. 5.
Complete the Registration form and click Register. Verify the information is correct and click Submit. In the screen confirming that your account was created, click Continue.
4.
Gateway Services: Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, Application Firewall Global Management System Content Filtering: Premium Edition Comprehensive Anti-Spam VPN Upgrade Desktop and Server Software: Enforced Client Anti-Virus and Anti-Spyware Global VPN Client Global VPN Client Enterprise ViewPoint SSL VPN Support Services: Dynamic Support 8x5 Dynamic Support 24x7 Software and Firmware Updates Hardware Warranty
The following list highlights several products and services that are available for the SonicWALL NSA 2400MX: Service Bundles: Client/Server Anti-Virus Suite Comprehensive Gateway Security Suite
To purchase a full license for a service: 1. 2. Click Buy Now. In the Buy Service page, type the number of licenses you want in the Quantity column for either the 1-year, 2-year, or 3-year license row and then click Add to Cart. In the Checkout page, follow the instructions to complete your purchase.
3.
3.
The MySonicWALL server will generate a license key for the product. The key is added to the license keyset. You can use the license keyset to manually apply all active licenses to your SonicWALL appliance. The service management screen will display the product you licensed with an expiration date when activation is complete.
existing settings in the event that it becomes necessary to return to a previous configuration state. The System Backup shows you the current configuration and firmware in a single, clickable restore image. In addition to using the backup feature to save your current configuration state to the SonicWALL security appliance, you can export the configuration preferences file to a directory on your local management station. This file serves as an external backup of the configuration preferences, and can be imported back into the SonicWALL security appliance. Perform the following procedures to save a backup of your configuration settings and export them to a file on your local management station: 1. On the System > Settings page, click Create Backup. Your configuration preferences are saved. The System Backup entry is displayed in the Firmware Management table. To export your settings to a local file, click Export Settings. A popup window displays the name of the saved file.
2.
2.
2. 3.
4.
2.
Note: On the System > Settings page, click the Boot icon in
the row for Uploaded Firmware with Factory Default Settings. 5. 6. In the confirmation dialog box, click OK. The SonicWALL restarts and then displays the login page. Enter your user name and password. Your new SonicOS Enhanced image version information is listed on the System > Settings page.
3.
Point the Web browser on your computer to 192.168.168.168. The SafeMode management interface displays.
4.
5.
6.
7. 8.
If you have made any configuration changes to the security appliance, select the Create Backup On Next Boot checkbox to make a backup copy of your current settings. Your settings will be saved when the appliance restarts. Click Upload New Firmware, and then browse to the location where you saved the SonicOS Enhanced firmware image, select the file and click the Upload button. Select the boot icon in the row for one of the following: Uploaded Firmware - New! Use this option to restart the appliance with your current configuration settings. Uploaded Firmware with Factory Defaults - New! Use this option to restart the appliance with default configuration settings. In the confirmation dialog box, click OK to proceed. After successfully booting the firmware, the login screen is displayed. If you booted with factory default settings, enter the default user name and password (admin / password) to access the SonicWALL management interface.
Page 12
Deployment Scenarios
In this Section:
3
3
This section provides detailed overviews of advanced deployment scenarios as well as configuration instructions for connecting your SonicWALL NSA 2400MX. Initializing the SonicWALL - page 14 Choose a Deployment Scenario - page 15 Setup for NAT / Route Mode Gateway - page 16 Setup for Layer 2 Bridge Mode - page 18 Verifying WAN (Internet) Connectivity - page 21
Tip: Before completing this section, fill out the information in Obtaining Configuration Information - page 3. You will need to enter this
information during the Setup Wizard.
2400MX
The Power LED on the front panel lights up blue when you plug in the SonicWALL NSA. The Test LED will light up and may blink while the appliance performs a series of diagnostic tests. When the Power LED is lit and the Test LED is no longer lit, the SonicWALL NSA 2400MX is ready for configuration. This typically occurs within a few minutes of applying power to the appliance.
X1 (WAN)
X0 (LAN)
Internet
Management Station
3. 4.
Note: If the Test LED remains lit after the SonicWALL NSA
appliance has been booted, restart the appliance by cycling power. 2. Using standard CAT-5 or better Ethernet cable, connect your Internet connection (switch/router/modem) to the X1 (WAN) port on your SonicWALL NSA Series appliance.
Connect one end of the provided Ethernet cable to the computer you are using to manage the SonicWALL NSA appliance. Connect the other end of the cable to the X0 (LAN) port on your SonicWALL NSA appliance. The Link LED above the X0 (LAN) port will light up in green or amber depending on the link throughput speed, indicating an active connection: - Amber indicates 1 Gbps - Green indicates 100 Mbps - Unlit while the right (activity) LED is illuminated indicates 10 Mbps
NSA 2400MX
Internet
Network Security Appliance
Internet
2400MX
Network Security Appliance
NSA 2400MX
2400MX
Local Clients
Web Server
Local Clients Local Data and Resources
Network Security Appliance
Web Server
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
SSL-VPN Appliance
Secure Remote Access
SRA EX5000
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
SSL-VPN Appliance
Secure Remote Access
SRA EX5000
E7500
LAN 1
LAN 2
DMZ
LAN 1
LAN 2
DMZ
3.
The SonicWALL Setup Wizard launches and guides you through the configuration and setup of your SonicWALL NSA appliance. The Setup Wizard launches only upon initial loading of the SonicWALL NSA management interface.
Depending on the changes made during your setup configuration, the SonicWALL may restart.
A simplified example below shows zones configured with multiple VLANs including: X1: WAN Zone X2-X5: WLAN Zone X18-X21: 1st Floor LAN Clients (QA Lab, DMZ) X22-X25: 2nd Floor LAN Clients (Exec, Eng, Mrktg) Several ports are configured with VLANs so that multiple zone types may be used across each interface.
X1 (WAN)
Internet or LAN 2
Network Security Appliance
NSA 2400MX
2400MX
X2-X5 SonicPoint N
X18-X21
X22-X25
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
QA Lab VLAN
DMZ VLAN
Exec VLAN
Eng VLAN
Mrktg VLAN
Wireless (WLAN)
Depending on the changes made during your setup configuration, the SonicWALL may restart.
Connection Overview
Connect the X1 port on your SonicWALL NSA 2400MX to the LAN port on your existing Internet gateway device. Then connect the X0 port on your SonicWALL to your LAN.
Network Gateway
Internet or LAN 2
NSA 2400MX
Network Security Appliance
L2 Bridge Link
2400MX
X2-X5 SonicPoint N
X18-X21
X22-X25
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
E7500
QA Lab VLAN
DMZ VLAN
Exec VLAN
Eng VLAN
Mrktg VLAN
Wireless (WLAN)
4.
Click the Test All Selected button to test connectivity to these servers.
In this Section:
4
4
Security services are an essential component of a secure network deployment. This section provides instructions for enabling security services on your SonicWALL NSA 2400MX appliance. Activating Licenses in SonicOS - page 24 Configuring Security Services - page 24 Enforcing Security Services on Network Zones - page 28 Security Service Dashboard - page 28
To activate licenses in SonicOS: 1. 2. Navigate to the System > Licenses page. Under Manage Security Services Online do one of the following: Enter your MySonicWALL credentials, then click the Synchronize button to synchronize licenses with MySonicWALL. Paste the license keyset into the Manual Upgrade Keyset field. Click Submit.
To activate licensed services in SonicOS, you can enter the license keyset manually, or you can synchronize all licenses at once with MySonicWALL. The Setup Wizard automatically synchronizes all licenses with MySonicWALL if the appliance has Internet access during initial setup. If initial setup is already complete, you can synchronize licenses from the System > Licenses page. Manual upgrade using the license keyset is useful when your appliance is not connected to the Internet. The license keyset includes all license keys for services or software enabled on MySonicWALL. It is available on <http://www.sonicwall.com> at the top of the Service Management page for your SonicWALL NSA appliance.
3.
4.
4.
Enabling Anti-Spyware
To enable Anti-Spyware in SonicOS: 1. 2. 3. 4. 5. Navigate to the Security Services > Anti-Spyware page. Select the Enable Anti-Spyware checkbox. Select the Prevent All and Detect All checkboxes for each spyware danger level that you want to prevent. Select the inbound Protocols you wish to inspect. Select the Enable Inspection of Outbound Spyware Communication checkbox to enforce signature inspection on outbound traffic.
3.
4.
Email System Detection will attempt to configure your service automatically. Alternatively, you may scroll down to configure Advanced Options, including service probes and your mail server address and port. Click the Accept button to complete the setup process.
6.
Disabling, Editing, or Deleting Addresses from the CFS Exclusion List You can temporarily disable CFS exclusions without removing all entries from the list. You can also delete some or all IP address ranges from the CFS Exclusion List. 1. To keep the CFS Exclusion List entries, but temporarily allow content filtering policies to be applied to these IP addresses, uncheck the Enable CFS Exclusion List checkbox. This disables CFS exclusions. To edit a trusted domain entry, click the pencil icon in the Configure column. To delete an individual trusted domain from the CFS Exclusion List, click the Delete icon for the entry in the Configure column. To delete all trusted domains from the CFS Exclusion List, click Delete All. On the Security Services > Content Filter page, click Accept.
2. 3.
Enabling and Adding to the CFS Exclusion List To enable the CFS Exclusion List and add a range of IP addresses to it, perform the following steps: 1. 2. 3. Select the Enable CFS Exclusion List checkbox. Click Add. The Add CFS Range Entry window is displayed. Enter the first IP address in the excluded range into the IP Address From: field and the last address into the IP Address To: field. Click OK. The IP address range is added to the CFS Exclusion List. On the Security Services > Content Filter page, click Accept.
4. 5.
4. 5.
Security services such as Gateway Anti-Virus are automatically applied to the LAN and WAN network zones. To protect other zones such as the DMZ or Wireless LAN (WLAN), you must apply the security services to the network zones. For example, you can configure SonicWALL Intrusion Prevention Service for incoming and outgoing traffic on the WLAN zone to add more security for internal network traffic. To apply services to network zones: 1. 2. 3. Navigate to the Network > Zones page. In the Zone Settings table, click the Configure icon for the zone where you want to apply security services. In the Edit Zone dialog box on the General tab, select the checkboxes for the security services to enable on this zone. Click OK. To enable security services on other zones, repeat steps 2 through step 4 for each zone.
4. 5.
In this Section:
This section provides overviews of customer support and training options for the SonicWALL NSA 2400MX. Customer Support - page 30 Knowledge Base - page 30 SonicWALL Live Product Demos - page 31 User Forums - page 32 Training - page 33 Related Documentation - page 34 SonicWALL Secure Wireless Network Integrated Solutions Guide - page 35
Customer Support
For answers to all your support questions visit the SonicWALL support Web site at <http://www.sonicwall.com/us/ Support.html> where you will find featured support topics, tutorials, and more. If you need further assistance, SonicWALL offers telephone, email, and Web-based support to customers with valid Warranty Support or a purchased support contract. Please review our Warranty Support Policy for product coverage.
Knowledge Base
The Knowledge Base allows users to search for SonicWALL documents based on the following types of search tools: Browse Search for keywords Full-text search
For further information, navigate to the Support > Knowledge Base page at: <http://www.mysonicwall.com/>
User Forums
The SonicWALL User Forums is a resource that provides users the ability to communicate and discuss a variety of security and appliance subject matters. In this forum, the following categories are available for users: Content Security Manager topics Continuous Data Protection topics Email Security topics Firewall topics Network Anti-Virus topics Security Services and Content Filtering topics SonicWALL GMS and Viewpoint topics SonicPoint and Wireless topics SSL VPN topics NSA 2400MX / Wireless WAN - 3G Capability topics VPN Client topics VPN site-to-site and interoperability topics
Training
SonicWALL offers an extensive sales and technical training curriculum for Network Administrators, Security Experts and SonicWALL Medallion Partners who need to enhance their knowledge and maximize their investment in SonicWALL Products and Security Applications. SonicWALL Training provides the following resources for its customers: E-Training Instructor-Led Training Custom Training Technical Certification Authorized Training Partners
Related Documentation
See the following related documents for more information: SonicOS Enhanced Administrators Guide SonicOS Enhanced Release Notes SonicOS Enhanced Feature Modules Application Firewall Dashboard HA License Sync Multiple Admin NAT Load Balancing Packet Capture Radio Frequency Monitoring Single Sign-On SSL Control Virtual Access Points SonicWALL GMS 5.0 Administrators Guide SonicWALL GVC 4.0 Administrators Guide SonicWALL ViewPoint 5.0 Administrators Guide SonicWALL GAV 4.0 Administrators Guide SonicWALL IPS 2.0 Administrators Guide SonicWALL Anti-Spyware Administrators Guide SonicWALL CFS Administrators Guide
In this Section:
This section provides regulatory along with trademark and copyright information. Safety and Regulatory Information - page 38 Weitere Hinweise zur Montage - page 39 FCC Part 15 Class A Notice - page 40 Canadian Radio Frequency Emissions Statement - page 40 CISPR 22 (EN 55022) Class A - page 40 Regulatory Information for Korea - page 40 Copyright Notice - page 41 Trademarks - page 41
Consideration must be given to the connection of the equipment to the supply circuit. The effect of overloading the circuits has minimal impact on overcurrent protection and supply wiring. Appropriate consideration of equipment nameplate ratings must be used when addressing this concern. Reliable grounding of rack-mounted equipment must be maintained. Particular attention must be given to power supply connections other than direct connections to the branch circuits such as power strips.
Cable Connections
All Ethernet and RS232 (Console) cables are designed for intra-building connection to other equipment. Do not connect these ports directly to communication wiring or other wiring that exits the building where the SonicWALL is located.
sorgung beeinflusst werden. Prfen Sie dabei sorgfltig die Angaben auf dem Aufkleber des Gerts. Eine sichere Erdung der Gerte im Rack muss gewhrleistet sein. Insbesondere muss auf nicht direkte Anschlsse an Stromquellen geachtet werden wie z. B. bei Verwendung von Mehrfachsteckdosen.
Kabelverbindungen
Alle Ethernet- und RS232-C-Kabel eignen sich fr die Verbindung von Gerten in Innenrumen. Schlieen Sie an die Anschlsse der SonicWALL keine Kabel an, die aus dem Gebude in dem sich das Gert befindet ,herausgefhrt werden.
BMSI Statement
All products with country code (blank) and A are made in the USA. All products with country code B are made in China. All products with country code C or D are made in Taiwan R.O.C. All certificates held by Secuwide, Corp.
VCCI Statement
Copyright Notice
2010 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described within, cannot be copied, in whole or part, without the written consent of the manufacturer, except in the normal use of the software to make a backup copy. The same proprietary and copyright notices must be affixed to any permitted copies as were affixed to the original. This exception does not allow copies to be made for others, whether or not sold, but all of the material purchased (with all backup copies) can be sold, given, or loaned to another person. Under the law, copying includes translating into another language or format. Specifications and descriptions subject to change without notice.
Trademarks
SonicWALL is a registered trademark of SonicWALL, Inc. Windows 2000, Windows XP, Windows Server 2003, Internet Explorer, and Active Directory are trademarks or registered trademarks of Microsoft Corporation. Adobe, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the U.S. and/or other countries. Firefox is a trademark of the Mozilla Foundation. Other product and company names mentioned herein may be trademarks and/or registered trademarks of their respective companies and are the sole property of their respective manufacturers.
Page 42
SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 T +1 408.745.9600 F +1 408.745.9300 www.sonicwall.com
2010 SonicWALL, Inc. is a registered trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Specifications and descriptions subject to change without notice.