SonicWALL TZ170 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of SonicWALL TZ170, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of SonicWALL TZ170 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of SonicWALL TZ170. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of SonicWALL TZ170 should contain:
- informations concerning technical data of SonicWALL TZ170
- name of the manufacturer and a year of construction of the SonicWALL TZ170 item
- rules of operation, control and maintenance of the SonicWALL TZ170 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of SonicWALL TZ170 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of SonicWALL TZ170, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the SonicWALL service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of SonicWALL TZ170.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the SonicWALL TZ170 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    SonicOS Hub and Spoke TZ170 VPNs with Checkpoint NG Introduction This technote will detail all steps to get a Hu b and Spoke setup between the SonicWALL SonicOS Enh anced and the Checkpoint NG. Within this setup the Checkpoint NG will be the HUB an d 2 TZ170 units will be the Spokes . Versions Used  SonicOS 2.5.0.2 Enhanced on both T Z170 units [...]

  • Page 2

    2 Before You Begin If you have not already done so, set up a mana gement system connecting to the SonicWALL’s intern al LAN interfac e. The SonicWALL should alread y be configured for internet acce ss; if not, do this before completing any further steps. T he Check Point FireWall-1 NG server is also as sumed to be properly configur ed for intern [...]

  • Page 3

    3 Next create an address object grou p for t he two checkpoint address object s. On the ‘Network > Address Objects’ page in the ‘Address Groups’ section, click on ‘A dd Group…’ to create the address grou p for the o bjects. Name: checkpoint_lan Name: Side_Bob_lan Zone Assignment: VPN Zone Assignment: VPN Type: Network Type: Network[...]

  • Page 4

    4 From the navigation bar on the left, cli ck on ‘VPN’, this will brin g up the ‘VPN > Settings’ pag e. In the ‘VPN Global Settings’ section, make sure the ‘Enable VP N’ radi o button is selected. In the ‘VPN Policies’ section, click on ‘Add’ to create the new VPN policy for the Check Poi nt FireWall-1. The ‘VPN Policy?[...]

  • Page 5

    5 Next select the ‘Network’ tab. In the ‘Local Networks’ section, select the radio b utton ne xt to ‘Choose local net work from list’ and select "LAN Primary Subnet" from the dropdown box. In the ‘Destination Net works’ section, select the radio butto n next to ‘Choose destination network from list’ and select "ch[...]

  • Page 6

    6 IKE (Phase 1) Proposal Exchange: Aggressive Mode DH Group: Group 5 Encryption: 3DES Authentication: SHA1 Life Time (seconds): 3600 Ipsec (Phase 2) Proposal Protocol: ESP Encryption: 3DES Authentication: SHA1 DH Group Group 2 Life Time (seconds): 3600 Do not enable Perfect Forward Securit y. Next select the ‘Advanced’ tab. Make sure that the o[...]

  • Page 7

    7 SonicWALL Setup Side Bob Log into the SonicWALL’s Management GUI usin g a current web browser. The address objects will be created first, and then a gro up wi ll be created to contain the address object s. From the navigation bar on the left, c lick on ‘Net work’ and then ‘Address Objects’, this will bring up the ‘Network > Address[...]

  • Page 8

    8 Name: checkpoint_lan Name: Side_Alice_lan Zone Assignment: VPN Zone Assignment: VPN Type: Network Type: Network Network: 192.168.170.0 Network: 180.10.10.0 Netmask: 255.255.255.0 Netmask: 255.255.255.0 Click ‘OK’ to finish. Click ‘OK’ to finish. Next create an address object grou p for t he two checkpoint address object s. On the ‘Netwo[...]

  • Page 9

    9 The ‘VPN Policy’ window will then appear. On the ‘General ’ tab pag e, ‘Security Policy’ se ction, select “IKE using Preshared Secret” from the ‘IPSec Keying Mode:’ dr opdown box. Name: "to_checkpoint" IPSec Primary Gateway Name or Address: 67.115.118.94 Shared Secret: HaRd!_to_Gue55_B0 b Local IKE ID: SNWL Identifie[...]

  • Page 10

    10 Next select the ‘Network’ tab. In the ‘Local Networks’ section, select the radio b utton ne xt to ‘Choose local net work from list’ and select "LAN Primary Subnet" from the dropdown box. In the ‘Destination Net works’ section, select the radio butto n next to ‘Choose destination network from list’ and select "c[...]

  • Page 11

    11 Ipsec (Phase 2) Proposal Protocol: ESP Encryption: 3DES Authentication: SHA1 DH Group Group 2 Life Time (seconds): 3600 Do not enable Perfect Forward Securit y. Next select the ‘Advanced’ tab. Make sure that the option Enable Keep Al ive has been check ed. All other options ca n be l eft as they are. Click the OK button. This completes the s[...]

  • Page 12

    12 Check Point FireWall-1NG Setup Log into SmartDashboard. Before the VPN can be setup it is necessary to cr eate Net work Objects for all devices and networks. To create the network objects, first click on ‘M anage’ on the top of the SmartDash board. Then click on ‘Network Objects…’ from the drop down box. The ‘Network Objects’ windo[...]

  • Page 13

    13 The ‘Network Properties’ window will then appear. In this window, enter the object: Name: CP_LAN Network Address: 192.168.170.0 Net Mask: 255.255.255.0 The next network objects to create are for the LAN of the SonicW AL L appliance at Side Alice a nd for the LAN of the SonicWALL appliance at Side Bob. From the ‘Network Objects’ windo w, [...]

  • Page 14

    14 Here we create the Network Object for the LAN of Side Bob. Make sure that the Object con t ains the corre ct LAN Network Address and Net Mask. Within our example we used: Name: Network_Bob Network Address: 10.234.234.0 Net Mask: 255.255.255 Next, edit the ‘Check Points’ net work object. It should be na med the same as the machi ne name then [...]

  • Page 15

    15 The ‘Check Point Gateway’ page will appear. On ‘General Properti es’, verify the ‘IP Address’ and that both ‘FireWall- 1’ and ‘VPN-1 Pro’ are selected. In this exam pl e, the ‘IP Addre ss’ is “192.168.170.1”. When finished, click ‘Topology’ on the left hand side. On ‘Topology’, verif y the network addresses of[...]

  • Page 16

    16 It is needed to create also Interoperable Network objects fo r the both SonicWALL app liances. Go to ‘Manage’ > ‘Net work Objects’ now the Network Objects windo w will then appear. To create the ‘Interoperable Devi ce ’ ob ject, click the ‘New’ button at the bottom of the ‘Network Obje cts’ window, then select ‘Interoper[...]

  • Page 17

    17 On the ‘Topology’ page, unde r the ‘VPN Domain’ section, sele ct ‘Manuall y d efined’ and se lect the previousl y created “Network_Alice” Net work Object with the dropdo wn menu. Click on ‘OK’ to finish. An Interoperable Device Object needs also to be created for Side Bob. Go to ‘Manage’ > ‘Net work Objects’ now th[...]

  • Page 18

    18 In this window, under ‘General Properti es’ enter: Name: SNWL_Bob IP Address: 80.62.91.20 Next click ‘Topology’ on the le ft hand sid e. On the ‘Topology’ page, unde r the ‘VPN Domain’ section select ‘Manuall y defined’ and sele ct the previousl y created “Network_Bob” Network Object with the dropdo wn menu. Click on ‘O[...]

  • Page 19

    19 From the ‘VPN Communities’ windo w, select the ‘New’ butto n on the bottom. Then select ‘Site To Site’ and ‘Star…’ The ‘Star Community Properties’ page will appear. On the ‘Star Community Properties’ page, enter the VPN name in the ‘Name:’ field. In this example, the ‘Name:’ is " HUB- TEST" which needs[...]

  • Page 20

    20 Next, click on ‘Satellite Gateways’. On the Satellite Gateways, click on the ‘Add…’ b utton under the ‘Satellite Gateways :’ section. This will bring up the ‘Satellite Gate ways’ window. Select here the address objects ‘SNWL_Alic e’ and address object ‘SNWL_Bob’ after this i s done press OK.[...]

  • Page 21

    21 Click on 'VPN Properties'. Enter the ‘IKE (Phase 1) Properties’ and the ‘IPsec (Phase 2) Properties ’. In this exampl e, the ‘IKE (Phase 1)’ section the settings are as follows: IKE (Phase 1) Properties Perform key exchange encryption with: 3DES Perform data integrity with: SHA1 Ipsec (Phase 2) Properties Perform IPsec data[...]

  • Page 22

    22 In the ‘Advanced Properties’ section, un der IKE (Phase 1), modify the ‘Renegotiate IKE securit y associations every’ fiel d to "60" minutes and the ‘Use Diffie-He llman group’ should be "Group 5 (1536 b it). Tick the option ‘Use aggressive mo de’ For the ‘Ipsec (Phase 2) Proposal’ section the settings are as f[...]