SonicOS 7.1 Device Settings
- SonicOS 7.1
- About SonicOS
- About Device Settings
- Managing SonicWall Licenses
- System Administration
- Configuring the Firewall Name
- Enabling Wireless LAN and IPv6
- Changing the Administrator Name and Password
- Configuring Login Security
- Multiple Administrators Support
- Enabling Enhanced Audit Logging Support
- Configuring the Wireless LAN Controller
- Enabling SonicOS API and Configuring Authentication Methods
- Enabling GMS Management
- Configuring the Management Interface
- Client Certificate Verification
- Selecting a Language
- Configuring Time Settings
- Managing Certificates
- Administering SNMP
- Firmware Settings
- Storage
- Restarting the System
- SonicWall Support
Enabling GMS Management
For more information on SonicWall Global Management System, see the SonicWall GMS and SonicWall Management Services administration documentation, available at https://www.sonicwall.com/support/technical-documentation/.
To configure the Security Appliance for GMS management
- Navigate to Device | Settings > Administration.
- Click Audit / SonicOS API.
- Scroll to the ADVANCED MANAGEMENT section.
- Enable Management using GMS. The Configure button becomes available.
- Click Configure. The GMS Settings screen in displayed.
- Enter the host name or IP address of the GMS Console in the GMS Host Name or IP Address field.
- Enter the port in the GMS Syslog Server Port field. The default value is 514.
- To send only heartbeat status instead of log messages, select Send Heartbeat Status Messages Only.
- If the GMS Console is placed behind a device using NAT on the network, select GMS behind NAT Device. When you select GMS behind NAT Device, the NAT Device IP Address field becomes active.
- Enter the IP address of the NAT device in the NAT Device IP Address field.
- Select one of the following GMS modes from the Management Mode drop-down menu:
- IPSEC Management Tunnel - Allows the firewall to be managed over an IPsec VPN tunnel to the GMS management console. If you selected this option, go to step 11.
- Existing Tunnel - Uses an existing VPN tunnel over the connection between the GMS server and the firewall. If you selected this option, go to step 13.
- HTTPS - Allows HTTPS management from two IP addresses: the GMS Primary Agent and the Standby Agent IP address. The SonicWall firewall also sends encrypted syslog packets and SNMP traps using 3DES and the firewall administrator’s password. Options for configuring the GMS reporting server display. If you selected this option, go to step 12.
-
The default IPsec VPN settings are displayed with values populated by SonicOS. Verify the settings.
- From Encryption Algorithms, select the appropriate algorithm.
-
Optionally, enter a new encryption key in the Encryption Key field:
For The key must be DES 16 hexadecimal characters 3DES 48 hexadecimal characters -
Optionally, enter a new authentication key in the Authentication Key field:
For The key must be MD5 32 hexadecimal characters SHA1 40 hexadecimal characters - Go to Step 13.
-
SonicOS needs to know the GMS reporting server.
- Select Send Syslog Messages to a Distributed GMS Reporting Server. The GMS Reporting Server IP Address and GMS Reporting Server Port options become available.
- In the GMS Reporting Server IP Address field, enter the IP address of the GMS server.
- In the GMS Reporting Server Port field, enter the port of the GMS server. The default port is 514.
- Click OK.
- Click Accept.
Was This Article Helpful?
Help us to improve our support portal