SonicOS 7.1 Firewall
- SonicOS 7.1
- About SonicOS
- About Firewall
- Advanced
- Flood Protection
- SSL Control
- Cipher Control
- Real-Time Black List (RBL) Filter
- Use cases
Custom List
The Custom Lists section allows you to configure custom whitelists and blacklists.
Configure Blacklist and Whitelist – Allows you to define strings for matching common names in SSL certificates. Entries are case-insensitive and are used in pattern-matching fashion, as shown in Blacklist and Whitelist: pattern matching:
Entry | Will Match | Will Not Match |
---|---|---|
sonicwall.com |
https://www.sonicwall.com, https://csm.demo.sonicwall.com, https://mysonicwall.com, https://supersonicwall.computers.org, https://67.115.118.87
|
https://www.sonicwall.de |
prox |
https://proxify.org, https://www.proxify.org, https://megaproxy.com, https://1070652204 |
https://www.freeproxy.ru |
- 67.115.118.87 is currently the IP address to which sslvpn.demo.sonicwall.com resolves, and that site uses a certificate issued to sslvpn.demo.sonicwall.com. This results in a match to “sonicwall.com” as matching occurs based on the common name in the certificate.
- This is the decimal notation for the IP address 63.208.219.44, whose certificate is issued to www.megaproxy.com.
- www.freeproxy.ru will not match “prox” as the common name on the certificate that is currently presented by this site is a self-signed certificate issued to “-“. This can, however, easily be blocked by enabling control of self-signed or Untrusted CA certificates.
To configure the Blacklist
- Navigate to Network > Firewall > SSL Control > Custom List > Blacklist.
-
Click + icon. The Add Blacklist dialog displays.
-
Enter the certificate’s name in the Certificate Common Name field.
List matching is based on the subject common name in the certificate presented in the SSL exchange, not in the URL (resource) requested by the client.
-
Click Add.
Changes to any of the SSL Control settings do not affect currently established connections; only new SSL exchanges that occur after the change is committed are inspected and affected.
To configure the Whitelist
- Navigate to Network > Firewall > SSL Control > Custom List > Whitelist.
-
Click + icon. The Add Whitelist dialog displays.
-
Enter the certificate’s name in the Certificate Common Name field.
List matching is based on the subject common name in the certificate presented in the SSL exchange, not in the URL (resource) requested by the client.
-
Click Add.
Changes to any of the SSL Control settings do not affect currently established connections; only new SSL exchanges that occur after the change is committed are inspected and affected.
Was This Article Helpful?
Help us to improve our support portal