SonicOS 7.1 Firewall

About Firewall

The Firewall section allows you to perform the following:

  • Configure the advanced firewall settings to do the following:

    • Selection of or changing between Classic and Policy modes for NSv series, which provides a unified policy configuration workflow combining Layer 2 to Layer 7 policy enforcement for security policies and optimizing the workflow for other policy types.

    • Configure Detection and prevention in order to prevent threats, and detect them in real time.

    • Configure the dynamic port numbers using the internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).

    • Configure IP Source Routing allows the sender of a packet to specify which route the packet should take on the way to its destination.

    • Configure the access rule options to control the flow of inbound and outbound Internet traffic from the local network to the public Internet. Both routers and firewalls use access rules to control traffic and verify the source and destination addresses are permitted to send and receive traffic on the local network.

    • Configure the IP and UDP Checksum Enforcement to check a simple error-detection scheme in which each transmitted message that results in a numerical value based on the value of the bytes in a message. and to determine the integrity of the data transmitted over a network respectively.

    • Configure the Control Plan Flood Protection to prevent too much data traffic from reaching the Control Plane core, which can cause slow system response and potential network connection drops. The percentage configured for control traffic is guaranteed.

    • Configure various IPv6 advanced configurations.

  • Manage TCP, UDP and ICMP flood protection and view the traffic statistics through the security appliance.

    • Transmission Control Protocol (TCP) is used for organizing data in a way that ensures the secure transmission between the server and client. It guarantees the integrity of data sent over the network, regardless of the amount. For this reason, it is used to transmit data from other higher-level protocols that require all transmitted data to arrive.

    • User datagram protocol (UDP) operates on top of the Internet Protocol (IP) to transmit datagrams over a network. UDP does not require the source and destination to establish a three-way handshake before transmission takes place. Additionally, there is no need for an end-to-end connection.

    • Internet Control Message Protocol (ICMP) is used by a device, like a router, to communicate with the source of a data packet about transmission issues. For example, if a datagram is not delivered, ICMP might report this back to the host with details to help discern where the transmission went wrong.

  • Configure SSL policies to control the establishment of SSL connections.

    • Configure SSL control system to construct policies and establishment of SSL connections.

  • Allow or block the TLS and SSH ciphers in SonicOS.

    • SSL (Secure Sockets Layer) encryption, and its more modern and secure replacement, TLS (Transport Layer Security) encryption, protect data sent over the internet or a computer network. SSL/TLS encrypts communications between a client and server, primarily web browsers and web sites or applications.

  • Use RBL filters to block SMTP emails to look up in the database of suspected spammers, and malicious / open mail relays.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden