SonicOS 7.1 Rules and Policies for Policy Mode
- SonicOS 7.1 Rules and Policies
- Overview
- Settings
- Security Policy
- NAT Policy
- About NAT in SonicOS
- About NAT Load Balancing
- About NAT64
- About FQDN-based NAT
- About Source MAC Address Override
- Viewing NAT Policy Entries
- Adding or Editing NAT or NAT64 Rule Policies
- Deleting NAT Policies
- Creating NAT Rule Policies: Examples
- Creating a One-to-One NAT Policy for Inbound Traffic
- Creating a One-to-One NAT Policy for Outbound Traffic
- Inbound Port Address Translation via One-to-One NAT Policy
- Inbound Port Address Translation via WAN IP Address
- Creating a Many-to-One NAT Policy
- Creating a Many-to-Many NAT Policy
- Creating a NAT Load Balancing Policy for Two Web Servers
- Routing
- Decryption Policy
- DoS Policy
- DNS Policy
- Endpoint Policy
- Shadow
- SonicWall Support
About SonicOS
SonicOS refers to the web management interface used for configuring, managing, and monitoring the features, policies, security services, connected devices, and threats to your environment. SonicOS runs on top of SonicCore, SonicWall's secure underlying operating system. SonicOS management interface facilitates the following:
- Setting up and configuring your firewall
- Configuring external devices like access points or switches
- Configuring networks and external system options that connect to your firewall
- Defining objects and policies for protection
- Monitoring the health and status of the security appliance, network, users, and connections
- Monitoring traffic, users, and threats
- Investigating events
SonicWall offers two different modes of operation in SonicOS; the modes differ mainly in the areas of policy and object configuration. Policy Mode provides a unified policy configuration work flow. It combines Layer 3 to Layer 7 policy enforcement for security policies and optimizes the work flow for other policy types. This unified policy work flow gathers many security settings into one place, which were previously configured on different pages of the management interface. The Classic Mode is more consistent with earlier releases; you need to develop individual policies and actions for specific security services. The Classic Mode has a redesigned interface. The following table identifies which modes can be used on the different SonicOS firewalls:
Firewall Type | Classic Mode | Policy Mode | Comments |
---|---|---|---|
TZ Series | yes | no | |
NSa Series | yes | no |
+ |
NSsp 10700, NSsp 11700, NSsp 13700 | yes |
no |
|
NSsp 15700 | no | yes | |
NSv Series | yes | yes | Set the operation mode when your first set up the NSv firewall. You can switch between modes, but some configuration information from extra interfaces is removed. |
In addition to the management interface, SonicOS also has a full-featured API and a CLI to manage the firewalls. For more information, refer to:
- <![CDATA[ ]]>
- SonicOS Command Line Interface Reference Guide
Was This Article Helpful?
Help us to improve our support portal