Sonicwall configure ssl vpn
Author: a | 2025-04-24
How to Configure SSL VPN on Sonicwall TZ Series. Miguel Fra Sonicwall Sonicwall, VPN. Sonicwall SSL-VPN is the preferred VPN connection method to
SMB SSL-VPN: Configuring the SSL-VPN Group Configuration - SonicWall
DescriptionWhen client connects to SonicWall SSL-VPN using Netextender from his computer he will get the error "Connection failure: no routes found!" as below.CauseThe reason for this error is, that no Address Objects were selected in the Client Routes of the SSL VPN settings as below.On Gen7 devices (Firmware on 7.x):On Gen6 (Firmware 6.x) and Gen5 (Firmware 5.x) devices: Resolution for SonicOS 7.XThis release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.Login to your SonicWall Management page.Navigate to Network > SSL VPN > Client Settings, Click on configure Default Device Profile used by SSL VPN.Go to the Client Routes tab, add required Address Objects from Networks to Client Routes.Click OK at the bottom of the page to accept the changes.Resolution for SonicOS 6.5This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.The resolution for this issue is to add the required Address Object in the Client Routes section as below and accept the changes.Login to your SonicWall Management page.Navigate to Manage > SSL VPN > Client Settings, Click on Configure, under Client Routeson the right side select required Address Object in Add Client Routes.Click Accept at the bottom of the page to accept the changes. Resolution for SonicOS 6.2 and BelowThe below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.The resolution for this issue is to add the required Address Object in the Client Routes section as below and accept the changes.In Gen 5 - SonicOS (5.8 & below) and Gen 6 - SonicOS (6.1 & above)Login to your SonicWall Management page.Navigate to SSL VPN > Client Routes, on the right side select required Address Object in Add Client Routes.Click Accept at the top of the page to accept the changes. It will be update at the bottom of that section as shown in the below picture.In Gen 5 -SonicOS (5.9 & above)Login to your SonicWall management page.Navigate to SSL VPN > Client Settings, on the right side configure Default Device Profile used by SSL VPN.Go to the Client Routes tab, add required Address Objects from
Configuring SSL VPN Bookmarks - SonicWall
DescriptionUsing SonicWall Mobile Connect For iPhone and iPadSonicWall Mobile Connect is an app for iPhone and iPad that enables secure, mobile connections to private networks protected by SonicWall security appliances.To get started with SonicWall Mobile Connect: Install SonicWall Mobile Connect from the App Store. Enter connection information (server name, username, password, etc.). Initiate a connection to the network. SonicWall Mobile Connect establishes a SSL VPN tunnel to the SonicWall security appliance. You can now access resources on the private network. All traffic to and from the private network is securely transmitted over the SSL VPN tunnel. Apple Product Support iPhone 5 and newer – running Apple iOS 5 or higher. iPhone 4S – running Apple iOS 5 or higher. iPhone 4 – running Apple iOS 4.2 or higher. iPhone 3GS – running Apple iOS 4.2 or higher. iPhone 3G – running Apple iOS 4.2 or higher. iPad 2 – running Apple iOS 4.2 or higher. iPad – running Apple iOS 4.2 or higher. iPod Touch (2nd Generation or later) – running Apple iOS 4.2 or higher. SonicWall Appliance SupportSonicWall Mobile Connect is a free app, but requires a concurrent user license on one of the following SonicWall solutions in order to function properly. SonicWall Aventail E-Class Secure Remote Access (SRA) appliances running 10.5.4 or higher. SonicWall SRA appliances running 5.5 or higher. SonicWall Next-Generation Firewall appliances including the TZ, NSA, E-Class NSA running SonicOS 5.8.1.0 or higher. Required Network InformationIn order to use SonicWall Mobile Connect, you will need the following information from your network administrator or IT support. Server name or address – This is either the IP address or URL of the SSL VPN server that you will connect to. Username and password – Typically, you will be required to enter your username and password, although some connectionsSSL VPN Configuration for IPv6 - SonicWall
From FortiGate include:Consolidated security strategy for complete protection against sophisticated threats and the avoidance of any one point in the network introducing vulnerabilitySecurity processor (SPU) technology for high-performance application layer security services (NGFW, SSL inspection, and threat protection)The SSL inspection engine assists defend against malware hidden in SSL/encrypted communication.Management through a single pane of glass simplifies deployment and allows uniform security rules with granular control and visibility across the network.Some of the strengths compared to Cisco Firewall are;Pricing FlexibilityEase of Deployment5. SonicWall NSA SeriesThe SonicWall Network Security appliance (NSa) series delivers sophisticated threat prevention in a security platform to companies ranging in size from mid-sized networks to dispersed corporations and data centers. The NSa series provides enterprises with automatic real-time breach detection and prevention by leveraging breakthrough deep learning algorithms in the SonicWall Capture Cloud Platform.We can summarize its main features as follows.Network control and flexibility: SonicOS, SonicWall's feature-rich operating system, lies at the heart of the NSa series. Through application intelligence and control, real-time visualization, an intrusion prevention system (IPS) with sophisticated anti-evasion technology, high-speed virtual private networking (VPN), and other security features, SonicOS provides organizations with network control and flexibility they require.Threat prevention: The NSa series next-generation firewalls (NGFWs) combine two sophisticated security technologies to provide attack prevention that keeps your network one step ahead of the competition.Patent-pending Real-Time Deep Memory Inspection (RTDMITM) technology enhances SonicWall's multi-engine Capture Advanced Threat Protection (ATP) service.SonicWall's Capture Cloud Platform: SonicWall's Capture Cloud Platform provides cloud-based threat prevention and network administration, as. How to Configure SSL VPN on Sonicwall TZ Series. Miguel Fra Sonicwall Sonicwall, VPN. Sonicwall SSL-VPN is the preferred VPN connection method to Configuring and managing SSL VPN. About SSL VPN . This section provides information on how to configure the SSL VPN features on the SonicWall network security appliance. SonicWall ’sHow to configure SSL VPN on SonicWall
Configuring the SSL VPN Web Portal On the SSL VPN > Portal Settings page, you configure the appearance and functionality of the SSL VPN Virtual Office web portal. The Virtual Office portal is the website where users log in to launch NetExtender or access internal resources by clicking Bookmarks. It can be customized to match any existing company website or design style. Portal Settings Portal Logo Settings Portal Settings The portal settings customize what the user sees when attempting to log in. Configure the options as needed to match your company’s requirements. Go to NETWORKS | SSL VPN > Portal Settings. Option Definitions Portal Site Title: Enter the text to display as the top title of the portal page in this field. The default is SonicWall - Virtual Office. Portal Banner Title: Enter the text to display next to the logo at the top of the page in this field. The default is Virtual Office. Home Page Message: Enter the HTML code for the message to display above the NetExtender icon. Type your own text or click EXAMPLE TEMPLATE to populate the field with a default template that you can keep or edit. Click PREVIEW to see what the Home Page Message looks like. Login Message: Enter the HTML code for the message to display when users are prompted to log into the Virtual Office. Type your own text or click EXAMPLE TEMPLATE to populate the field with a default template that you can keep or edit. Click PREVIEW to see what the Login Message looks like. The following options customize the functionality of the Virtual Office portal: Enable HTTP meta tags for cache control recommended) - Select to insert into the browser HTTP tags that instruct the web browser not to Display UTM management link on SSL VPN portalConfiguring the SSL VPN Settings - SonicWall
(not recommended)- Select to display the SonicWALL appliance’s management link on the SSL VPN portal. This option is not selected by default. It is recommended not to select this option. This option only applies to the Internet Explorer browser on PCs running Windows when Use Selfsigned Certificate is selected from the Certificate Selection drop-down menu on the SSL VPN > Server Settings page. Portal Logo Settings This section describes the settings for configuring the logo displayed at the top of the Virtual Office portal. Default Portal Logo – Displays the default portal logo which is the SonicWall logo. Use Default SonicWall Logo – Select this checkbox to use the SonicWall logo supplied with the appliance. This option is not selected by default. Customized Logo (Input URL of the Logo) — Enter the URL for the logo you want to display. The logo must be in GIF format of size 155 x 36; a transparent or light background is recommended.How To Configure SSL VPN In SonicWall firewall sonicwall
May not require this. Domain name – The domain name of the SSL VPN server. SonicWall Mobile Connect may be able to automatically determine this when it first contacts the server, or there may be multiple domains that can be selected. Installing SonicWall Mobile ConnectSonicWall Mobile Connect is installed through the Apple App Store. On your iPhone or iPad, tap on the App Store icon. Go to the Search tab, enter SonicWall Mobile Connect, and tap Search. In the search results, select SonicWall Mobile Connect. Tap Free and then Install. The app will install on your device. When installation is complete, the SonicWall Mobile Connect icon will appear on your device. ResolutionCreating a ConnectionThe process of creating a Mobile Connect connection is slightly different depending on which type of SonicWall appliance you are connecting to. The following sections describe how to create a connection:Creating a Connection to SonicWall Firewall and SRA Appliances The first time you launch SonicWall Mobile Connect, you will be prompted to enable VPN functionality. Click Enable. You will then be presented with the screen to begin your first connection. Click Add connection. Name: Enter a descriptive name for the connection. Server: Enter the URL or IP address of the server. Tap Next. SonicWall Mobile Connect will then attempt to contact the SonicWall appliance. If the attempt fails, a warning message will display, asking if you want to save the connection. Before tapping Save, verify that the server address or URL is spelled correctly. If SonicWall Mobile Connect successfully contacts the server, you will be prompted to enter your Username and Password (unless the server does not require this information). The Domain field is auto-populated with the default domain from the server. To select a different domain, tap on Domain to display a dropdown menu of theConfiguring Users for SSL VPN Access - SonicWall
SonicWALL Firewall provides network security by blocking attacks, preventing advanced threats, and other features. When you connect SonicWALL to InsightIDR, you can parse events for firewall, IDS, and VPN events.To get started:Configure SonicWALL SyslogCreate a Firewall Event SourceConfigure SonicWALL SyslogYou can configure syslog forwarding to the InsightIDR Collector on your SonicWALL Firewall.To do so:Sign in to your SonicWALL console.On the top menu, select the Manage link.On the bottom of the left menu, go to "Logs & Reporting" and expand the Log Settings dropdown.Select the Syslog page.On the "Syslog Settings" page, click the Add button to add a syslog server.From the "Name or IP Address" dropdown, select IP Address and add the IP address of your InsightIDR Collector.Provide the unique port on your InsightIDR Collector that will accept firewall traffic.In the "Syslog Format" dropdown, select the Enhanced Syslog option.Click the OK button to save the configuration.Configure InsightIDR to collect data from the event sourceAfter you complete the prerequisite steps and configure the event source to send data, you must add the event source in InsightIDR.To configure the new event source in InsightIDR:From the left menu, go to Data Collection and click Setup Event Source > Add Event Source.Do one of the following:Search for SonicWALL Firewall & VPN in the event sources search bar.In the Product Type filter, select Firewall.Select the SonicWALL Firewall & VPN event source tile.Choose your collector and select SonicWALL Firewall & VPN as your event source. You can also name your event source if you want.Choose the timezone that matches the location of your event source logs.Optionally choose to send unparsed logs.Configure your default domain and any advanced settings.Select a data collection method and specify a port and a protocol.Optionally choose to Encrypt the event source if choosing TCP by downloading the Rapid7 Certificate.Click the Save button.Sample logsHere is a typical parseable log entry that is created by the event source:1"SSLVPN: id=sslvpn sn=xxxxxx time="2018-03-27 20:25:06" vp_time="2018-03-28 00:25:06 UTC" fw=0.0.0.0 pri=5 m=1 c=1 src=0.0.0.0 dst=0.00.0 user="user" usr="user" msg="User login successful" portal="VirtualOffice" domain="DomainName" agent="SonicWALL NetExtender for Windows 7.5.216 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1)""Event codes parsed by InsightIDRRefer to this event code table to find the event codes that InsightIDR parses, the associated event messages, and the document types that are produced. SonicWALL event codes appear in the logs using the formatting m=.Event code tableEvent codeLog event messageDocument type36TCP connection droppedFirewall37UDP packet droppedFirewall38ICMP packet dropped due to PolicyFirewall39-Firewall40-Firewall41Unknown protocol droppedFirewall97Web site hitFirewall98Connection OpenedFirewall139XAUTH Succeeded with VPN %sIngress Authentication237VPN zone remote user login allowedIngress Authentication608IPS Detection Alert: %sIDS609IPS Prevention Alert: %sIDS809Gateway Anti-Virus Alert: %sAdvanced Malware1080SSL VPN zone remote user login allowedIngress Authentication1110Assigned IP address %sHostName To Ip. How to Configure SSL VPN on Sonicwall TZ Series. Miguel Fra Sonicwall Sonicwall, VPN. Sonicwall SSL-VPN is the preferred VPN connection method to
Configuring Firewall SSL VPN Settings - SonicWall
Firewall Analyzer supports most of the versions of SonicWALL Firewall devices. Carry out the following configuration depending upon your requirement. To get Live reports using Syslog Configuring SonicWALL To Direct Log Streams Configuring SonicWALL Logging Level Configuring SonicWALL to get 'IPFIX with extension' flow information How to enable application control in SonicWALL devicesTo get Live reports using SyslogEnable 'default' (syslog) format in the SonicWALL firewall to get live reports using syslog Configuring SonicWALL To Direct Log Streams Log in to the SonicWALL appliance Click Log on the left side of the browser window Select the Log Settings tab Type the IP address of the Firewall Analyzer server in the Syslog Server text box Click Update at the bottom of the browser windowConfiguring SonicWALL Logging Level Log in to the SonicWALL appliance Click Log on the left side of the browser window Select the View tab Select the Logging Level as Informational from the combo box Click Update at the bottom of the browser windowWhenever you create an access rule in the SonicWALL Firewall, ensure that 'Enable Logging' check box is selected for the particular rule.Restart the SonicWALL appliance for the changes to take effect. Configuring SonicWALL to get 'IPFIX with extension' flow informationFirewall Analyzer supports the IPFIX flow collection from SonicWALL devices. SonicWALL provides netflow with extended features called 'IPFIX with extension'. This flow support is available in SonicOS version 5.8 and above. Note: If syslog is already being forwarded from SonicWALL device and if you configure IPFIX, the SonicWALL device will be added as a new device in Firewall Analyzer with Firewall's LAN IP address as device name. If you configure IPFix flow logs, only Traffic and Security reports are supported. IPFIX with Extensions Configuration ProceduresTo configure IPFIX with extensions flow reporting, follow the steps listed below. Select 'Send AppFlow and Real-Time Data To EXTERNAL Collector' check box to enable flows to be reported to an external flow collector. Note: After enabling to send the data and completing the configuration, ensure that you restart the SonicWALL firewall device. Only after restart, the device will send the data to the external collector (i.e., the Firewall Analyzer). Select 'IPFIX with extensions' as the External Flow Reporting Type from the drop down list, if the Report to EXTERNAL flow collector option is selected. Next, specify the External Collector’s IP address (the IP address of the Firewall Analyzer) in the provided field To reach the external collector (i.e., the Firewall Analyzer) using a VPN tunnel, specify the Source IP of the VPN tunnel in the 'Source IP to Use for Collector on a VPN Tunnel' field. Specify the External Collector’s UDP port number (the UDP port number in which the Firewall Analyzer isHow to Configure SSL VPN in SonicWall: A Step-by
Message, and more. Your firewall log analyzer at a glance – even on the go Set up PRTG in minutes and use it on almost any mobile device.PRTG monitors these vendors and applications in one view! Find the root cause of the problem with our PRTG firewall analyzer software Real-time notifications mean faster troubleshooting so that you can act before more serious issues occur. PRTG is compatible with all major vendors, products, and systems FortiGate VPN OverviewThe FortiGate VPN Overview sensor monitors the virtual private network (VPN) connections of a Fortinet FortiGate system. It can show the following: Number of SSL clients that are connected Number of IPsec tunnels that are down Number of IPsec tunnels that are up SNMP SonicWall VPN Traffic The SNMP SonicWall VPN Traffic sensor monitors the traffic of an Internet Protocol Security (IPsec) VPN on a SonicWall Network Security Appliance (NSA) . It can show the following: Number of encrypted and decrypted packets Encrypted and decrypted transmissions Number of incoming and outgoing fragmented packets SNMP Cisco ASA VPN Connections The SNMP Cisco ASA VPN Connections sensor monitors the VPN connections on a Cisco Adaptive Security Appliance. It can show the following: Number of active email IPsec, L2L, SVC, and LB sessions Total number of active sessions Number of active (WebVPN) users Number of groups with active users Create innovative solutions with Paessler’s partnersPartnering with innovative vendors, Paessler unleashes synergies to create new and additional benefits for joined customers. Martello By integrating PRTG with Martello iQ, you can add a fast analytics layer to improve uptime, visualize your IT environment, and integrate all of your IT systems into a single pane of glass. Read more NetBrain Integrating monitoring results from PRTG into NetBrain maps makes the foundation for network automation. Read more Siemon Siemon and Paessler bring together intelligent building technology and advanced monitoring and make your vision of intelligent buildings and data centers become reality. Read more “Excellent tool for detailed monitoring. Alarms and notifications work greatly. Equipment addition is straight forward and server initial setup is very easy. ...feel safe to purchase it if you intend to monitor a large networking landscape.”Infrastructure and Operations Engineer in the Communications Industry, firm size 10B - 30B USD PRTG makes firewall management monitoring as easy as it gets Custom alerts and data visualization let you quickly identify downtime of your firewalls and prevent cybersecurity threats. Firewall analyzer:. How to Configure SSL VPN on Sonicwall TZ Series. Miguel Fra Sonicwall Sonicwall, VPN. Sonicwall SSL-VPN is the preferred VPN connection method toDell SonicWALL SSL VPN Configuration - YouTube
Those categories. It is recommended to exclude the Online Banking and Health categories due to privacy concerns. Resolution for SonicOS 6.2 and BelowThe below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.When accessing a website you get an error stating your connection is not secure.This is caused by not having the DPI-SSL resigning Certificate installed as a Trusted Root Certification Authority on this device.You need to download the SonicWall DPI SSL certificate from the appliance interface in DPI-SSL | Client SSL | CertificatesInternet Explorer/Chrome: Open Internet Explorer. Go to Tools | Internet Options, click the Content tab and click Certificates. Click the Trusted Root Certification Authorities tab and click Import. The Certificate Import Wizard will guide you through importing the certificateFirefox: Go to Tools | Options, click the Advanced tab and then the Certificates Tab. Select the Authorities tab, and click Import. Select the certificate file make sure the Trust this CA to identify websites check box is selected, and click OK.When accessing a website you get an error Secure Connection Failed(SEC_ERROR_INADEQUATE_KEY_USAGE)This is caused when the certificate used doesn't have resigning authority from your CA.This process can be automated in a Windows Domain Environment using Group Policy. You can see the following article: Distributing the Default SonicWall DPI-SSL CA certificate to client computers using Group PolicyCertificate Errors in Browsers - Self-signed certificateWhen Client DPI-SSL is enabled, accessing a few websites may cause the browser to display a certificate error. The specific error message could vary with different browsers. In Firefox it would show invalid security certificate and in Chrome the error message is Invalid Certificate Authority. In the certificate details, we would see the certificate is self-signed.This error occurs rarely with some websites. This error occurs when the server sends a certificate signed by a CA not in the SonicWall's certificate store forcing the SonicWall to re-sign the certificate as self-signed certificate.To resolve this issue, export the Root CA certificate of the website (either from a PC not intercepted by DPI-SSL or by disabling DPI-SSL temporarily) and import it into the SonicWall certificate store.This is done from System | Certificates | ImportBy default, when a server presents a certificate which cannot be verified by Client DPI-SSL because the Root CA is not present in its certificate store, it re-writes the certificate as a self-signed certificate. This default behavior of the SonicWall can be changed.Go to the diag page of the SonicWall by entering Under the DPI-SSL section, enable the option Block connections to sites with untrusted certificatesClick on Accept to save the change. CAUTION: This is not recommended. Client DPI-SSL and non-browser applicationsThere are certain applications which do not work when Client DPI-SSL is enabled though the SonicWall Client DPI-SSL CA certificate is imported into the certificate store. This is because such applications and/or websites do certificate pinning or SSL pinning. Certificate pinning is an extra checkComments
DescriptionWhen client connects to SonicWall SSL-VPN using Netextender from his computer he will get the error "Connection failure: no routes found!" as below.CauseThe reason for this error is, that no Address Objects were selected in the Client Routes of the SSL VPN settings as below.On Gen7 devices (Firmware on 7.x):On Gen6 (Firmware 6.x) and Gen5 (Firmware 5.x) devices: Resolution for SonicOS 7.XThis release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.Login to your SonicWall Management page.Navigate to Network > SSL VPN > Client Settings, Click on configure Default Device Profile used by SSL VPN.Go to the Client Routes tab, add required Address Objects from Networks to Client Routes.Click OK at the bottom of the page to accept the changes.Resolution for SonicOS 6.5This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.The resolution for this issue is to add the required Address Object in the Client Routes section as below and accept the changes.Login to your SonicWall Management page.Navigate to Manage > SSL VPN > Client Settings, Click on Configure, under Client Routeson the right side select required Address Object in Add Client Routes.Click Accept at the bottom of the page to accept the changes. Resolution for SonicOS 6.2 and BelowThe below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.The resolution for this issue is to add the required Address Object in the Client Routes section as below and accept the changes.In Gen 5 - SonicOS (5.8 & below) and Gen 6 - SonicOS (6.1 & above)Login to your SonicWall Management page.Navigate to SSL VPN > Client Routes, on the right side select required Address Object in Add Client Routes.Click Accept at the top of the page to accept the changes. It will be update at the bottom of that section as shown in the below picture.In Gen 5 -SonicOS (5.9 & above)Login to your SonicWall management page.Navigate to SSL VPN > Client Settings, on the right side configure Default Device Profile used by SSL VPN.Go to the Client Routes tab, add required Address Objects from
2025-04-20DescriptionUsing SonicWall Mobile Connect For iPhone and iPadSonicWall Mobile Connect is an app for iPhone and iPad that enables secure, mobile connections to private networks protected by SonicWall security appliances.To get started with SonicWall Mobile Connect: Install SonicWall Mobile Connect from the App Store. Enter connection information (server name, username, password, etc.). Initiate a connection to the network. SonicWall Mobile Connect establishes a SSL VPN tunnel to the SonicWall security appliance. You can now access resources on the private network. All traffic to and from the private network is securely transmitted over the SSL VPN tunnel. Apple Product Support iPhone 5 and newer – running Apple iOS 5 or higher. iPhone 4S – running Apple iOS 5 or higher. iPhone 4 – running Apple iOS 4.2 or higher. iPhone 3GS – running Apple iOS 4.2 or higher. iPhone 3G – running Apple iOS 4.2 or higher. iPad 2 – running Apple iOS 4.2 or higher. iPad – running Apple iOS 4.2 or higher. iPod Touch (2nd Generation or later) – running Apple iOS 4.2 or higher. SonicWall Appliance SupportSonicWall Mobile Connect is a free app, but requires a concurrent user license on one of the following SonicWall solutions in order to function properly. SonicWall Aventail E-Class Secure Remote Access (SRA) appliances running 10.5.4 or higher. SonicWall SRA appliances running 5.5 or higher. SonicWall Next-Generation Firewall appliances including the TZ, NSA, E-Class NSA running SonicOS 5.8.1.0 or higher. Required Network InformationIn order to use SonicWall Mobile Connect, you will need the following information from your network administrator or IT support. Server name or address – This is either the IP address or URL of the SSL VPN server that you will connect to. Username and password – Typically, you will be required to enter your username and password, although some connections
2025-04-17Configuring the SSL VPN Web Portal On the SSL VPN > Portal Settings page, you configure the appearance and functionality of the SSL VPN Virtual Office web portal. The Virtual Office portal is the website where users log in to launch NetExtender or access internal resources by clicking Bookmarks. It can be customized to match any existing company website or design style. Portal Settings Portal Logo Settings Portal Settings The portal settings customize what the user sees when attempting to log in. Configure the options as needed to match your company’s requirements. Go to NETWORKS | SSL VPN > Portal Settings. Option Definitions Portal Site Title: Enter the text to display as the top title of the portal page in this field. The default is SonicWall - Virtual Office. Portal Banner Title: Enter the text to display next to the logo at the top of the page in this field. The default is Virtual Office. Home Page Message: Enter the HTML code for the message to display above the NetExtender icon. Type your own text or click EXAMPLE TEMPLATE to populate the field with a default template that you can keep or edit. Click PREVIEW to see what the Home Page Message looks like. Login Message: Enter the HTML code for the message to display when users are prompted to log into the Virtual Office. Type your own text or click EXAMPLE TEMPLATE to populate the field with a default template that you can keep or edit. Click PREVIEW to see what the Login Message looks like. The following options customize the functionality of the Virtual Office portal: Enable HTTP meta tags for cache control recommended) - Select to insert into the browser HTTP tags that instruct the web browser not to Display UTM management link on SSL VPN portal
2025-04-03(not recommended)- Select to display the SonicWALL appliance’s management link on the SSL VPN portal. This option is not selected by default. It is recommended not to select this option. This option only applies to the Internet Explorer browser on PCs running Windows when Use Selfsigned Certificate is selected from the Certificate Selection drop-down menu on the SSL VPN > Server Settings page. Portal Logo Settings This section describes the settings for configuring the logo displayed at the top of the Virtual Office portal. Default Portal Logo – Displays the default portal logo which is the SonicWall logo. Use Default SonicWall Logo – Select this checkbox to use the SonicWall logo supplied with the appliance. This option is not selected by default. Customized Logo (Input URL of the Logo) — Enter the URL for the logo you want to display. The logo must be in GIF format of size 155 x 36; a transparent or light background is recommended.
2025-04-19SonicWALL Firewall provides network security by blocking attacks, preventing advanced threats, and other features. When you connect SonicWALL to InsightIDR, you can parse events for firewall, IDS, and VPN events.To get started:Configure SonicWALL SyslogCreate a Firewall Event SourceConfigure SonicWALL SyslogYou can configure syslog forwarding to the InsightIDR Collector on your SonicWALL Firewall.To do so:Sign in to your SonicWALL console.On the top menu, select the Manage link.On the bottom of the left menu, go to "Logs & Reporting" and expand the Log Settings dropdown.Select the Syslog page.On the "Syslog Settings" page, click the Add button to add a syslog server.From the "Name or IP Address" dropdown, select IP Address and add the IP address of your InsightIDR Collector.Provide the unique port on your InsightIDR Collector that will accept firewall traffic.In the "Syslog Format" dropdown, select the Enhanced Syslog option.Click the OK button to save the configuration.Configure InsightIDR to collect data from the event sourceAfter you complete the prerequisite steps and configure the event source to send data, you must add the event source in InsightIDR.To configure the new event source in InsightIDR:From the left menu, go to Data Collection and click Setup Event Source > Add Event Source.Do one of the following:Search for SonicWALL Firewall & VPN in the event sources search bar.In the Product Type filter, select Firewall.Select the SonicWALL Firewall & VPN event source tile.Choose your collector and select SonicWALL Firewall & VPN as your event source. You can also name your event source if you want.Choose the timezone that matches the location of your event source logs.Optionally choose to send unparsed logs.Configure your default domain and any advanced settings.Select a data collection method and specify a port and a protocol.Optionally choose to Encrypt the event source if choosing TCP by downloading the Rapid7 Certificate.Click the Save button.Sample logsHere is a typical parseable log entry that is created by the event source:1"SSLVPN: id=sslvpn sn=xxxxxx time="2018-03-27 20:25:06" vp_time="2018-03-28 00:25:06 UTC" fw=0.0.0.0 pri=5 m=1 c=1 src=0.0.0.0 dst=0.00.0 user="user" usr="user" msg="User login successful" portal="VirtualOffice" domain="DomainName" agent="SonicWALL NetExtender for Windows 7.5.216 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1)""Event codes parsed by InsightIDRRefer to this event code table to find the event codes that InsightIDR parses, the associated event messages, and the document types that are produced. SonicWALL event codes appear in the logs using the formatting m=.Event code tableEvent codeLog event messageDocument type36TCP connection droppedFirewall37UDP packet droppedFirewall38ICMP packet dropped due to PolicyFirewall39-Firewall40-Firewall41Unknown protocol droppedFirewall97Web site hitFirewall98Connection OpenedFirewall139XAUTH Succeeded with VPN %sIngress Authentication237VPN zone remote user login allowedIngress Authentication608IPS Detection Alert: %sIDS609IPS Prevention Alert: %sIDS809Gateway Anti-Virus Alert: %sAdvanced Malware1080SSL VPN zone remote user login allowedIngress Authentication1110Assigned IP address %sHostName To Ip
2025-04-15