SonicWALL TZ 190 Manuale Utente

Pagina di 843
Common Criteria
32
SonicOS Enhanced 4.0 Administrator Guide
  •
GMS Remote Management
  •
Syslog Logging
  •
SonicPoint
  •
Hardware Failover
Before installing the SonicWALL Internet Security Appliance, the device should be examined 
for evidence of tampering. Each device includes a tamper-evident seal to prevent access to the 
inside of the unit. Verify that the tamper evident seal is intact. If there is a sign of tampering, 
contact SonicWALL Support Services by phone at 888.777.1476 or 408.752.7819.
The GUI management interface is used to administer the device. The use of the GUI 
management interface is discussed in the “Use of GUI Interface for Local Management” section 
below.
The Common Criteria evaluated configuration only supports SonicOS Enhanced 4.0. You can 
verify that the device is running SonicOS Enhanced 4.0 from the System -> Status page of the 
management GUI under the System Information table, Firmware Version entry.
Use of GUI Interface for Local Management
This section describes the use of the SonicWALL Graphical User Interface (GUI) interface for 
local management. Using the red cross-over cable supplied with SonicWALL Internet Security 
Appliances and a management PC, the SonicWALL GUI can be used for local configuration. 
This provides a secure way of administering the device without the possibility of traffic between 
the management PC and device being captured or traced. Following the instructions below will 
insure that only the management PC, directly connected to the device, can be used for 
management.
Follow the instructions in the SonicOS Getting Started Guide section 2, Connecting the Network 
Cables, to connect a management PC to the device.
Follow the instructions in the SonicOS Getting Started Guide section 2, Configuring Your 
Management Station and Accessing The Management Interface to access the management 
interface of the device 
Select an interface to be used as the local management interface. For example, on a PRO 
series appliance, select X2 or X3.
Use the Add button on the Network -> Zones page to add a “Local Management” with a 
Security Type of Trusted. On the Network -> Interfaces page, configure the local management 
interface. Set the Zone to “Local Management”. Set the IP Address to 192.168.1.1. Set the 
Subnet Mask to 255.255.255.0. Enable HTTP Management. Log out from the GUI management 
interface using the Logout button.
Connect the red cross-over cable to the local interface. Configure the management PC's IP 
address to be 192.168.1.2 with a netmask of 255.255.255.0. Use the management PC's 
browser to access the device's management interface at http://192.168.1.2.
Use the Configure icon on the Network -> Interfaces page to configure the LAN interface. 
Disable HTTP and HTTPS management.
Do not enable HTTP or HTTPS management on any interface other than the local management 
interface. HTTP and HTTPS management is disabled on all other interfaces by default.
The management PC can now be used to locally administer the device in a secure manner.