SonicWALL
My experience with SonicWALL is mostly with their NSa series firewalls. The projects I worked on involve
Securely exposing a locally hosted web server:
- Configured “Allow Policies” – To allow incoming traffic to enter a network typically from a given source IP.
- Configured “Deny Policies” – Although firewalls have implicit deny policies further restrictions were sometimes needed. For this project the firewall was configured to drop all incoming traffic originating from non-US IP. This was in response to several unauthorized connection attempts from countries like Russia.
- Port Forwarding – In order to permit the public to reach a locally hosted server port forwarding specifically for port 80 and 443 needs to be configured (port 80 were forwarded to port 443 for security purposes).
- NAT – To translate the public FQDN of the web server to its IP address.
- PAT – To map the web servers public IP to its private IP.
- DHCP – Although DHCP is typicality done on a DHCP server SonicWALL has limited yet effective DHCP capabilities. The web server required a private IP address which it got from the firewall.
- VLAN – The web server was secured inside a VLAN of its own.
Creating a secure site-to-site connection
- This connection was created between a LAN and AWS for business continuity and disaster recovery purposes.
Network QoS configuration
- Prioritize video conferencing traffic during the pandemic and resolve ongoing latency issues that occurred during peak working hours.
Content Filtering
- In order to prevent employees from accessing malicious sites implement an effective firewall content filter based on the SonicWALLs content filter database.