
Using PortShield Interfaces
28
Configuring PortShield Interfaces
SonicOS Enhanced 3.1 Release
Configure the Zones
This example uses five zones inside its network, LAN, DMZ, General, Warehouse, and Kiosk.
Configure the five Zones used in this example. Follow the procedures in Chapter 14, Configuring Zones.
LAN and DMZ: Leave the default configuration for these two zones.
General: Configure the General zone with the following values:
• General tab settings:
–
Name: General
–
Security Type: Wireless. Select Wireless so you can use the same context for both wired
connections and the SonicPoints.
–
Allow Interface Trust: Checked
–
Enforce Content Filtering Service: Checked
–
Enforce Network Anti-Virus Service: Checked
–
Enable Gateway Anti-Virus Service: Checked
–
Enable IPS: Checked
–
Enforce Global Security Clients: Check to manage SonicWALL Global Security Client
settings
–
Create Group VPN: Check to provide a GroupVPN policy for users to log into when you
enforce WiFiSec security.
• Wireless tab settings:
–
Only allow traffic generated by a SonicPoint: Leave this option unchecked. This disables
SonicPoint enforcement, allowing both wired and wireless connections through this zone.
–
WiFiSec Enforcement: Only check this option if you want to enforce WiFiSec security,
requiring your residents to use a VPN client to connect.
Komentarze do niniejszej Instrukcji