
Using PortShield Interfaces
9
Configuring PortShield Interfaces
11. Click on a checkbox in the User Login area. This is a special feature that enables you to set up a
Web access environment so you can enforce User Level Authentication. For more detail, see your
SonicOS Administration Guide.
12. Click on the Create Default DHCP Lease Scope in the DHCP Server field to indicate that the amount
of time allowed for an IP address issued by DHCP will be the default.
Note This option only appears when creating a PortShield interface, not when editing an existing
PortShield interface. You can make changes to the interface’s DHCP settings after creating an
interface from the DHCP Server environment (Network>DHCP Server).
13. Click on the Switch Ports tab. The management software displays the PortShield Interface Ports
dialog box.
14. In the Available Ports list, click on the port numbers you want to assign to the PortShield interface
and click on the right arrow (->) button to move them into the Assigned Ports list.
15. Click Ok. The management software adds the PortShield interface to the interface list.
Creating a New Zone for the PortShield Interface
You may want to create a zone for a PortShield interface that has different attributes to it than any of the
default zones provide. To create a new zone for a PortShield interface, perform the following:
1. Click on the Zone list box and click on the Create new zone option. The management software
displays the General Settings dialog box.
2. Type a string in the Name field that will identify the new zone.
3. Click on the Security Type list box and click on a security type option that will classify the zone as
having a certain level of access. The choices are:
–
Trusted. This security type offers the highest level of security, indicating that only trust,
indicating that the least amount of scrutiny is applied to traffic coming from trusted zones.
Trusted security can be thought of as being on the LAN (protected) side of the device. The LAN
zone is always Trusted.
–
Public. This security type offers a higher level of security than an Untrusted zone, but a lower
level of trust than a Trusted zone. Public zones can be thought of as being a secure area between
the LAN (protected) side of the device and the WAN (unprotected) side. The DMZ, for example,
is a Public zone because traffic flows from it to both the LAN and the WAN.
–
Wireless. This security type applies to the WLAN zone or any zone where the only interface to
the network consists of SonicWALL SonicPoint devices. You typical use WiFiSec to secure
traffic in a wireless zone.
4. After selecting the security level for the PortShield interface, click on one of the checkboxes that
enables a security service for the zone. The following table details:
Checkbox Description
Allow Interface Trust Automates the creation of Access Rules to allow traffic to flow
between the interfaces of a zone instance.
Enforce Content Filtering
Service
Enforces protection and productivity policies for organizations to
reduce legal and privacy risks while minimizing administration
overhead.
Komentáře k této Příručce