Sonicwall 06C 802.11b/g/n Router User Manual SonicWALL TZ 210 Series Getting Started Guide

Sonicwall, Inc. 802.11b/g/n Router SonicWALL TZ 210 Series Getting Started Guide

Manual Part 3

Page 50  Configuring High Availability  4. Select the Enable Virtual MAC checkbox. Virtual MAC allows the Primary and Backup appliances to share a single MAC address. This greatly simplifies the process of updating network ARP tables and caches when a failover occurs. Only the switch to which the two appliances are connected needs to be notified. All outside devices will continue to route to the single shared MAC address.5. The Heartbeat Interval controls how often the two units communicate. The default is 5000 milliseconds; the minimum supported value is 1000 milliseconds.6. Set the Failover Trigger Level to the number of heartbeats that can be missed before failing over. By default, this is set to 5 missed heartbeats.7. Set the Probe Interval to the interval in seconds between probes sent to specified IP addresses to monitor that the network critical path is still reachable. This is used in logical monitoring. SonicWALL recommends that you set the interval for at least 5 seconds. The default is 20 seconds, and the allowed range is 5 to 255 seconds. You can set the Probe IP Address(es) on the High Availability > Monitoring screen.8. Set the Probe Count to the number of consecutive probes before SonicOS Enhanced concludes that the network critical path is unavailable or the probe target is unreachable. This is used in logical monitoring. The default is 3, and the allowed range is 3 to 10.9. The Election Delay Time is the number of seconds allowed for internal processing between the two units in the HA pair before one of them takes the primary role. The default is 3 seconds.10. Select the Include Certificates/Keys checkbox to have the appliances synchronize all certificates and keys.11. You do not need to click Synchronize Settings at this time, because all settings will be automatically synchronized to the Idle unit when you click Accept after completing HA configuration. To synchronize all settings on the Active unit to the Idle unit immediately, click Synchronize Settings. The Idle unit will reboot.12. Click Synchronize Firmware if you previously uploaded new firmware to your Primary unit while the Backup unit was offline, and it is now online and ready to upgrade to the new firmware. Synchronize Firmware is typically used after taking your Backup appliance offline while you test a new firmware version on the Primary unit before upgrading both units to it.13. When finished with all High Availability configuration, click Accept. All settings will be synchronized to the Idle unit automatically.TZ_210_GSG.book  Page 50  Friday, November 14, 2008  10:29 AM
SonicWALL TZ 210 Series Getting Started Guide  Page 51Configuring HA MonitoringOn the High Availability > Monitoring page, you can configure both physical and logical interface monitoring. By enabling physical interface monitoring, you enable link detection for the designated HA interfaces. The link is sensed at the physical layer to determine link viability. Logical monitoring involves configuring the SonicWALL to monitor a reliable device on one or more of the connected networks. Failure to periodically communicate with the device by the Active unit in the HA Pair will trigger a failover to the Idle unit. If neither unit in the HA Pair can connect to the device, no action will be taken.The Primary and Backup IP addresses configured on this page are used for multiple purposes:• As independent management addresses for each unit (only on X0 and X1 interfaces)• To allow synchronization of licenses between the Idle unit and the SonicWALL licensing server• As the source IP addresses for the probe pings sent out during logical monitoringTo set the independent LAN management IP addresses and configure physical and/or logical interface monitoring, perform the following steps on the Primary unit:1. Navigate to the High Availability > Monitoring page. 2. Click the Configure icon for the X0 interface.3. To enable link detection between the designated HA interfaces on the Primary and Backup units, leave the Enable Physical Interface Monitoring checkbox selected.4. In the Primary IP Address field, enter the unique LAN management IP address of the Primary unit.5. In the Backup IP Address field, enter the unique LAN management IP address of the Backup unit.TZ_210_GSG.book  Page 51  Friday, November 14, 2008  10:29 AM
Page 52  Configuring High Availability  6. In the Logical Probe IP Address field, enter the IP address of a downstream device on the LAN network that should be monitored for connectivity. Typically, this should be a downstream router or server. (If probing is desired on the WAN side, an upstream device should be used.) The Primary and Backup appliances will regularly ping this probe IP address. If both can successfully ping the target, no failover occurs. If neither can successfully ping the target, no failover occurs, because it is assumed that the problem is with the target, and not the SonicWALL appliances. But, if one appliance can ping the target but the other appliance cannot, failover will occur to the appliance that can ping the target.The Primary IP Address and Backup IP Address fields must be configured with independent IP addresses on the X0 interface (X1 for probing on the WAN) to allow logical probing to function correctly.7. SonicWALL recommends that you do not select Override Virtual MAC. When Virtual MAC is enabled, the SonicOS firmware automatically generates a Virtual MAC address for all interfaces. Allowing the SonicOS firmware to generate the Virtual MAC address eliminates the possibility of configuration errors and ensures the uniqueness of the Virtual MAC address, which prevents possible conflicts.8. Click OK.9. To configure monitoring on any of the other interfaces, repeat the above steps.10. When finished with all High Availability configuration, click Accept. All settings will be synchronized to the Idle unit automatically.Synchronizing SettingsOnce you have configured the HA settings on the Primary SonicWALL security appliance, it will automatically synchronize the settings to the Backup unit, causing the Backup to reboot. You do not need to click the Synchronize Settings button. However, if you later choose to do a manual synchronization of settings, click the Synchronize Settings button. You will see a HA Peer Firewall has been updated notification at the bottom of the management interface page. Also note that the management interface displays Logged Into: Primary SonicWALL Status: (green ball) Active in the upper-right-hand corner.By default, the Include Certificate/Keys setting is enabled. This specifies that certificates, certificate revocation lists (CRL), and associated settings are synchronized between the Primary and Backup units. When local certificates are copied to the Backup unit, the associated private keys are also copied. Because the connection between the Primary and Backup units is typically protected, this is generally not a security concern.Tip: A compromise between the convenience of synchronizing certificates and the added security of not synchronizing certificates is to temporarily enable the Include Certificate/Keys setting and manually synchronize the settings, and then disable Include Certificate/Keys.TZ_210_GSG.book  Page 52  Friday, November 14, 2008  10:29 AM
SonicWALL TZ 210 Series Getting Started Guide  Page 53Verifying HA FunctionalityTo verify that Primary and Backup SonicWALL security appliances are functioning correctly, wait a few minutes, then trigger a test failover by logging into the Primary unit and powering it off. The Backup SonicWALL security appliance should quickly take over. After a failover to the Backup appliance, all the pre-existing network connections must be re-established, including the VPN tunnels that must be re-negotiated.From your management workstation, test connectivity through the Backup SonicWALL by accessing a site on the public Internet. Note that unless virtual MAC is enabled, the Backup SonicWALL will not assume the Ethernet MAC address. Log into the Backup SonicWALL’s unique LAN IP address. The management interface should now display Logged Into: Backup SonicWALL Status: (green ball) Active in the upper-right-hand corner.Now, power the Primary SonicWALL back on, wait a few minutes, then log back into the management interface. If the Backup SonicWALL is active, you can use the shared IP address to log into it. If you are using the Monitor Interfaces feature, experiment with disconnecting each monitored link to ensure correct configuration.Multiple ISP / WAN Failover and Load BalancingWAN Failover and Load Balancing allows you to designate an interface as a Secondary or backup WAN port. The secondary WAN port can be used as a backup if the primary WAN port is down and/or unavailable, or it can maintain a persistent connection for WAN port traffic to divide outbound traffic flows between the Primary fixed WAN port and the user-assigned Secondary WAN port.This section contains the following subsections:•Configuring Secondary WAN Interface - page 55•Activating and Configuring WAN Failover - page 55•Configuring WAN Interface Monitoring - page 56•WAN Probe Monitoring Overview - page 56•Configuring WAN Probe Monitoring - page 57TZ_210_GSG.book  Page 53  Friday, November 14, 2008  10:29 AM
Page 54  Multiple ISP / WAN Failover and Load Balancing  X1 WANIn this scenario, the SonicWALL TZ 210 is configured in NAT/Route mode to operate as a network gateway with multiple Internet Service Providers (ISPs) to allow load balancing and/or failover. Typical zone assignments for this scenario are as follows:Local Network (LAN) - wired local client computers and serversMultiple Internet (WAN) - two Internet service providers connected through X1 and a second open port (X3 in this case)DMZ - (optional) wired resources available to public Internet such as Web servers and Mail serversWireless (WLAN)* - wireless local client computers and devices*For the TZ 210 wired appliance, wireless is achieved by adding a SonicWALL SonicPoint appliance to any free interface (X4-X5) and zoning that interface as WLAN.Multiple ISP / WAN Failover and Load BalancingWireless ClientsWireless DevicesWireless (WLAN)Outdoor AccessSonicWALLSonicPointSONICPOINTTZ_210_GSG.book  Page 54  Thursday, November 13, 2008  7:41 PM
SonicWALL TZ 210 Series Getting Started Guide  Page 55Configuring Secondary WAN InterfacePerform the following steps to configure WAN Failover and Load Balancing on the SonicWALL security appliance:1. On Network > Interfaces page, configure the chosen port to be in WAN zone, and enter the correct address settings provided by the Secondary ISP. Note: In the example Multiple ISP / WAN Failover and Load Balancing section, on page 53, the SonicWALL security appliance is acquiring its secondary WAN address dynamically from ISP #2, using DHCP. Any interface added to the WAN zone by default creates a NAT policy allowing internal LAN subnets to enforce NAT on this Secondary WAN interface.Activating and Configuring WAN FailoverTo configure the SonicWALL for WAN failover and load balancing, follow the steps below:1. On Network > WAN Failover & LB page, select Enable Load Balancing. 2. If there are multiple possible secondary WAN interfaces, select an interface from the Secondary WAN Ethernet Interface.TZ_210_GSG.book  Page 55  Thursday, November 13, 2008  7:41 PM
Page 56  Multiple ISP / WAN Failover and Load Balancing  3. Select a load balancing method. By default, the SonicWALL will select  Basic Active/Passive Failover as the method, but there are four load balancing methods available:Configuring WAN Interface MonitoringUnder the WAN Interface Monitoring heading, you can customize how the SonicWALL security appliance monitors the WAN interface:1. Enter a number between 5 and 300, in the Check Interface Every _ Seconds field. The default value is 5 seconds.2. In the Deactivate Interface after _ missed intervals, enter a number between 1 and 10. The default value is 3, which means the interface is considered inactive after 3 consecutive unsuccessful attempts. 3. Enter a number between 1 and 100 in the Reactivate Interface after _ successful intervals. The default value is 3, which means the interface is considered active after 3 consecutive successful attempts. WAN Probe Monitoring OverviewIf Probe Monitoring is not activated, the SonicWALL security appliance performs physical monitoring only on the Primary and Secondary WAN interfaces, meaning it only marks a WAN interface as failed if the interface is disconnected or stops receiving an Ethernet-layer signal. This is not an assured means of link monitoring, because it does not address most failure scenarios (for example, routing issues with your ISP or an upstream router that is no longer passing traffic). If the WAN interface is connected to a hub or switch, and the router Basic Active/Passive FailoverOnly sends traffic through the Secondary WAN interface if the Primary WAN interface has been marked inactive. If the Primary WAN fails, then the SonicWALL security appliance reverts to this method. This mode will automatically return back to using the Primary WAN interface once it has been restored (preempt mode).Per Destination Round-RobinLoad balances outgoing traffic on a per-destination basis. This is a simple load balancing method which allows you to utilize both links in a basic fashion (instead of the method above, which does not utilize the capability of the Secondary WAN until the Primary WAN has failed).Spillover-Based Allows you to control when and if the Secondary interface is used. You can specify when the SonicWALL security appliance starts sending traffic through the Secondary WAN interface. Percentage-BasedSpecifies the percentages of traffic sent through the Primary WAN and Secondary WAN interfaces.Optionally, enable Source and Destination IP Address Binding: Enables you to maintain a consistent mapping of traffic flows with a single outbound WAN interface, regardless of the percentage of traffic through that interface.TZ_210_GSG.book  Page 56  Thursday, November 13, 2008  7:41 PM
SonicWALL TZ 210 Series Getting Started Guide  Page 57providing the connection to the ISP (also connected to this hub or switch) were to fail, the SonicWALL will continue to believe the WAN link is usable, because the connection to the hub or switch is good.Enabling probe monitoring on the Network > WAN Failover & Load Balancing page instructs the SonicWALL security appliance to perform logical checks of upstream targets to ensure that the line is indeed usable. Under the default probe monitoring configuration, the SonicWALL performs an ICMP ping probe of both WAN ports’ default gateways. Unfortunately, this is also not an assured means of link monitoring, because service interruption may be occurring farther upstream. If your ISP is experiencing problems in its routing infrastructure, a successful ICMP ping of their router causes the SonicWALL security appliance to believe the line is usable, when in fact it may not be able to pass traffic to and from the public Internet at all. To perform reliable link monitoring, you can choose ICMP or TCP as monitoring method, and can specify up to two targets for each WAN port.Configuring WAN Probe MonitoringTo configure WAN probe monitoring, follow these steps:1. On the Network > WAN Failover & Load Balancing page, under the WAN Interface Monitoring heading, select the Enable Probe Monitoring checkbox.2. Select the Respond to Probes checkbox to have the SonicWALL security appliance respond to SonicwALL TCP probes received on any of its WAN ports. Do not select this checkbox if the SonicWALL security appliance should not respond to TCP probes.3. Select the Any TCP-SYN to Port checkbox to instruct the SonicWALL security appliance to respond to TCP probes to the specified port number without validating them first. The Any TCP-SYN to Port box should only be selected when receiving TCP probes from SonicWALL security appliances running SonicOS Standard or older, legacy SonicWALL security appliances. TZ_210_GSG.book  Page 57  Thursday, November 13, 2008  7:41 PM
Page 58  Multiple ISP / WAN Failover and Load Balancing  4. If there is a NAT device between the two appliances sending and receiving TCP probes, the Any TCP-SYN to Port checkbox must be selected, and the same port number must be configured here and in the Configure WAN Probe Monitoring window.5. Click on the Configure button. The Configure WAN Probe Monitoring window is displayed. 6. In the Primary WAN Probe Settings menu, select one of the following options:• Probe succeeds when either Main Target or Alternate Target responds• Probe succeeds when both Main Target and Alternative Target respond• Probe succeeds when Main Target responds• Succeeds Always (no probing)7. Select Ping (ICMP) or TCP from the Probe Target menu.8. Enter the host name or IP address of the target device in the Host field. 9. Enter a port number in the Port field.10. If there is a NAT device between the two devices sending and receiving TCP probes, the Any TCP-SYN to Port checkbox must be selected, and the same port number must be configured here and in the Configure WAN Probe Monitoring window.11. Select the SNWL? checkbox if the target device is a SonicWALL security appliance. Do not select the SNWL? box for third-party devices, as the TCP probes may not work consistently.12. Optionally, you can enter a default target IP address in the Default Target IP field. In case of a DNS failure when a host name is specified, the default target IP address is used.13. An IP address of 0.0.0.0 or a DNS resolution failure will use the Default Target IP configured. If 0.0.0.0 is entered and no default target IP address is configured, the default gateway on that interface will be used.14. Configure the Secondary WAN Probe Settings, which provide the same options as the Primary WAN Probe Settings.15. Click OK.TZ_210_GSG.book  Page 58  Thursday, November 13, 2008  7:41 PM
SonicWALL TZ 210 Series Getting Started Guide  Page 59Support and Training OptionsIn this Section:This section provides overviews of customer support and training options for the SonicWALL TZ 210 series appliances.•Customer Support - page 60•Knowledge Portal - page 60•Onboard Help - page 61•SonicWALL Live Product Demos - page 61•User Forums - page 62•Training - page 63•Related Documentation - page 64•SonicWALL Secure Wireless Network Integrated Solutions Guide - page 656TZ_210_GSG.book  Page 59  Thursday, November 13, 2008  7:41 PM
Page 60  Customer Support  Customer SupportSonicWALL offers Web-based and telephone support to customers who have a valid Warranty or who purchased a Support Contract. Please review our Warranty Support Policy for product coverage. SonicWALL also offers a full range of consulting services to meet your needs, from our innovative implementation services to traditional statement of work-based services.For further information, visit: <http://www.sonicwall.com/us/support/contact.html>Knowledge PortalThe Knowledge Portal allows users to search for SonicWALL documents based on the following types of search tools:•Browse• Search for keywords• Full-text searchFor further information, navigate to the Support > Knowledge Portal page at: <http://www.mysonicwall.com/>TZ_210_GSG.book  Page 60  Thursday, November 13, 2008  7:41 PM
SonicWALL TZ 210 Series Getting Started Guide  Page 61Onboard HelpSonicOS features a dynamic Onboard Help in the form of helpful tooltips that appear over various elements of the GUI when the mouse hovers over them. Elements that display these tooltips include text fields, radio buttons, and checkboxes.SonicWALL Live Product DemosThe SonicWALL Live Demo Site provides free test drives of SonicWALL security products and services through interactive live product installations:• Unified Threat Management Platform• Secure Cellular Wireless• Continuous Data Protection• SSL VPN Secure Remote Access• Content Filtering• Secure Wireless Solutions• Email Security• SonicWALL GMS and ViewPointFor further information, visit:<http://livedemo.sonicwall.com/>TZ_210_GSG.book  Page 61  Thursday, November 13, 2008  7:41 PM
Page 62  User Forums  User ForumsThe SonicWALL User Forums is a resource that provides users the ability to communicate and discuss a variety of security and appliance subject matters. In this forum, the following categories are available for users:• Content Security Manager topics • Continuous Data Protection topics • Email Security topics • Firewall topics • Network Anti-Virus topics • Security Services and Content Filtering topics • SonicWALL GMS and Viewpoint topics • SonicPoint and Wireless topics • SSL VPN topics • TZ 210 / Wireless WAN - 3G Capability topics• VPN Client topics • VPN site-to-site and interoperability topics For further information, visit:<https://forum.sonicwall.com/>TZ_210_GSG.book  Page 62  Thursday, November 13, 2008  7:41 PM
SonicWALL TZ 210 Series Getting Started Guide  Page 63TrainingSonicWALL offers an extensive sales and technical training curriculum for Network Administrators, Security Experts and SonicWALL Medallion Partners who need to enhance their knowledge and maximize their investment in SonicWALL Products and Security Applications. SonicWALL Training provides the following resources for its customers:• E-Training• Instructor-Led Training• Custom Training• Technical Certification• Authorized Training PartnersFor further information, visit:<http://www.sonicwall.com/us/training.html>TZ_210_GSG.book  Page 63  Thursday, November 13, 2008  7:41 PM
Page 64  Related Documentation  Related DocumentationSee the following related documents for more information:• SonicOS Enhanced Administrator’s Guide• SonicOS Enhanced Release Notes• SonicOS Enhanced Feature Modules• Dashboard• High Availability• Multiple Admin• NAT Load Balancing• Packet Capture• Radio Frequency Monitoring• Single Sign-On• SSL Control• Virtual Access Points• SonicWALL GMS 5.0 Administrator’s Guide• SonicWALL GVC 4.0 Administrator’s Guide• SonicWALL ViewPoint 5.0 Administrator’s Guide• SonicWALL GAV 4.0 Administrator’s Guide• SonicWALL IPS 2.0 Administrator’s Guide• SonicWALL Anti-Spyware Administrator’s Guide• SonicWALL CFS Administrator’s GuideFor further information, visit: <http://www.sonicwall.com/us/support.html>TZ_210_GSG.book  Page 64  Thursday, November 13, 2008  7:41 PM

Navigation menu