This article is also available as a TechRepublic download.
networks are a two-edged sword. WLANs empower employees
and guests, but they also introduce security risks.
a wide variety of wireless strategies and devices are implemented, one very
common solution involves deploying SonicWALL
wireless-equipped firewalls. Here’s what you need to know to configure SonicWALL wireless equipment. In
these examples, we’ll use a SonicWALL TZ 170 SP
Wireless model, one of the most frequently encountered
wireless routers in the field, although the steps will also work on other SonicWALL TZ wireless devices.
SonicWALL TZ wireless routers
SonicWALL’s TZ wireless-equipped routers include several features not
found on the non-wireless counterparts. In addition to protecting LANs with
wireless intrusion detection services, which help monitor unauthorized access
and the presence of rogue access points, a separate firewall exists for
securing and separating wireless traffic from the wired LAN.
IPSec encryption and WPA team together to secure wireless communications between
clients and the access point. Guest services can be configured, if desired, as
can HotSpot messaging. Yet another feature SonicWALL wireless-equipped routers possess is distributed
WLAN support for SonicPoint satellite access points.
SonicWALL wireless routers support both the 802.11b and 802.11g
standards. In most installations the SonicWALL device
serves as the access point for the network’s wireless clients. A traditional
UTP cable typically connects the router to the rest of the network.
help prevent unauthorized network access, wireless clients must be
authenticated by the SonicWALL’s User Level
Authentication. The devices also support a variety of security protocols,
including WEP, WPA and WPA-EAP.
Selecting the access point location
a location for the wireless access point is the first step in configuring a
wireless network. SonicWALL lists several
recommendations for optimizing wireless performance:
- Place the wireless access point as close to the
network’s center as possible. Doing so helps reduce wireless signals from
persisting beyond the intended location.
- Place the wireless access point in such a manner that
minimizes the number of walls and ceilings the wireless communications
must travel from the access point to intended client systems.
- Attempt to locate wireless devices within each unit’s
line of site.
- Wireless performance degrades whenever wireless access
points are located near large solid obstructions such as walls, filing
cabinets, elevator shafts, fire doors, large machinery and similar
objects, so avoid place access points in locations where its wireless
signals must penetrate such elements whenever possible. Even smaller
metallic objects, such as PC and server cases, monitors and other
equipment, can negatively impact wireless communications.
- If building or remodeling a site, remember that metal
framing materials, UV window films, concrete and metallic-based paints all
reduce the access point’s effective operating range.
- Locate access points in higher locations (in which
radio signals can avoid filing cabinets, desks, PCs and other low-lying
equipment) to help improve wireless performance.
- Avoid placing access points and client systems near
microwave ovens, television monitors, radios, and other electrical
equipment that produces interference that degrades WLAN performance.
proper location is selected, the next step is to configure the router’s
Configuring wireless settings
with other networking services, SonicWALL includes a
wizard to simplify wireless network deployment. To configure a SonicWALL wireless router using the supplied wizard:
- Log on to the SonicWALL
device as an administrator.
- Select the Wireless button from the left toolbar.
- Click the Wireless Wizard button that appears at the
top right of the Wireless Status menu.
- The SonicWALL Wireless
Configuration Wizard appears. Click Next to continue.
- The WLAN Network Settings configuration screen
displays. Ensure the Enable WLAN box is checked to enable the wireless
LAN. Enter the IP address you wish to use for the WLAN interface and
supply the corresponding subnet mask. The default SonicWALL
WLAN IP is 172.16.31.1. (Figure A)
|Ensure the Enable WLAN checkbox is selected and enter the IP address and
subnet mask you wish for the access point to use.
- Ensure the Enable Windows Networking Support between
LAN and WLAN box is checked to provide wireless clients with access to LAN
- The WLAN 802.11b/g Settings menu appears. Specify the
SSID (the default is sonicwall), specify the
radio mode (802.11g only is the default) and supply a country code and
channel settings (defaults are US and AutoChannel).
Then, click Next.
- The WLAN Security Settings menu appears. By default, SonicWALL’s wizard will deploy WiFiSec
VPN Security. Leave the option selected to implement a secure wireless
connection that leverages IPSec to complete wireless connections using the
SonicWALL Global VPN Client. Other options are
WEP + Stealth Mode and simple unencrypted connectivity. To ensure a more
secure connection, select WiFiSec VPN Security
and click Next.
- With WiFiSec VPN selected,
the next step prompts you to specify a user name and password for an
account possessing Group VPN permission to join the network. Supply the
user name and password and click Next.
- The Wireless Guest Services screen appears. If you wish
to enable guest services, ensure the option is selected and enter the
account name, password, account lifetime and session lifetime values, any
comments and click Next.
- A configuration summary screen appears listing the
settings that will be implemented. Review the configuration information
carefully and, once you’ve confirmed all is proper, click the Apply
- The SonicWALL wizard will
apply the changes. Upon finishing, the wizard will display a
congratulatory screen. Click Finish to complete the wizard.
Editing the wireless configuration
the wizard completes, you can review the wireless settings by logging on to the
router and clicking the Wireless button. The Status menu will display by
default. It reveals whether the WLAN and WiFiSec
security are enabled, displays channel information and critical IP address
data, among other items. (Figure B)
|SonicWALL’s Wireless Status menu displays
critical WLAN configuration information.
edit or update the WLAN configuration:
- Log on to the SonicWALL
device as an administrator.
- Click the Wireless button from the left navigation bar.
- Click Settings from the sub-navigation menu.
- Enter any required configuration changes. Among the
options you can edit from the Wireless | Settings menu are the device’s
role, the SSID, the radio channels used, the WLAN IP address and more.
Administrators also can disable the WLAN from this screen by removing the
checkbox from the Enable WLAN box.
- Once edits and updates are complete, click the Apply
button to save the changes.
device’s WEP/WPA configuration, meanwhile, is administered using the WEP/WPA
Encryption menu. Select the menu from the left navigation bar to change the
authentication type, WEP key mode and change the default key.
menu, reached by clicking Advanced from the Wireless sub-navigation menu,
administrators can disable SSID broadcasts, limit the number of maximum client
associations the access point can possess and set the unit’s transmission
strength, among other options. The Restore Default Settings button, found at
the bottom of this menu, supports returning the unit’s wireless settings to
Configuring MAC address filtering
introduce additional security, many administrators enable MAC filtering. For SonicWALL TZ
wireless devices you configure MAC filtering by:
- Logging on to the SonicWALL
router as an administrator.
- Click the Wireless button.
- Click the MAC Filter List option from the left
- Ensure the Enable MAC Filter List checkbox is selected.
|Ensure the Enable MAC Filter List option is checked, and be sure to add
authorized systems’ MAC addresses using the provided Add button. Alternatively,
you can also block specific MAC addresses using the Block radio button.
- Click Add and supply the MAC address for the system you
wish to provide with access to the WLAN. Once you add the MAC address,
it’ll appear within the MAC Filter List.
- Confirm the MAC addresses are properly set to Allow or
Block those systems connecting to the wireless network.
- Click the Apply button to store any changes you make.
the WLAN is configured, administrators should leverage the SonicWALL’s
intrusion detection capabilities to monitor and protect the wireless network.
Configuring intrusion detection
lower-end devices, SonicWALL wireless-equipped
routers can monitor intrusion attempts and even take steps to respond
appropriately when unauthorized traffic is detected. To configure Wireless
- Log on to the SonicWALL as an
- Click the Wireless button from the left navigation
- Click IDS from the sub-menu.
- Ensure the Enable Client Null Probing Detection, Enable
Association Flood Detection and Enable Rogue Access Point detection
checkboxes are selected.
- Supply the MAC addresses for any other authorized
access points using the provided Add button.
- Click the Apply button to save any changes you make. (Figure D)
|Wireless Intrusion Detection enables SonicWALL
routers to identify, log and dynamically respond to unauthorized wireless
Enable Client Null Probing feature allows the SonicWALL
device to detect and log Null Probes, such as those triggered by Netstumbler and other programs.
Flood Detection, meanwhile, monitors for wireless denial of service attacks
that attempt to overwhelm an access point with bogus traffic. Selecting the
Block Station’s MAC Address In Response To An
Association Flood allows the SonicWALL to defend
itself by logging such attacks and dynamically adding the MAC address of the
offending system to its blocked list.
Access Point Detection works by scanning for other access points. If other
access points are identified, they’re considered rogue unless they’re
specifically added as authorized access points.
enable detection logs, click Log | Categories and check the WLAN IDS box found
within the Log Categories and Alerts section. The subsequent logs should then
be reviewed periodically to ensure unauthorized access attempts are not
Subscribe to the Developer Insider Newsletter
From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays