Skip to content

TechRepublic

  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Security

SonicWALL Firewalls Close Up

By Mark W. Kaelin October 10, 2006, 3:53 AM PDT

Image
1
of 26

sonic_wall_thumbnail.jpg
sonic_wall_thumbnail.jpg
SonicWALL Firewalls Close Up

SonicWALL Firewalls Close Up

SonicWALL Firewalls Close Up

SonicWALL firewalls have been protecting the SMB space for 15 years. With its own operating system (SonicOS), and installed base of some 650,000 units, SonicWALL offers a variety of hardware devices designed to provide secure Internet, VPN and firewall services.

This gallery is supported by a TechRepublic article.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_101.jpg

sonic_wall_101.jpg

SonicWALL’s TZ 150 leads off the company’s product lineup. The unit boasts 64MB of RAM, 8MB of flash memory a stateful throughput of 30 Mbps.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_102.jpg

sonic_wall_102.jpg

The four-port TZ 150u00e2u20acu2122s looks are deceiving. A seemingly simple box, the device provides powerful firewall, VPN, filtering, networking (including DHCP, NAT, VOIP and DDNS) and logging capabilities. The unit supports up to 2,000 connections and 20 firewall policies.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_103.jpg

sonic_wall_103.jpg

SonicWALLu00e2u20acu2122s TZ 170 wireless device provides secure wireless communications, in addition to SonicWALLu00e2u20acu2122s SonicOS firewall and networking services, and supports stateful throughput up to 90 Mbps.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_104.jpg

sonic_wall_104.jpg

The SonicWALL TZ 170 features Console, WAN, optional zone and five 10/100 Ethernet ports. The device includes 64MB of RAM and 8MB of flash memory and supports 2,000 connections and 100 SonicOS Standard firewall policies (250 SonicOS Enhanced).

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_105.jpg

sonic_wall_105.jpg

Frequently deployed in small businesses, the SonicWALL TZ 170 features a base plate that offers a number of mounting options. The device can easily be set on a shelf or secured on a wall next to a punch down block.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_106.jpg

sonic_wall_106.jpg

SonicWALL’s PRO 1260 is a workhorse. Often deployed in small and medium businesses, the 1U rack mountable unit provides advanced firewall, security and network services.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_107.jpg

sonic_wall_107.jpg

The PRO 1260 boasts 90 Mbps stateful throughput, supports up to 6,000 connections and 500 firewall policies and includes 64MB of RAM and 8MB of flash memory.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_108.jpg

sonic_wall_108.jpg

Numerous wizards simplify SonicOS administration. Here the Setup Wizard begins on a SonicWALL PRO 1260.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_109.jpg

sonic_wall_109.jpg

The SonicWALL’s Setup Wizard’s welcome screen walks administrators through device setup and configuration.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_110.jpg

sonic_wall_110.jpg

To enhance security, one of the very first tasks the Setup Wizard undertakes is a password change.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_111.jpg

sonic_wall_111.jpg

When completing the PRO 1260 Setup Wizard, administrators must next specify the time zone and whether the devices should automatically adjust the clock for daylight saving time.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_112.jpg

sonic_wall_112.jpg

The SonicWALL wizard prompts for information regarding the WAN type. You can select from Static IP, DHCP, PPPoE or PPTP.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_113.jpg

sonic_wall_113.jpg

When selecting Static IP, SonicWALL’s Setup Wizard prompts the administrator to specify critical network information.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_114.jpg

sonic_wall_114.jpg

Once static IP information has been entered, the Setup Wizard requests that administrators specify the SonicWALL’s LAN network settings.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_115.jpg

sonic_wall_115.jpg

In order to enable DHCP, a valid IP address range must be specified. The Setup Wizard provides this menu for entering the DHCP information.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_116.jpg

sonic_wall_116.jpg

Once network settings have been entered, the Setup Wizard provides a confirmation screen listing the settings that will be applied. To apply the settings, the administrator must click the Apply button.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_117.jpg

sonic_wall_117.jpg

The SonicWALL Setup Wizard will display a window showing that the device’s configuration is being updated.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_118.jpg

sonic_wall_118.jpg

When the Setup Wizard completes, administrators are shown a confirmation screen that looks like this one.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_119.jpg

sonic_wall_119.jpg

Alternatively, instead of wizards, administrators can choose to configure the SonicOS using the numerous menus. Here the PRO 1260’s network interfaces are displayed. Each can be configured by clicking the Configure icon that appears at the end of each entry.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_120.jpg

sonic_wall_120.jpg

DHCP settings configured using the Setup Wizard can be overridden, or updated, using the DHCP menu.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_121.jpg

sonic_wall_121.jpg

The SonicOS is user friendly, in that it works to provide as much information as possible. Here, whenever an administrator mouses-over an entry, the SonicOS provides additional information about that port.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_122.jpg

sonic_wall_122.jpg

Routing policies are configured using simple menus. A wide variety of sources, destinations, services, gateways and interfaces, combined with the myriad number of potential combinations, provide powerful routing capabilities.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_123.jpg

sonic_wall_123.jpg

Once firewall access rules are in place, they can be viewed using the SonicWALL’s SonicOS Firewall menu. Here the default settings are displayed from a TZ 150 model.

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_124.jpg

sonic_wall_124.jpg

The main Status window provides a wealth of information. Here information is provided for a TZ170 Wireless device that’s bridging three subnets (10.0.0.1, 192.168.168.1 and 172.16.31.1).

By Erik Eckel

SonicWALL Firewalls Close Up

sonic_wall_125.jpg

sonic_wall_125.jpg

When powering wireless connections, the SonicWALL TZ 170 provides complete statistics and configuration information for its wireless access point.

By Erik Eckel

  • Security
  • Account Information

    Share with Your Friends

    SonicWALL Firewalls Close Up

    Your email has been sent

Share: SonicWALL Firewalls Close Up
Image of Mark W. Kaelin
By Mark W. Kaelin
Mark W. Kaelin has been writing and editing stories about the information technology industry, software, hardware, gaming, finance, accounting, and technology geekdom for more than 30 years.
  • Account Information

    Contact Mark W. Kaelin

    Your message has been sent

  • |
  • See all of Mark W.'s content

Daily Tech Insider

If you can only read one tech story a day, this is it.

Cybersecurity Insider

Stay abreast of the latest cybersecurity news, solutions, and best practices

TechRepublic Premium

  • TechRepublic Premium

    Payroll Processing Checklist

    Some operations and tasks don’t require painstaking attention to detail. Unfortunately, processing payroll isn’t one of them. With sensitive salary and wage information, bank and direct deposit accounts, Social Security numbers and other personal information in play, the stakes are high. This guide — and the accompanying spreadsheet — from TechRepublic Premium will help you ...

    Published:  November 30, 2023, 4:00 PM EST Modified:  December 1, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quality Assurance Checklist For Outsourced Projects

    Quality assurance refers to the processes being used to manage the project and to build the deliverables. This is in contrast to quality control, which refers to the activities used to create the deliverables. Because you are not responsible for the creation of the deliverables (quality control), you need to be comfortable that the outsourcer ...

    Published:  November 29, 2023, 4:00 PM EST Modified:  November 30, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Cloud Computing Policy

    The list of advantages to cloud computing include lowered operational costs, greater technological flexibility and the ability to rapidly implement new systems or services. Gains in business continuity are an especially noteworthy attraction to cloud services, which operate via remote systems that remain running in the event of a local disaster, such as a hurricane ...

    Published:  November 29, 2023, 4:00 PM EST Modified:  November 30, 2023, 10:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Business Intelligence and Analytics

    Business intelligence and data analytics give tech decision makers a clearer idea of how well their companies are running and whether they’re meeting goals. Because BI incorporates data from across the enterprise — revenue operations, sales, supply chain and logistics — its insight is beneficial in areas such as customer profiling, customer support and market ...

    Published:  November 28, 2023, 4:00 PM EST Modified:  November 29, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • Editorial Policy
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice
CLOSE

Create a TechRepublic Account

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

Already registered? Sign In
Use Facebook
Use Linkedin

* - indicates required fields

CLOSE

Sign in to TechRepublic

Not a member? Create an account
Use Facebook
Use Linkedin

Lost your password? Request a new password

CLOSE

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support.

Back to login
1 Finish Profile
2 Newsletter Preferences
CLOSE

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

No thanks, continue without
1 Finish Profile
2 Newsletter Preferences
CLOSE

Want to receive more TechRepublic news?

Newsletter Name
Subscribe
Daily Tech Insider
Daily Tech Insider AU
TechRepublic UK
TechRepublic News and Special Offers
TechRepublic News and Special Offers International
Executive Briefing
Innovation Insider
Project Management Insider
Microsoft Weekly
Cloud Insider
Data Insider
Developer Insider
TechRepublic Premium
Apple Weekly
Cybersecurity Insider
Google Weekly
Toggle All
No thanks, continue without

You're All Set

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add newsletters@nl.technologyadvice.com to your contacts list.

Back to Home Page