Security Best Practices for TZ 180 Running SonicOS Standard
12
SonicWALL TZ 180 Recommends Guide
Map logged IP address
to machine name for
identification
On the
Log > Name
Resolution page, set
it to
DNS then NetBIOS
and click the
Apply
button in the upper-right-hand part
of the screen to save and activate the
change. This lets the appliance apply more
a “friendly” name to the IP address in the
log, including the NetBIOS names of
systems on the LAN, which is easier than
using a non-fixed IP address. Do not use
this setting if you are using DNS servers
supplied by your ISP.
For more information on
mapping a logged IP address,
refer to the “Configuring Name
Resolution” chapter in the
SonicOS Standard 3.8
Administrator’s Guide.
Keep backups
Store known-good preferences and
firmware in a safe place that is accessible in
the event of problems with the appliance,
and verify the appliance is always under a
valid service and software support contract.
Disaster recovery can be fairly painless if
you follow these policies.
For more information on
keeping backups, refer to the
“Configuring System Settings”
chapter in the
SonicOS Standard
3.8 Administrator’s Guide.
Control physical access
Other measures are irrelevant if you do not
limit physical access to the security
appliance itself, as it can be easily reset and
illegally accessed if an intruder can get to
the security appliance.
For more information on
controlling physical access,
refer to the “Mounting
Instructions” chapter in the
SonicWALL TZ 180 Series
Getting Started Guide.
Solution
Description
Related Information