IMPORTANT: Use caution if selecting the VERBOSE option. |
1 |
Select AppFlow in the left-hand pane to display the Flow Reporting page. |
2 |
Open the Settings tab. |
4 |
Open the External Collector tab and make the following configuration changes: |
• |
Select the Send Flows and Real-Time Data To External Collector check box. |
• |
Set the External Flow Reporting Format to IPFIX with extensions. |
• |
Select the Send IPFIX/Netflow Templates At Regular Interval check box. |
• |
Select the Send StaticAppFlow At Regular Interval check box. |
• |
In the Send Static AppFlow For Following Tables field, use the drop-down menu to select the following tables: |
• |
• |
• |
In the Send Dynamic AppFlow For Following Tables field, use the drop-down menu to select the following tables: |
• |
• |
Clear the Report On Connection OPEN check box. |
• |
Select the Report On Connection CLOSE check box. |
• |
Clear the Report Connection On Active Timeout check box. |
• |
Clear the Report Connection On Kilo BYTES Exchanged check box. |
• |
In the Report Connections On Following Updates field, use the drop-down menu to select the following options: |
5 |
Click the Accept button in the upper left corner of the Flow Reporting page to accept the configuration changes. If prompted, do NOT select to restart the firewall at this time. |
6 |
7 |
In the Gateway Anti-Virus Global Settings pane, select the Enable Gateway Anti-Virus check box. Optionally, configure the remaining Gateway Anti-Virus Global Settings pane options. |
|
8 |
Click the Accept button in the upper left corner of the Gateway Anti-Virus page to accept the configuration changes. |
9 |
From the expanded Security Services section, select Intrusion Prevention. |
10 |
In the IPS Global Settings pane, select the Enable IPS check box. |
11 |
For each of the Signature Groups (High Priority Attacks, Medium Priority Attacks and Low Priority Attacks) select the corresponding Detect All check box. Optionally, select the Prevent All check box for each group. |
12 |
Click the Accept button in the upper left corner of the Intrusion Prevention page to accept the configuration changes. |
13 |
From the expanded Security Services section, select Anti-Spyware. |
14 |
In the Anti-Spyware Global Settings pane, select the Enable Anti-Spyware check box. |
15 |
For each of the Signature Groups (High Danger Level Spyware, Medium Danger Level Spyware and Low Danger Level Spyware) select the corresponding Detect All check box. Optionally, select the Prevent All check box for each group. |
|
16 |
Click the Accept button in the upper left corner of the Anti-Spyware page to accept the configuration changes. |
17 |
From the expanded Security Services section, select Botnet Filter. |
18 |
Verify that the Check Block connections to/from Botnet Command and Control Servers check box is selected. You may also make changes to the current settings. |
19 |
Click the Accept button to save any configuration changes. |
20 |
21 |
In the App Control Global Settings sections, select the Enable App Control check box. |
22 |
Click Accept to save. |
23 |
26 |
Click the OK button to close the dialog and return to the Zone page. |
28 |
Once you have finished configuring zones, click the Accept button to save the configuration. |
• |
IMPORTANT: Restarting will disconnect all users. |
• |
Click the Restart button. |
30 |
Once the firewall has rebooted, select AppFlow in the left-hand pane to display the Flow Reporting page. |
31 |
Open the External Collector tab and sequentially click the following buttons approximately 2 minutes apart, to generate template and static data for the configured SonicWALL Processor service: |
© 2025 One Identity LLC. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center