
Using PortShield Interfaces
19
Configuring PortShield Interfaces
Configuration steps
This example has the uses the following zones and PortShield interfaces:
Zones
• LAN: Default LAN zone configuration.
–
Used for Office PortShield Group.
–
All SonicWALL Security Services enabled.
• Residents: A custom zone for the General Users PortShield group. Residents is a Wireless zone with
SonicPoint Enforcement disabled so it can be used like a LAN with mixed wired and wireless
clients.
–
Used for the Residents PortShield group.
–
Zone Type: Wireless
–
All SonicWALL Security Services enabled.
–
Only allow traffic generated by a SonicPoint is not checked, disabling SonicPoint
Enforcement. This setting allows the zone to be used for both wired and wireless traffic.
–
Enable Wireless Guest Services is checked. With SonicPoint enforcement disabled, this
enables both wired and wireless guest services.
–
Enable Dynamic Address Translation (DAT) is checked. With SonicPoint enforcement
disabled, this enables DAT for both wired and wireless guests.
• DMZ: Default DMZ zone configuration.
–
Used for Opt port.
–
All SonicWALL Security Services enabled.
PortShield Groups
The small business example uses six PortShield interfaces.
• LAN: for office use
–
LAN zone
–
2 ports, 1 - 2. These ports are assigned to LAN by not assigning them to another PortShield
interface.
–
2 desktop workstations
–
no wireless access
• Resident1 through Resident20
–
Resident custom Wireless zone with SonicPoint enforcement disabled
–
1 port for each PortShield interface, from 3 to 24
–
One outlet in apartment
–
Wireless Guest Services enabled--both wireless and wired
• Wireless_Access
–
Resident custom Wireless zone with SonicPoint enforcement disabled
–
2 ports, 23 - 24
Commentaires sur ces manuels