Home
SonicWALL Welding System UTM Appliance User's Manual
Contents
1. SONICWALL Network Security Appliance Policy URL List Settings Policy Name Name My First Test Policy Step 4 Navigate to the URL List tab and select the categories you want to block or allow for this policy SONICWALL Network Security Appliance Policy URL List Settings Select Forbidden Categories C Select all Categorias e i ewe Hala fadin O 2 Search Erneta data Por bale 2 inbmate Apgarel Mvvesurt El 2 ee 3 Huka L 11 Web Gare eee e 4 Poregraghy fv Je Job Search 5 Winans O 33 Hews and Mees e 6 Achult Mature Conten 34 Perak acd Dalir 7 Quyoseult O 35 Usenet rene Groups LI S Dei Tio i LI 35 Refer ere Ll 3 Seca Solis tuessoneble Sols J 37 Reigo ajz Wyau bellewe haia Wieb site ts rated incamecty or you wish to submit a new URL click here Ready OK aa Step 5 Navigate to the Settings Tab and select if you want to enforce allowed domains forbidden domains or keywords in domains You can also choose to enforce Safe Search Safe Search enforcement is included with SonicOS 5 2 or higher NOTE Previous versions of SonicOS will require a custom Application Firewall policy Please refer to the Application Firewall guide for steps on creating the policy Safe Search Enforcement prevents users from changing default search engine results from safe filtered results to unrestricted content For example images that are found on images google com ar
2. 4SWL_STYLES CSS TYPE text css gt lt head gt lt body background HTTP fw_interface popup_error_bg gif gt lt EMBED SRC HTTP 10 1 1 101 noise12 wav HIDDEN true AUTOSTART true LOOP true gt lt div id popup_branding_bar gt lt img src HTTP fw_interface logo_popup gif width 280 height 39 alt gt lt div gt lt div align center gt lt br gt lt div id popup_error_box style width 500px gt lt div id popup_box_header gt lt div id alert_icon gt lt div gt lt div id popup_box_header_text style width 420px gt This site has been blocked by the network administrator 42 Tech Note lt div gt lt div gt lt div id popup_box_text gt lt table align center cellpadding 5 width 80 gt lt tr gt lt td align center gt lt font size 2 color 000000 gt lt br gt lt script gt lt l var blockedURL new String document URL blockedURL blockedURL replace lt g amp lt replace gt g amp gt if blockedURL length lt 50 document write lt b gt URL lt b gt blockedURL else document write lt b gt URL lt b gt blockedURL substring 0 50 gt lt script gt lt script type text javascript gt lt l function delayer window location HTTP www yahoo com gt lt script gt lt head gt lt body onLoad setTimeout delayer 5000 gt lt h2 gt Prepare to be redirected
3. WGS in SonicOS Standard e Wireless How to manually configure WGS Wireless Guest Services in SonicOS Enhanced Tz Series e Wireless How to manually configure WGS Wireless Guest Services in SonicOS Enhanced SonicWALL Pro Units e Wireless Creating Users in Wireless Guest Services WGS LHM Lightweight Hotspot Messaging External Authentication for Wireless Users LHM while outside the scope of this document does warrant mention here LHM provides a mechanism to authenticate wireless hotspot users to a backend server For example coffee shops restaurants and hotels have used LHM to build custom portals with their means of authenticating users billing customers for usage and tracking accounts Sonicwall provides the tools necessary to deliver such a solution in a flexible manner More information can be found in the Sonicwall KB articles by searching for LHM as well as the following link http www sonicwall com downloads SonicWALL_LHM pdf Created by Rob Andrews 4 30 09 with references amp content from existing Sonicwall KB articles SONICWALL gt of
4. Wireless CFS Policy Default F Enable Client AV Enforcement Service Step 2 Under the Wireless tab uncheck the box for Only allow traffic generated by a SonicPoint SonicPointN Unchecking this allows traffic on this zone to come from wired users SONICWALL Network Security Appliance General Wireless Guest Services Wireless Settings C SSLVPN Enforcement SSLVPN server Select an Cu oa SSLVPN service Select a senice SonicPoint Settings SonicPoint Provisioning Profile SoanicPoint Provisioning Profile SonicPoint Only allow traffic generated by a SonicPoint SonicPointN 56 Tech Note Its not that hard of a stretch to see that if you are using LDAP integration you could essentially build guest accounts and profiles in LDAP and then leverage that guest group in the same ways we ve shown above However that may be more time consuming then necessary for administrators especially when guests come and go frequently SonicOS supports creating local Guest Accounts within the context of the appliance s internal guest services This makes it easy to rapidly create guest accounts retire guest accounts and set restriction policies on guests such as time allowed online CFS login uniqueness and so forth To setup wireless guest services please follow the directions in the following knowledge base articles e Wireless How to manually configure the Wireless Guest Services
5. websites with monster in the URL will be blocked That would be monster com monsters com and so forth SONICWALL Network Security Appliance Application Object Settings Object Name Blocked Domains Application Object Type HTTF Host A Match Type Partial Match b Input Representation Alphanumeric Hexadecimal Enable Negative Matching Fi j List Update Joba facebook nyspace Remowe Load From File Remove All Ready 46 Tech Note Step 3 Navigate to Policies and add a new policy Give the policy a friendly name Select the Application Object that was just created Blocked Domains The action we will take in this example is drop reset You can then select the groups you wish to include or exclude from the policy The direction of traffic will be outgoing SONICWALL Network Security Appliance Application Firewall Policy Settings Policy Name Blocking Domains Policy Type HTTP Client w Source Destination Application Object Blocked Domains we Action Reset Drop Induded Exduded Schedule Enable Logging Log individual object a content Log Redundancy Filter i seconds Use Global Settings jo sd Connection Side Client Side Direction Basic O Advanced Outgoing 47 Tech Note When a user attempts to navigate to monster com they will be presented with a page cannot be displayed message Internet Explorer cann
6. 443 cp HPs EN Log 21 52 50 240 Access request 1352 X5 Rob x1 allowed View ae User login ategories ey _ bs eo 6 3 J09 Wen E 3 Hena Info Authenticated from an 192 168 6 213 80 Rob TCP HTTP Syslog 21251 45 944 Access internal zone 0 X5 Rob x5 allowed Automation m SonicOS Options That Leverage Groups Users Now that we have a means of authenticating users to the SonicWALL firewall we can leverage the groups users that are in LDAP Active Directory for a myriad of options e Create firewall rules for specific groups users e Create different content filtering policies for different groups e Create Application Firewall policies for specific groups users e Leverage IPS signatures for specific groups users e Allow deny VPN access for specific groups users e Allow deny VPN access to specific internal networks via VPN for specific groups users e Allow deny access to WLAN resources for specific groups users e Bandwidth Limit different groups users with Application Firewall Creating Firewall Rules with LDAP Groups Users Firewall rules get processed from top down As soon as a rule has a match further rule processing stops meaning you want the more specific rule at the top of the list and the more general rule below it The default rule in SonicOS for LAN gt WAN is to allow ANY user ANY service from ANY source This is a very unrestrictive rule but allows for an easy implementation The recommendation is to change the default r
7. SonicWALL with the same name as existing LDAP AD user groups allows SonicWALL group memberships and privileges to be granted upon successful LDAP authentication Alternatively you can manually create user groups on the LDAP AD server with the same names as SonicWALL built in groups such as Guest Services Content Filtering Bypass and Limited Administrators and assign users to these groups in the directory This also allows SonicWALL group memberships to be granted upon successful LDAP authentication The SonicWALL appliance can retrieve group memberships efficiently in the case of Active Directory by taking advantage of its unique trait of returning a memberOf attribute for a user 11 Tech Note Step 11 On the LDAP Relay tab configure the following fields RADIIS te LOAP Arlay Settings T Qrp UA Tom poe see rmm j uas er argi r L E ky piar psg 7 Pap m yay j SRA EAn eT Le Ag i RADIUS EE YE G imiia Ta EES MAL GUTES AEETI LANA DTi 1 ae S ot p a i T Tf p J y UF ogee yf Borge e om ae here Peery ir He Aide ro po Based CPE ET Puri a Lee Sd Peay A a a HE Lied Sa Sees ee a Pe be De Le er er The RADIUS to LDAP Relay feature is designed for use in a topology where there is a central site with an LDAP AD server and a central SonicWALL with remote satellite sites connected into it via older low end SonicWALL security appliances that may not support LDAP In that case the central SonicWALL can operat
8. a majority of HTTPS proxy sites However you still should leverage SSL control on top of this e Block all outgoing IKE VPN traffic with firewall rules You don t want users using an IPSec based client to traverse the WAN from the LAN Since the traffic within a VPN session is encrypted there is no way to inspect the payload e Change the default LAN gt WAN firewall rule from ANY ANY ANY allow to a deny rule instead Build up your rules for traffic you need to allow Yes this is more work and can break some applications as you work through the traffic you need to allow but ultimately you will have a more secure network e Leverage IPS Comb through the LOW priority signatures as they include signatures for things like P2P IM Skype UltraSurf etc Make sure to enable the respective signatures to restrict undesirable traffic SONICWALL gt 50 Tech Note e Turn on Gateway AV and Antispyware turn all settings on If you really want to block everything the most drastic step you can take is to unplug the firewall from the wall Applying Intrusion Prevention Service Signatures to Groups Users There are 2 different methods of leveraging IPS signatures The first method is with Application Firewall Since we ve already covered Application Firewall in some detail we ll move right into IPS signature management for groups users Step 1 Navigate to Security Services gt Intrusion Prevention Make sure to enable IPS and then ena
9. block page will now display the following SONICWALL Network Security Appliance A This site has been blocked by the network administrator URL Block reason Forbidden Category Tf you believe the below web site is rated incorrectly click here Click here to login and apply your personal filter policy Advanced Sample Code for SonicOS 5 2 In this scenario the user is displayed a custom block page That page then plays a sound file that is located on an internal server The user can login but if they do not they are automatically redirected to yahoo com after 5 seconds 41 Tech Note NOTE Use caution the website you are redirecting isn t on the CFS list or blocked domains It would create a looping situation AY This site has been blocked by the network administrator URL Prepare to be redirected This page is a time delay redirect Block reason Forbidden Category If you believe the below web site is rated incorrectly click here Click here to login and apply your personal filter policy lt html gt lt head gt lt meta HT TP equiv Content Type content text html gt lt title gt SonicWALL Web Site Blocked lt title gt lt style type text css gt body background color 01 1b4a warning color red FONT FAMILY arial verdana helvetica font size 16px font weight normal background color 9CBACE lt style gt lt link rel stylesheet href HTTP fw_interface
10. configuration does allow rules to be created that are identical in all but the user group information If two such rules were to be created the first one higher priority would always be matched and the other would not work This behavior may be changed in some future version of SonicOS to allow rule matching on the entire rule at once so as to allow multiple allow rules for different groups Also note that Deny rules cannot be created that specify any user or group The reason is that if you were to create a rule to deny access for specific users a user could bypass it and get access simply by logging out a user who is not logged in is unknown and therefore not a member of the user group to be denied To deny access to specific users you must create a rule with users allowed set to a user group that contains everyone who Is to be allowed access and make sure that the users to be denied are not members of it 19 Tech Note Firewall Rules with Bandwidth Management amp Logging lt is possible to leverage FW rules simply for logging and or bandwidth management BWM To enable BWM it is first necessary to go to Network gt Interfaces and configure the WAN interface Click the Advanced tab and then enable ingress and egress rates for your network These rates should correspond with what your Internet provider is capable of providing you Pa SONICWALL Network Security Appliance F General Advanced Protocol Advanced Set
11. during the TLS exchange matching the name specified above to the name on the certificate Deselecting this default option will present an alert but exchanges between the SonicWALL and the LDAP server will still use TLS only without issuance validation e Local certificate for TLS Optional to be used only if the LDAP server requires a client certificate for connections Useful for LDAP server implementations that return passwords to ensure the identity of the LDAP client Active Directory does not return passwords This setting is not required for Active Directory If your network uses multiple LDAP AD servers with referrals then select one as the primary server probably the one that holds the bulk of the users and use the above settings for that server It will then refer the SonicWALL on to the other servers for users in domains other than its own For the SonicWALL to be able to log in to those other servers each server must have a user configured with the same credentials user name password and location in the directory as the login to the primary server This may entail creating a special user in the directory for the SonicWALL login Note that only read access to the directory is required Step 6 On the Schema tab configure the following fields Settings Schema Directory Referrals LDAP Users LDAP Relay Test LDAP Schema LDAP Schema Microsoft Active Directory User Objects Object class Login
12. fields SONICWALL Network Security Appliance Settings Schema Directory Referrals LDAP Lisers LDAP Relay Test LDAP Server Port Number 636 Server timeout seconds Overall operation timeout minutes 2 D Anonymous login Give login name location in tree Give bind distinguished name Login password Protocol version LDAP version 3 a Use TLS SSL C Send LDAP Start TLS request Require valid certificate from server Name or IP Address The FQDN or the IP address of the LDAP server against which you wish to authenticate If using a name be certain that it can be resolved by your DNS server Also if using TLS with the Require valid certificate from server option the name provided here must match the name to which the server certificate was issued i e the CN or the TLS exchange will fail Port Number The default LDAP over TLS port number is TCP 636 The default LDAP unencrypted port number is TCP 389 If you are using a custom listening port on your LDAP server specify it here Server Timeout The amount of time in seconds that the SonicWALL will wait for a response from the LDAP server before timing out Allowable ranges are 1 to 99999 with a default of 10 seconds Anonymous Login Some LDAP servers allow for the tree to be accessed anonymously If your server supports this Active Directory generally does not then you may select this option Login User Name Spe
13. is authenticated the remote SonicWALL is notified to give the user the relevant privileges e User groups for legacy users with Internet access Defines the user group that corresponds to the legacy Allow Internet access when access is restricted privileges When a user in this user group is authenticated the remote SonicWALL is notified to give the user the relevant privileges NOTE The Bypass filters and Limited management capabilities privileges are returned based on membership to user groups named Content Filtering Bypass and Limited Administrators these are not SONICWALL gt 12 Tech Note configurable Step 12 Select the Test tab to test the configured LDAP settings Settings Schema Directory Referrals LDAP Users LDAP Relay Test Test LDAP Settings To test the LDAP settings enter a valid LDAP login name and password and click the Test button Note that this will apply any changes that have been made Password Test Test Password authentication CHAP j Test Status LDAP authentication succeeded Message from LDAP Returned User Attributes Administrators Schema Admins Enterprise Admins Domain Adming Group Policy Creator Owners CN Administrator CN Users DC caveman DC local The Test LDAP Settings page allows for the configured LDAP settings to be tested by attempting authentication with specified user and password credentials Any
14. lt h2 gt lt p gt This page is a time delay redirect lt p gt lt font gt lt td gt lt tr gt lt tr gt lt td align center gt lt font size 2 color 000000 gt lt br gt lt b gt Block reason Category lt b gt lt td gt lt font gt lt tr gt lt tr gt lt td align center nowrap gt lt font size 2 color 000000 gt lt br gt If you believe the below web site is rated incorrectly click lt a href HTTP cfssupport sonicwall com target new gt here lt a gt lt p gt lt p gt lt a href HTTP fw_interface gt Click here to login and apply your personal filter policy lt a gt lt font gt lt td gt lt tr gt lt table gt lt div gt lt div gt lt div id popup_box_reflection gt lt div gt lt div gt lt body gt lt html gt 43 Tech Note Sample JavaScript Code for SonicOS 5 2 In this example blockedURL is the variable that references the URL the client was trying to browse to In this example we are looking for facebook and then taking a unique action for that URL You could use this to redirect users or take custom actions against a defined list of URLs if blockedURL hitp www facebook com document write test This will write the word test in the block page if blockedURL http www facebook com window location HT TP www yahoo com This will redirect a user to yahoo com Sample Code for SonicOS 5 1 or Earlier lt html g
15. user group memberships and or framed IP address configured on the LDAP AD server for the user will be displayed Authentication There are two mechanisms available for having a user authenticate to the SonicWALL firewall The first mechanism is the Single Sign On agent SSO With SSO the authentication process is transparent and seamless to the end user All the user needs to do is login to the domain and the SSO takes care of the rest The next mechanism is the Local Non transparent Authentication The first time the user attempts to pass HTTP traffic through the appliance he or she will be redirected to login in to the appliance The user s login credentials will be tied to whichever back end mechanism was established i e LDAP AD the local user database etc Single Sign On Agent SSO For more details on how to implement and install the SSO please refer to following white papers Please be sure to search the Knowledge Base at Mysonicwall com for the most up to date content e HTTP Awww sonicwall com downloads AD auth with 30e and sc10 pdf e HITTP www sonicwall com downloads SonicOS 4 0 Single Sign On pdf e HTTP www sonicwall com downloads SonicOS 5 0 Single Sign On pdf SONICWALL gt 13 Tech Note Logon to Appliance Configuring User Level Authentication Settings This is the other method of authenticating users and requires the user to login to the appliance Please refer to the following paper for more details
16. A Eaa ea REEE RENE Tai 53 FLN PN NSE CNOI aE A E E A E EEEE E E E E E E 55 Guest Services Wireless Guest Services nnnsno0011n11nreosrernrerrerssrnnrrrersrnnnrrrrrossrnnrrrrerssnnnrrrrerssnsnrrrreensennnni 56 LHM Lightweight Hotspot Messaging External Authentication for Wireless USers ccsseceeeeeees 57 SONI Tech Note Integrating LDAP Active Directory with Sonicwall UTM SonicOS supports a range of different LDAP servers the most popular being Active Directory AD AD is also an LDAP implementation Please refer to the following paper as a supplement on how to configure LDAP settings htto www sonicwall com downloads LDAP_Integration Feature Module pdf LDAP over SSL Integrating your SonicWALL appliance with an LDAP directory service using SSL requires configuring your LDAP server for certificate management installing the correct certificate on your SonicWALL appliance and configuring the SonicWALL appliance to use the information from the LDAP Server NOTE SSL is not required for LDAP integration The downside is that user credentials are sent across the network unencrypted This is considered highly insecure Before beginning your LDAP configuration you should prepare your LDAP server and your SonicWALL for LDAP over TLS support This requires e Installing a server certificate on your LDAP server e Installing a Certificate Authority CA certificate for the issuing CA on your SonicWALL ap
17. Client GVC We will configure the WAN GroupVPN to support using LDAP credentials for authentication and access Step 1 Navigate to VPN gt Settings and configure the WAN GroupVPN policy VPN Policies Start Table Refresh IF Refresh Interval Items per page Items 1 to 3 oF 3 Eee C Name Gateway 1 WAN GroupVPN 3 WLAN GroupVPN Destinations ESP AES 256 HMAC SHA1 IKE ESP 3DES HMAC SHA1 IKE Crypto Suite Enable Configure g E Pd GVC supports the use of XAUTH for authenticating VPN users Under the Advanced tab set the Require Authentication of VPN clients via XAUTH setting Anyone that needs VPN access must be a member of the group that is selected 53 SONICWALL Tech Note NOTE Depending on how you setup your group membership being a member of this group does not automatically grant those users VPN access SONICWALL Network Secu rity Appliance General Proposals Advanced Client Advanced Settings C Enable windows Networking NetBIOS Broadcast C Enable Multicast Management via this SA C HF HTTPS SSH Default Gateway 0 0 0 0 Client Authentication Require Authentication of VPN Clients via XAUTH User Group for XAUTH users ActiveDirGroup Allusers Allow Unauthenticated VPN Client Access Select Local Network Step 2 Navigate to Users gt Local Groups and configure the group s that require VPN access Under the VPN Access tab select th
18. LL Network Security Appliance Application Firewall Action Settings Action Name Display Custom Block Page Action HTTP Block Page h Insert simple text or html markup here Content Blocking All Websites except a Select Few with Application Firewall Building a list of only allowed websites is often easier than creating a list of blocked sites for many organizations A common request is to create a white list of allowed domains and deny everything else Application Firewall gives you the ability to do this as well as creating different lists and applying them to different groups users The process is virtually identical to the steps shown above with one slight exception Under the Application Object select the box for Negative Matching In the below example only domains that match monster jobs facebook and myspace would be allowed All other domains will be denied ICWALL gt 49 i Tech Note SONICWALL Network Security Appliance Application Object Settings Object Name Only Allowed Domains Application Object Type HTTP Host ler k Match Type Fartial Match a 3 Input Representation Alphanumeric Hexadecimal Enable Negative Matching a Application Object List monster Certain Application Objects can utilize Update jobs Negative Matching Functionality Facebook Enabling Negative Matching For an Remove Application Object and then using such object in
19. O Groups instead of individual address objects For more details on how to create AO by using FQDN objects or MAC addresses refer to the follow paper Dynamic Objects HTTP www sonicwall com downloads Dynamic Address Objects FM pdf Step 1 Create an AO for google com by navigating to Network gt Address Objects Edit Address Object Microsoft Internet Ex Secs eT T SONICWALL Network Security Appliance Name Block Google Fone Assignment WAN w Type FODN ka FODN Hostname google com Ready La Internet G ioo 22 Tech Note Step 2 Create an AO for yahoo com Name Block Yahoo Zone Assignment WAN Type FQDN Hostname CE internet i Step 3 Now create an AO Group and add the appropriate AOs to this group gt Add Address Object Group Microsoft Internet Explorer provided by Sonic A af r tl SONICWALL Network Security Appliance Blocked sites ll Authorized Access Points A Block Google All Interface IP Block Yahoo All SonicPoints WAN IP ll XO Management 41 Management X2 Management ll X3 Management X4 Management X5 Management EB internet Qwom 23 Tech Note Step 4 Next create an FW rule that will deny traffic to the Blocked Sites AO Group Access Rules LAN gt WAN view Stee O AlRuess Matix Drop down Boxes auth Priority Source Dest
20. P All 45 Management IP Ready Step 3 Navigate to Firewall gt Access Rules 25 Tech Note Step 4 Create a rule to allow HTTP traffic for your allowed lists SONICWALL Network Security Appliance General Settings Action From Zone To fone Service SOUICE Destination Users Allowed Schedule Comment Enable Logging Advanced aos Allow O Deny Discard TATA EK Allowed Websites All LDAP Users w Allow Fragmented Packets 26 Tech Note Step 5 Do the same for HTTPS SONICWALL Network Security Appliance General Settings Action Allow Deny Discard From Zone LAN To Zone WAN Service SOUrCE Destination Allowed Websites Users Allowed All LDAP Users schedule Always on aii Doo Enable Logging Allow Fragmented Packets 2 Tech Note Step 6 Create the deny rules for HTTP and HTTPS SONICWALL Network Security Appliance General Advanced Qos Settings Action Allow Deny Discard From Zone LAN To Zone WAN Service HTTP ag Destination Any WH Users Allowed A Enable Logging Allow Fragmented Packets SONICWALL Network Security Appliance General Settings Action Allow Deny Discard From Zone LAN To fone WAN Service HTTPS b Source Any bee Destination Any Users Allowed All Schedule Always on Enable Logging Allow Fragmented Packe
21. P Address Range None Schedule Always on Log Redundancy Filter seconds Use Global Settings Applying Granular IM Policies Now if you wanted to prevent AIM file transfers for everyone navigate to the individual signature and configure it Gateway Anti Virus 18 AIM File Transfer v5 9 1963 Low Both to Client ri Intrusion Prevention We can override any global or category settings by managing individual signatures and applying them to whomever we desire In this example we ll block AIM transfers for all AD users including our administrators 52 Tech Note SONICWALL Network Security Appliance IPS Signature Settings Signature Category Signature Name Signature ID Priority Direction Prevention Detection Included Users Groups Excluded Users Groups Included IP Address Range Excluded IP Address Range Schedule Log Redundancy Filter seconds in AIM File Transfer v5 9 fi 963 Low Both to Client ActiveDirGroup Allusers Use Category Settings None Use Category Settings All Use Category Settings None Use Category Settings Always On Use Category Settings Applying VPN Access Policies to Groups Users SonicOS 5 2 supports 2 VPN clients Global VPN Client GVC an IPSec client and NetExtender a SSL VPN client Both clients can utilize LDAP groups users for authentication and access but each does it in a slightly different manner Global VPN
22. TechNote Leveraging LDAP Groups Users with SonicWALL UTM Appliance LDAP Contents OMS IIS rece a ses oe cecet A E ec ae E A E imma see erecta acces ele eee yas A 1 Integrating LDAP Active Directory with Sonicwall UTM cccccccssssseccceeeeeeaeeeeeeeeeeeeeeeeeeeeeeeeessaeaaeeeeeseeseaaaaeees 3 EDAP OVET Sh gs A eee severe E oars estas sige clas seen ae Aveo E eee 3 Configuring the CA on the Active Directory Server cccccccceecccccecceeseseeceeeeeeeaaeeeeeeeeeseuaeseeeeeeeesssaaaaeeeeeees 3 Exporting the CA Certificate from the Active Directory S rvel ccccccccsseseeeeceeeeeeaeeeeeeeeeeesaeeeeseeeeseessaasseeeeeees 4 Importing the CA Certificate Onto the SONICWALL mae aaa a E A E A a 4 Configuring the SonicWALL Appliance for LDAP ccccccccccceeecesesseeeeeeeeeeeeeeeeeeeeseseeaseeeeeeesssaaeeeeeeeeess 4 FUMIE TIME AMON svenesticansdevee eatenounseatecanmtnencaamenccamtoncan annnataaanienaaninen tan aanme aaa enna ncare lent cuaysisnninenaeatadenanteanaiarmcnenearanamrnes 13 Single Sign On Agent SSO cccccccsssececccescsceseseeeeeceecccceesaseeeceesccceesensecceesscccseseaeereesscceseeeeeeesecssccaseeeerees 13 Logon to Appliance Configuring User Level Authentication SettingS ccccccccccccssseeeceeeeeseeeeeesseeeeeeees 14 SonicOS Options That Leverage Groups USESS ccccccccsseseccceeeeeaeeeeeeeeeeeeeeeeeseeceeeeessseeeeeeeeeessaeaaeeeeeeeeeeseaas 17 Creating Firew
23. a policy would create a policy that will perform a specified Remowe All action based on absence NOT presence of the content specified in sad From File the Application Object For example creating an SMTP policy with a Filename extension abject type with Ready keywords txt specified would perform an action on any attachment which is NOT a txt attachment Tightening Control over the Browsing Behavior of Users Now that we ve looked at the different ways to restrict browsing and web behavior through different mechanisms I m sure ideas are spinning in your head on how you can apply these policies in your environment want to close the topic of web browsing with a small bit of advice Sophisticated users can drive network admins insane as they try to circumvent your usage policies It s an arms race at times There are a slew of proxy systems available on the internet VPN sites and client applications that can be run without admin privileges intended to circumvent your firewall filtering So what s the best way to deal with this ever evolving arms race will outline a list of steps you should take to really lock down the environment e SSL Control Turn this feature on and white list the HTTPS sites and services you want to allow Deny everything else e CFS Turn CFS on for your users and make sure to block hacking proxy avoidance sites and uncategorized sites Turn on IP based HTTPS filtering This will catch
24. affic while denying access to proxy sites that attempt to circumnavigate content filters or other disallowed services SonicOS Enhanced firmware versions 4 0 and higher include SSL Control a system for providing visibility into the handshake of SSL sessions and a method for constructing policies to control the establishment of SSL connections SSL is the dominant standard for the encryption of TCP based network communications with its most common and well known application being HTTPS HTTP over SSL SSL provides digital certificate based endpoint identification and cryptographic and digest based confidentiality to network communications Below is a diagram that outlines the process of an SSL session HTTPS Server Client browses to httpy mysonicwall com www soniowall com IP 64 47 140 173 2 DNS resolves target to 64 41 140 173 CA Client sends TCP SYN to 64 41 140 173 port 443 oO Server continues TCP setup with SYN ACK Client ACK s SSL Established Encrypted Data Begins Server sends Certificate Client sends Client Key Exchange server sends Encrypted Handshake TCP Session is Established SSL Begins Client sends GET to Host www sonicwall com An effect of the security provided by SSL is the obscuration of all payload including the Uniform Resource Locator URL for example https www mysonicwall com being requested by a client when establishing an HTTPS session This is due to the fact that HTTP is tra
25. ain used by your LDAP implementation For AD this will be the Active Directory domain name e g yourADdomain com Changes to this field will optionally automatically update the tree information in the rest of the page This is set to mydomain com by default for all schemas except Novell eDirectory for which it is set to o mydomain e User tree for login to server The location of where the tree is that the user specified in the settings tab For example in Active Directory the administrator account s default tree is the same as the user tree e Trees containing users The trees where users commonly reside in the LDAP directory One default value is provided which can be edited and up to a total of 64 DN values may be provided The SonicWALL will search the directory using them all until a match is found or the list is exhausted If you have created other user containers within your LDAP or AD directory you should specify them here e Trees containing user groups Same as above only with regard to user group containers and a maximum of 32 DN values may be provided These are only applicable when there is no user group membership attribute in the schema s user object and are not used with AD All the above trees are normally given in URL format but can alternatively be specified as distinguished names e g myDom com Sales Users could alternatively be given as the DN ou Users ou Sales dc myDom dc com The latter form wi
26. all Rules with LDAP Groups USEYPS cccccecccecceeeeeeeeeseeeeeeeeceueesseeeeeeeeaeaseeeeeeeessaeaeeeeeeeeees 17 Firewall Rules with Bandwidth Management amp Logging cccccsseseeecseseeeeseeeeeeseeseeeseeeeessegeeseeeneeeesaeeeeees 20 Blocking Websites Domain Names for Groups Users ccccseeccceeceeeeceeeeeaeeeeeeeseeesceeeesaeeeeeessaeeesesaagseeeees 22 Blocking Domains with Firewall RUIGS ccccccccccseececceeeeeeceeseeeeeeeeeeseaseeeseaueeeesaeeessaeeeeseeeessesseeessaeees 22 Allowing Specific Domains and Blocking All Others with Firewall Rules cccccccssseeeeeeeeeeseeeeeeseeeeeeeens 24 Blocking HTTPS SSL Domains with SSL Control cccccccccccesccceeeeeeeeeeseeeeeeeeeeaeeeeeeeeeeeseeeaeeeeeeeeessaeaaases 30 Configuring a SSL Blacklist and Whitelist ccceccccccccecsesseeeeeeeeeeeeeeeeseceeeeessaaeeeseeeeeeesssaaaeeeeeeseesansageees 31 Applying Different CFS Policies to Groups ccccccccccssseeeeeeeeeeeeaaeeeseeeeeeeeseeeseeeeeeessseeseseeeeeesssaaaseeeeeeeessaaaaesss 33 Creating Custom CFS POIICi S cccccceeccecccccecceeeeeeecceeeeeeaaeseeeeeeeseeeeasseeeeeeeesaaeaeeeeeeesaeaaaseeeeseseessaagaasss 35 Enforcing CFS Policies without Requiring All Users to Authenticate ccccececsseeeeeeeeeeeeeeeeeeeeeeeeeeeaeaeeees 39 Variables for Custom Block Page in SonicOS 5 2 oo ceccccecccccecesaeeeeeeceeeeeseaeeeeeeeeesssaaseeeeeeeeessaaaeeeeetes 40 Basi
27. arch of all trees that contain user objects To use auto configure first enter a value in the User tree for login to server field unless anonymous login is set and then click the Auto configure button to bring up the following dialog gt LDAP User Group Trees Auto Configure Windows Internet Expl al DR E https nsa5000 caveman local 444 ldapTreesAutoConf html The lists of sub trees within the given domain that contain user and user group objects will be automatically populated from the LDAP server s Domain to search caveman local Append to exisiting trees O Replace exisiting trees Note that if any sub domains on secondary LDAP servers do not automatically get referenced from the primary domain you can re run this to enter them individually Any secondary LDAP servers must have a user configured with the same credentials login name password and location in the directory as per the user thatis configured for login to the primary LDAP server If a secondary LDAP server holds multiple domains then you must do the domain that this user logs in to first on that server LE internet 100 Step 8 In the Auto Configure dialog box enter the desired domain in the Domain to search field Select one of the following o Append to existing trees This selection will append newly located trees to the current configuration o Replace existing trees This selection will start from scratch and remove all curr
28. ble IPS for your respective Zones With IPS you can categorically Prevent and or Detect different types of undesirable traffic IPS classifies signatures into 3 different categories High Medium and Low For amore granular approach to signature management disable the signature category setting and then manage signatures at the group or individual level In this first example we will block all instant messenger traffic for a group but allow it for others Blocking IM Traffic Categorically Step 1 Select IM from the category list and click on configure F a security Services Summary Content Filter IPS Policies Client AV Enforcement E View Style Category IM k Gateway Anti Virus Intrusion Prevention Name Anti Spyware 1 AIM AIMExpress Access RBL Filter E a 2 AIM AIMExpress Command We will block all IM traffic for our Test Active Directory Group and exclude Administrators from this setting 9l Tech Note NOTE You can change the Prevention and Detection from the global settings and adjust other settings such as the schedule when the signature is enabled For example some organizations want to allow IM traffic for everyone during lunch hours but deny it outside of those hours SONICWALL Network Security Appliance IPS Category Settings Category Name IM Detection Included Users Groups ActiveDirGroup Test Excluded Users Groups Administrators Included IP Address Range All ka Excluded I
29. c Sample Code for SonicOS 5 2 oo ccccecccccccceceeeeseeeeeeeeeeaaeeseeeeeeessaeeeeceeeeeseaaauseeeeeeeessuaaseseeessaesaaageses 41 Advanced Sample Code for SonicOS 5 2 0 ccccccceccccccecseeeseeceeeeeesaaeeeeeeceeeesesaesseeceeeeesaeaeeeeeeeeessaaaeeeeeeseeess 41 Sample JavaScript Code for SonicOS 5 2 oo cccceesesccceeeeseeeeeceeeeeeseeeeeeeeeeeeessaeeseeeeeeseeeaeeseeeeeessasaasaassss 44 Sample Code for SonicOS 5 1 Or Earlier ccccccccesecccecceeeeeeeeceeeeeeeeeeeseeeeeeeeeeeeseeeeeeesseaaaseeeeesesseaagaeees 44 Applying Application Firewall Polices to GroupS USEIS cceccccecseeeeeeeeeaeeeeeesaeeeeceeeeseaeeeeeessaaseeeessaaaeeees 45 Blocking All Websites except a Select Few with Application Firewall c ssssccceeeeeessseseceeeeeeaeeeeees 49 Tightening Control over the Browsing Behavior Of Users ccccccseeeceeeeeeeeeeeeeaeeeeeeeeseeeeeeeeeseaeeeeeeesneeeeeeeaas 50 Applying Intrusion Prevention Service Signatures to GroupS USEIS cccccceeeeteeeeeeeeeeeeeeeeeeeeeeeeaaaaaeeeeeeeeeees 51 Tech Note Blocking IM Traffic Categorically Dace ee taste cate Denese weenie anete ten easels E AE E E E 51 APPNO Granular IM PONGISS occ seaseaecasantonaeeetsosaicccreutamateieesuscanenseddsarenceosseceaeecenteadie ecesuiera ERE 52 Applying VPN Access Policies to GroUpS USEIS ccccccccssseeeeeeceeeeeeeecaesseeeeeeseaeeeeesseaeeeeeeseaeeeeessaaeeseeeeesaages 53 alobal VPN Client GYO aaran
30. cify a user name that has rights to log in to the LDAP directory The login name will automatically be presented to the LDAP server in full dn notation This can be any account with LDAP read privileges essentially any user account Administrative privileges are not required Note that this is the user s name not their login ID e g John Smith rather than jsmith Login Password The password for the user account specified above Protocol Version Select either LDAPv3 or LDAPv2 Most modern implementations of LDAP including Active Directory employ LDAPv3 Use TLS Use Transport Layer Security SSL to log in to the LDAP server It is strongly recommended that TLS be used to protect the username and password information that will be sent across the network Most modern implementations of LDAP server including Active Directory support TLS Deselecting this default setting will display an alert that you must accept to proceed SONICWALL gt Tech Note e Send LDAP Start TLS Request Some LDAP server implementations support the Start TLS directive rather than using native LDAP over TLS This allows the LDAP server to listen on one port normally 389 for LDAP connections and to switch to TLS as directed by the client Active Directory does not use this option and it should only be selected if required by your LDAP server e Require valid certificate from server Validates the certificate presented by the server
31. duplicating LDAP user names Allows for group membership and privileges to be determined by the intersection of local user and LDAP user configurations Default LDAP User Group A default group on the SonicWALL to which LDAP users will belong in addition to group memberships configured on the LDAP server Import user groups You can click this button to configure user groups on the SonicWALL by retrieving the user group names from your LDAP server The Import user groups button launches a dialog box containing the list of user group names available for import to the SonicWALL 10 Tech Note Listed below are the user groups that were read from the LDAP server Select the groups to import and then click Save to add those user group names to the SonicWALL s local user groups a C Account Operators C Allowed RODC Password Replication Group C Backup Operators C Cert Publishers C Certificate Service DCOM Access F Cryptographic Operators C DHEP Administrators C DHCP Users C Denied RODC Password Replication Group LJ Distributed COM Users Cl Dns dmins C DnsUpdateProxy C Domain Computers C Domain Controllers F Enterprise Admins F Enterprise Read only Domain Controllers C Event Log Readers lll 4 Ready Save Cancel In the LDAP Import User Groups dialog box select the checkbox for each group that you want to import into the SonicWALL and then click Save Having user groups on the
32. e requested by the client Changes to any of the SSL Control settings will not affect currently established connections only new SSL exchanges that occur following the change commit will be inspected and affected Step 2 To enable SSL Control on a zone browse to the Network gt Zones page and select the configure icon for the desired zone In the Edit Zone window select the Enable SSL Control checkbox and click OK All new SSL connections initiated from that zone will now be subject to inspection More information on SSL Control can be found in the SonicOS Enhanced Administrator Guide 32 Tech Note Applying Different CFS Policies to Groups It is important to understand what CFS is capable of as of SonicOS 5 2 CFS is a subscription based service that allows administrators to block domains based on category ratings The Premium CFS features over 50 different categories to choose from SonicWALL maintains and categorizes a list of over 16 million URLs and continually classifies additional URLs With a few simple check boxes it is easy to block adult content online game sites social networking and so forth CFS is hardware and OS independent that doesn t require any special configuration of client machines or web browsers Step 1 Navigate to Security Services gt Content Filter Service Click on Configure and select the Custom List tab Security Services Content Filter Content Filter Status server is ready Subscr
33. e actually cached on Google s servers and not hosted on 3 party servers CFS has no way of determining if those images are forbidden since they reside at google com Since it is impractical for most environments to block access to Google or other search engines enforcing safe search prevents the user from changing the default filtered search engine results For example if one tried to change the Google search preferences to Do not filter my search results as shown below they would be presented with the Sonicwall block page and the setting would not be saved You can however move the 3 Tech Note default of moderate to strict filtering on Google however Safe Search Filtering Google s SafeSearch blacks web pages containing explicit sexual content from appearing in search results Use strict filtering Filter both explicit text and explicit images Use moderate filtering Filter explicit images only default behavior Do not filter my search results Step 6 Select if you want the CFS Policy to only run at certain times of the day For example you might allow access to social networking sites between 12 1 for lunch break but restrict access the remainder of the time SONICWALL Network Security Appliance Custom List Settings To edit Allawed Forbidden domains and Keywords goto Custom List tab Disable Allowed Domains Enable Forbidden Domains Enable Keyword Blocking Sate Search Enforcement Setti
34. e as a RADIUS server for the remote SonicWALLs acting as a gateway between RADIUS and LDAP and relaying authentication requests from them to the LDAP server Additionally for remote SonicWALLs running non enhanced firmware with this feature the central SonicWALL can return legacy user privilege information to them based on user group memberships learned via LDAP This avoids what can be a very complex configuration of an external RADIUS server such as IAS for those SonicWALLs e Enable RADIUS to LDAP Relay Enables this feature e Allow RADIUS clients to connect via Check the relevant checkboxes and policy rules will be added to allow incoming RADIUS requests accordingly e RADIUS shared secret This is a shared secret common to all remote SonicWALLs e User groups for legacy VPN users Defines the user group that corresponds to the legacy Access to VPNs privileges When a user in this user group is authenticated the remote SonicWALL is notified to give the user the relevant privileges e User groups for legacy VPN client users Defines the user group that corresponds to the legacy Access from VPN client with XAUTH privileges When a user in this user group is authenticated the remote SonicWALL is notified to give the user the relevant privileges e User groups for legacy L2TP users Defines the user group that corresponds to the legacy Access from L2TP VPN client privileges When a user in this user group
35. e have a user named Joe Joe is a member of the Sales Group and the Marketing Group The default CFS policy is set to restrict gambling We ve created a CFS policy for the Sales Group that also restricts gambling The Marketing Group policy however does not restrict gambling Because CFS is the most permissive least restrictive Joe will be able to visit gambling sites It is recommended you create custom policies that allow exceptions to the default policy and then apply those policies to your respective groups users Creating Custom CFS Policies To create custom CFS policies first click Configure under the CFS main page Content Filter Type SonicWALL CFS w 35 Tech Note Step 1 Under the CFS tab enable the IP based HTTPS content filtering This enables CFS for HTTPS domains This is important if you wish to block sites such as HIT TPS www facebook com or proxy sites such as HT TPS megaproxy com SONICWALL Network Security Appliance Policy Custom List Consent Settings Enable IP based HTTPS Content Filtering If Server is unavailable for seconds Block traffic to all Web sites Allow traffic to all Web sites Step 2 Navigate to the Policy tab and add a new CFS policy SONICWALL gt Network Security Appliance CES Policy Custom List Consent Policies Policy Configure Default i Add Delete All 36 Tech Note Step 3 Create a friendly name for the new policy
36. e network s or address objects that group will have VPN access to SONICWALL gt Network Security Appliance Settings Members VPN Access CFS Policy WPN Client Access Networks Networks Access List 4 V40 Subnet X0 Subnet x4A V41 IP 4 V41 Subnet x5 IP AS Subnet gt lt i By modifying firewall rules it is possible to apply more granular levels of access GVC users terminate their VPN connection to the VPN zone For example by modifying rules from the VPN zone to the LAN zone you can control VPN users and traffic just like any other traffic with firewall rules CWALL gt SON 04 Tech Note SSL VPN NetExtender SonicOS 5 2 introduces SSL VPN functionality via NetExtender NetExtender is a light weight client that can run on Windows Linux Mac and Windows Mobile devices It can easily be installed by directing the client to the URL of the WAN interface To configure SSL VPN LDAP authentication place the LDAP group s that need remote access into the SSL VPN Services Group Step 1 Navigate to Users gt Local Groups and configure the SSLVPN Services group Local Users 15 ActiveDirGroup CFSbypass CG co FIK Local Groups z ma b 16 ActiveDirGroup Test ES s7 Guest Services O m Guest Accounts b 17 SSLVPN Services Cc ci Fa Guest Status Add Group Import from LDAP Delete All b E Hinh Availahility Step 2 Add the groups or users that need SSLVPN access to t
37. e to block well known HTTPS proxy services of this sort by their IP address it is virtually impossible to block the thousands of privately hosted proxy servers that are readily available through a simple Web search The challenge is not the ever increasing number of such services but rather their unpredictable nature Since these services are often hosted on home networks using dynamically addressed DSL and cable modem connections the targets are constantly moving Trying to block an unknown SSL target would require blocking all SSL traffic which is practically infeasible SSL Control provides a number of methods to address this challenge by arming the security administrator with the ability to dissect and apply policy based controls to SSL session establishment While the implementation as of this writing SonicOS 5 2 does not decode the SSL application data it does allow for gateway based identification and disallowance of suspicious or undesirable SSL traffic Configuring a SSL Blacklist and Whitelist An SSL blacklist and whitelist allows the administrator to define strings for matching common names in SSL certificates Entries are case insensitive and will be used in pattern matching fashion for example sonicwall com https www sonicwall com https www sonicwall de https csm demo sonicwall com https mysonicwall com https supersonicwall computers or g https 67 115 118 87 4 prox https proxify ora https https w
38. ently configured trees first Step 9 Click OK The auto configuration process may also locate trees that are not needed for user login You can manually remove these entries If using multiple LDAP AD servers with referrals this process can be repeated for each replacing the Domain to search value accordingly and selecting Append to existing trees on each subsequent run SONICWALL Tech Note Step 10 On the LDAP Users tab configure the following fields Settings Schema Directory Referrals LDAP Users LDAP Relay Test LDAP User Settings O allow only users listed locally User group memberships can be set locally by duplicating LDAP user names Default LDAP User Group Domain Users None Create a new user group The names of user groups o ActiyeDirGroup Allusers bn the SonicWALL if they are to be used in policy rules CFS policies etc This ActiveDirGroup CFSbypass SonicWALL read them directly from the LDAP server and import selected ActiveDirGroup Test import user gr Administrators Content Filtering Bypass Domain Admins Domain Guests Domain Users Everyone Exchange Admins Guest Services Limited Administrators Permanent Guests SonicWALL Administrators SonicWALL Read Only Admins SoLVPN Services Trusted Users Allow only users listed locally Requires that LDAP users also be present in the SonicWALL local user database for logins to be allowed User group membership can be set locally by
39. firewall rules to allow a certain group of users to download POP email while the rest of the organization is denied First create a rule a rule from LAN gt WAN note this could be from any zone you want to enforce this policy on not just the LAN that allows POP traffic for your LDAP group SONICWALL Network Security Appliance General Advanced O05 Ethernet BWM Settings ACOH alow Deny Discard From Zone To Zone ae POPS Retrieve E Mail x SOUrCE An y bait Destination An y Users Alowedi ActiveDirGroup Test x Schedule Always e i is Comment Enable Logging Allow Fragmented Packets L Priority Source Destinaton Service Acton Users Comment Enable Configure Fla i fil Any Any POPS Retrieve E Mail Allow ActiveDirGroup Test al GA Fiz 7 tril Any Any Any Deny All ull EUa NOTE The user or group is not used in selecting which rule to apply You should always set a rule for the service source and destination In that rule select the user or group to be 18 Tech Note allowed access through it Matching traffic from the user or members of the user group will be given access and matching traffic from anyone else will be denied access For multiple user groups to be allowed access create a single parent group user containing all of them as members and set a single rule specifying that parent group as the users allowed A shortcoming in the rule
40. he Member area SONICWALL Network Security Appliance Settings Members VPN Access CFS Policy Group Memberships Non Member Users and Groups Member Users and Groups ActiveDirGroup CF Sbypass A ActiveDirGroup Allusers ActiveDirGroup Test oo Administrators Content Filtering Bypass Domain Admins Add All Bemove All Now in the same fashion as GVC firewall rules can be applied from the SSLVPN zone to any other zone further restricting or limiting users services etc NOTE If you are tunneling all the users traffic additional policies can be enforced like CFS and client enforced AV 09 Tech Note Guest Services Wireless Guest Services SonicOS supports Guest Services Guest services are typically used in wireless hotspot deployments but they can also be used in scenarios such as guest clients needing to plug into the wired LAN infrastructure As of SonicOS 5 2 WGS is not supported on the LAN zone however there is workaround When creating an interface define the security type as Wireless The wireless security type has all the facets of the LAN trusted zone in addition to support for WGS and LHM Step 1 Create a new zone and define it as a wireless zone SONICWALL Network Security Appliance General Wireless Guest Services General Settings Security Type Wireless Select a Security Type Allow Interface Trust Trusted LJ Enforce Content Filtering Public
41. inaten Service Acton Users Comment Enable Configure rs 7 5 Oi rl any Blocotd sites Any Deny Al iw alj F iR i a LQ i il Ary Any ary iis AD ii a CE Allowing Specific Domains and Blocking All Others with Firewall Rules With firewall rules you can block HTTP HTTPS traffic for all traffic except for the defined list you ve created First create the address objects of the websites you want to allow In the following example we will allow http www sonicwall com and https www mysonicwall com and deny all other HTTP HTTPS traffic Step 1 Navigate to Network gt Address Objects and Add an Address Object for sonicwall com SONICWALL Network Security Appliance Name Allow Sonicwall com Fone Assignment WAN w Type FODEN Hostname www sonicwall com Ready 24 Tech Note Step 2 Create an AO for Mysonicwall com While using a FQDN is often more friendly in this example we ve chosen the IP address SONICWALL Network Security Appliance Name Allow mysonicwall com Zone Assignment WAN h Type IF Address 204 212 170 131 Done adding Address object entry Step 2 Create an AO Group for the Allowed sites SONICWALL Network Security Appliance Name Allowed Websites Allow mysonicwall com All Interface IP Allow Sonicwall com All SonicPoints All VWWAN IP All 40 Management IP All 41 Management IP All 42 Management IP All 43 Management IP All 4 Management I
42. iption Expires On 06 16 2011 Ifyou believe that a Web site is rated incorrectly or you wish to submit a new URL click here Content Filter Type SonicWALL CFS Note Enforce the Content Filtering Service per zone from the Network gt Zones page Restrict Web Features C ActiveX d Java C Cookies CI Access to HTTP Proxy Servers Trusted Domains C Do not block Java Activex Cookies to Trusted Domain sites SONICWALL 3 Nera ei warily Appian GFS Palic Custom List Gongani Allowed Gemains Forbidden Gorman F rA Aai tai orea aywerd Bleching 33 Tech Note CFS has the ability to allow or block domains by their fully qualified domain name FQDN or by keywords in their FQDN This functionality does not require a subscription to CFS This list is a single master list that can be enforced on any given CFS policy As you create additional CFS policies each policy has the ability to leverage the same master list for allowed forbidden domains keyword blocking and safe search enforcement SONICWALL Network Security Appliance Custom List Settings To edit Allowed Forbidden domains and Keywords goto Custom List tab Disable Allowed Domains Enable Forbidden Domains Enable Keyword Blocking Safe Search Enforcement Settings C Enable Safe Search Enforcement Filter Forbidden URLs by time of day The allowed list allows users to browse domains that would have otherwise been forbidden by a CFS category F
43. ize your block page o http fw_interface S4SWL STYLES CSS Allows a user to customize their own style sheet and host it on their server For example one could change the above to htip myownserver myownstyle css e Block reason Category The above allows a user to either remove the display of category under which the content is blocked or add some other text e fw_interface This variable is more for a user to host their own style sheet This variable is essentially the IP address of the interface that the user s traffic is terminating to For example if the XO LAN IP address is 192 168 1 1 the fw_interface would correspond to 192 168 1 1 for a user connected to the LAN If the X3 interface is a WLAN with an IP of 192 169 5 1 the fw_interface would return 192 169 5 1 for wireless users e blockedURL This variable references the URL the client was attempting to browse to SONICWALL gt 40 Tech Note Basic Sample Code for SonicOS 5 2 snipped with virtual scissors lt tr gt lt td align center nowrap gt lt font size 2 color 000000 gt lt br gt If you believe the below web site is rated incorrectly click lt a href HTTP cfssupport sonicwall com target new gt here lt a gt lt p gt Click lt a href HTTP fw_interface gt here lt a gt to login and apply your personal filter policy lt p gt lt font gt lt td gt lt tr gt After injecting this piece of code the
44. lect the Base 64 Encoded X 509 cer format Step 6 Specify a path and filename to which to save the certificate Importing the CA Certificate onto the SonicWALL To import the CA certificate onto the SonicWALL Step 1 Browse to System gt CA Certificates Step 2 Select Add new CA certificate Select the certificate file you just exported Step 3 Click the Import certificate button Configuring the SonicWALL Appliance for LDAP The Users gt Settings page in the administrative interface provides the settings for managing your LDAP integration Step 1 In the SonicOS administrative interface open the Users gt Settings page Step 2 In the Authentication method for login drop down list select either LDAP or LDAP Local Users User Login Settings Authentication method for login LDAP Local Users Local Users RADIUS RADIUS Local Users w Single sign on method LDAP Step 3 Click Configure Step 4 If you are connected to your SonicWALL appliance via HTTP rather than HTTPS you will see a dialog box warning you of the sensitive nature of the information stored in directory services and offering to change your connection to HTTPS If you have HTTPS management enabled for the interface to which you are connected recommended check the Do not show this message again box and click Yes SONICWALL gt Tech Note Step 5 On the Settings tab of the LDAP Configuration window configure the following
45. ll be necessary if the DN does not conform to the normal formatting rules as per that example In Active Directory the URL corresponding to the distinguished name for a tree is displayed on the Object tab in the properties of the container at the top of the tree NOTE AD has some built in containers that do not conform e g the DN for the top level Users container is formatted as cn Users dc using cn rather than ou but the SonicWALL knows about and deals with these so they can be entered in the simpler URL format Ordering is not critical but since they are searched in the given order it is most efficient to place the most commonly used trees first in each list If referrals between multiple LDAP servers are to be used then the SONICWALL gt Tech Note trees are best ordered with those on the primary server first and the rest in the same order that they will be referred NOTE When working with AD to determine the location of a user in the directory for the User tree for login to server field the directory can be searched manually from the Active Directory Users and Settings control panel applet on the server or a directory search utility such as queryad vbs in the Windows NT 2000 XP Resource Kit can be run from any PC in the domain e Auto configure This causes the SonicWALL to auto configure the Trees containing users and Trees containing user groups fields by scanning through the directories in se
46. nable Tracking Bandwidth Usage If you wanted to also restrict the download and upload to a maximum of 100kbps change the rule according to the following example SONICWALL Network Security Appliance General Advanced QoS O Ethernet BWM Ethernet Bandwidth Management Enable Outbound Bandwidth Management allow rules only Guaranteed Bandwidth or Ww Maximum Bandwidth Bandwidth Priority Enable Inbound Bandwidth Management allow rules only Guaranteed Bandwidth So ka Maximum Bandwidth Bandwidth Priority Enable Tracking Bandwidth Usage 21 Tech Note NOTE You can create a firewall rule for any given user group and restrict that group s overall bandwidth for any network service protocol Consider also using Application Firewall which allows more granular control of bandwidth policies Blocking Websites Domain Names for Groups Users Enhanced SonicOS has a few mechanisms at your disposal to block websites from users such as e FW rules e Application Firewall all NSA models and PRO series 3060 or higher e Content Filter Service CFS e SSL Control Blocking Domains with Firewall Rules To block domains with FW rules you must first create an address object AO for the fully qualified domain name FQDN In the following example we will create an AO for google com and yahoo com After those have been created we will put those AOs in an AO Group Less work is involved by creating FW rules for A
47. name attribute Qualified login name attribute userPrincipalName n User group membership attribute Framed IPF address attribute User Group Objects Object class Member attribute member is Distinguished name User ID Read from serwer e LDAP Schema Select one of the following Microsoft Active Directory RFC2798 inetOrgPerson RFC2307 Network Information Service Samba SMB Novell eDirectory User defined Tech Note Selecting any of the predefined schemas will automatically populate the fields used by that schema with their correct values Selecting User Defined will allow you to specify your own values use this only if you have a specific or proprietary LDAP schema configuration Object class Select the attribute that represents the individual user account to which the next two fields apply Login name attribute Select one of the following to define the attribute that is used for login authentication sAMAccountName for Microsoft Active Directory cn for Novell eDirectory uid for others Qualified login name attribute Optionally select an attribute of a user object that sets an alternative login name for the user in name domain format This may be needed with multiple domains in particular where the simple login name may not be unique across domains By default this is set to userPrincipalName for Microsoft Active Directory and mail RFC2798 inetOrgPe
48. ngs C Enable Safe Search Enforcement Filter Forbidden URLs by time of day 38 Tech Note Step 7 Next navigate to Users gt Local Groups and configure the Group you want the new CFS policy to apply to SONICWALL gt Network Security Appliance i Sve te i i a oa Local Groups gt Gers bE Pree i j a Lotal Grew bkg vor pa r P Ps Y TLE LF A E b y Pii rer P aT Gan Ga F eer J deere m ae E a rig x s a Ti bo g Seine Gipi E F i T i LR a TE r 7 Tiaka C p p ihin 1 ia FIE i Oe ge cF Er FIR bonm ipea bo 4 dons EF P Leena Cire eat b ng Po gonn e Eppes Pii brisios EI F AE komuri Ci e g Domin idas Ey ct i i e fae Stat _ Cip 7 Cer coe i ca JF ie Ba H Ary z T a y Spuy Serves Cib g Donen iie 1 F Fi P N Fie leg b iv vii Step 8 Select the CFS policy you created under the CFS Policy tab Repeat this same process for every group that requires custom CFS settings SONICWALL Network Security Appliance Settings Members VPN Access CFS Policy CFS Policy Policy Default w Co My First Test Policy Enforcing CFS Policies without Requiring All Users to Authenticate There is one more trick you can do with CFS involving user authentication Some organizations want a default policy that applies to virtually everyone but would rather not use Single Sign On SSO or local authentication for the majority of their user base However they
49. nsported within the encrypted SSL tunnel when using HTTPS It is not until the SSL session is established Step 14 that the actual target resource www mysonicwall com is requested by the client But since the SSL session is already established no inspection of the session data by the firewall or any other intermediate device is possible As a result URL based content filtering systems cannot consider the request to determine permissibility in any way other than by IP address While IP address based filtering does not work well for unencrypted HTTP because of the efficiency and popularity of Host header based virtual hosting IP filtering can work effectively for HTTPS due to the rarity of Host header based HTTPS sites But this trust relies on the integrity of the HTTPS server operator and assumes that SSL is not being used for deceptive purposes For the most part SSL is employed legitimately being used to secure sensitive communications such as online shopping banking or any session where there is an exchange of personal or valuable information The 30 Tech Note ever decreasing cost and complexity of SSL however has also spurred the growth of more dubious applications of SSL designed primarily for the purposes of obfuscation or concealment rather than security An increasingly common camouflage is the use of SSL encrypted Web based proxy servers for the purpose of hiding browsing details and bypassing content filters While it is simpl
50. on ULA http www sonicwall com downloads SonicOS Standard 2 1 User Level Authentication pdf In this example the LAN zone will be configured for ULA Step 1 Go to Network gt Interfaces gt X0 or appropriate interface Step 2 Under General enable HTTPS User Login Also enable Add rule to enable redirect from HTTP to HTTPS if neither HTTP Management nor HTTP Login are enabled it is not needed if either of them are Step 3 Go to Firewall gt Access Rules gt LAN gt WAN The default is set to Any Any Any Allow rule shown below p lll System Network P a SonicPoint E Firewall Access Rules Advanced TCF Settings Services Multicast Connections Monitor Qo5 Mapping SSL Control VoIP p RA Application Firewall Firewall Access Rules Access Rules LAN gt WAN Items bo 1 of 1 ud tall View Style OallRules Matrix Drop down Boxes Add Restore Defaults C Priority Source Destination Service Action Users Comment Enable Configure F 1 ill Any Any Any Allow All al GA x Add Restore Defaults 14 Tech Note Step 5 Click Add then create the following two rules as depicted below The order is important The new first rule allows any DNS queries out The new second rule forces all users Everyone to be challenged before accessing the Internet for HTTP only p L System p T Network l SonicPoint amp Firewall Access Rules Advanced TCP Settings Ser
51. or example if you blocked the Personals and Dating category you would block access to www facebook com Putting facebook com in the allowed lists will override the category setting for any CFS policy that has the Disable Allowed Domains setting unchecked 34 Tech Note NOTE If you wish to forbid or allow HTTPS domains use of their IP address must be used in CFS FQDN does not work for HTTPS sites in the CFS Custom List For example was able to forbid paypal com with the use of these 3 IP addresses This list may not be representative of all IPs for paypal SONICWALL Network Secu rity Appliance CFS Policy Carsiorn Liss Conan AVhiwed Domang Forbedden Gonnans l 4 424149 6b 211 1697 z 68 2711 769 45 Keyword Blocking Using the forbidden domains list doesn t require the use of CFS categories For example if you wanted to block myspace com for the entire organization or a given group you would enter myspace com into the forbidden domains list This is a simple effective way to systematically block domains for the whole organization or a particular group Step 1 To configure CFS for specific groups users Navigate to Local Groups or Local Users gt Configure gt select Policies and edit the Default Policy The default CFS policy should be the most restrictive policy When multiple policies are created the most permissive least restrictive policy wins for any given user For example let s assume w
52. ot display the webpage Microsoft Internet Explorer provide FN Internet Explorer cannot display the webpage Most likely causes You are not connected to the Internet e The website is encountering problems e There might be a typing error in the address What you can try Diagnose Connection Problems More information Alternatively you can have the blocked domains redirect to another web page or display a custom block page Step 5 Navigate to Actions under Application Firewall and create a new Action to redirect users SONICWALL Network Security Appliance Application Firewall Action Settings Action Name Redirect to Inside HR policies page Action HTTP Redirect Yourinsidedomain com Content 48 Tech Note Step 6 Navigate to Application Firewall gt Policies and change the action from reset drop to the new custom action SONICWALL Network Security Appliance Application Firewall Policy Settings Policy Name Blocking Domains Policy Type HTTP Client SOUICE Destination Address Any x Service Any X Exclusion Address Application Object Blocked Domains Action Redirect to Inside HR policies page If you wish to display a block page instead create a new action with HTTP Block Page You can either insert text in the content or html markup to customize it further Select the action under the Policy to use the new HTTP Block Page action SONICWA
53. pliance The following procedures describe how to perform these tasks in an Active Directory environment Configuring the CA on the Active Directory Server To configure the CA on the Active Directory server skip the first five steps if Certificate Services are already installed Step 1 Navigate to Start gt Settings gt Control Panel gt Add Remove Programs Step 2 Select Add Remove Windows Components Step 3 Select Certificate Services Step 4 Select Enterprise Root CA when prompted Step 5 Enter the requested information For information about certificates on Windows systems see http support microsoft com kb 931125 Step 6 Launch the Domain Security Policy application Navigate to Start gt Run and run the command dompol msc Step 7 Open Security Settings gt Public Key Policies Step 8 Right click Automatic Certificate Request Settings Step 9 Select New gt Automatic Certificate Request Step 10 Follow through the wizard and select Domain Controller from the list SONICWALL gt Tech Note Exporting the CA Certificate from the Active Directory Server To export the CA certificate from the AD server Step 1 Launch the Certification Authority application Start gt Run gt certsrv msc Step 2 Right click on the CA you created and select Properties Step 3 On the General tab click the View Certificate button Step 4 On the Details tab select Copy to File Step 5 Follow through the wizard and se
54. rson Note that userPrincipalName would allow login as for example john ourdomain com where mail would login as john ourdomain com User group membership attribute Select the attribute that contains information about the groups to which the user object belongs This is memberOf in Microsoft Active Directory The other pre defined schemas store group membership information in the group object rather than the user object and therefore do not use this field Framed IP address attribute Select the attribute that can be used to retrieve a static IP address that is assigned to a user in the directory Currently it is only used for a user connecting via L2TP with the SonicWALL s L2TP server to retrieve the IP address to assign to them from the directory In the future this may also be supported for Global VPN Client In Active Directory the static IP address is configured on the Dial in tab of a user s properties Step 7 On the Directory tab configure the following fields L L Tech Note Settings schema Directory Referrals LDAF Users LDAP Relay Test User Directory Information Primary domain caveman_local User tree for login to server caveman_local users h Trees containing users caveman local Users CN Microsoft Exchange System Objects OC caveman DC local Trees containing user groups caveman_local Users caveman_local Builtin t oC eee e Primary Domain The user dom
55. rtain file types from download or upload Restrict HTTP post methods And more Step 1 Navigate to Application Firewall Select the check box to enable Application Firewall and IP Fragment Reassembly SONICWALL Network Security Appliance b System i Application Firewall gt Network i Policies SonicPoint b e Firewall Application Firewall Status gt VoIP Application Firewall Status iati Application Firewall Application Firewall License Expiration Date 06 16 2011 Policies Application Objects Application Firewall Global Settings Actons Email User Objects Enable Application Firewall F 8 VPN T Enable IP Fragment Reassembly gt ssiven ro Global Log Redundancy Filter seconds AY p 2 Lisers ea E High Availability Application Firewall Policies p a Security Services Ea Log Bai Ses Folicy Type Object Action Source Destination From Service No Entries Add New Policy Application Firewall Policies 0 Policies Defined 0 Policies Enabled 10 Maximum Policies Allowed Step 2 Under Application Firewall Navigate to Application Objects and Add a New Object This new object will be a list of domains that we want to block NOTE you can create a list of domains easily in a simple text file and then import that list SONICWALL gt 45 Tech Note When looking for a HTTP Host you can get specific with a FQDN or leave it more general with a partial match With the below example
56. still want a way for specific groups users to be able to authenticate so they can bypass the default CFS policy In this scenario you will want to customize the CFS block page The default block page informs a user that website is forbidden for X reason What we want to do is add some simple html code that informs the users the page is still forbidden but include a link that redirects them to login into the firewall After logging in that user will now inherit whatever CFS permissions you ve assigned them SONICWALL 39 Tech Note Step 1 Navigate to Network gt Network Interfaces Configure the respective interfaces you wish to support local authentication on by enabling HTTPS user login SONICWALL gt Network Security Appliance General Advanced Interface X0 Settings Zone LAN IP Address 192 168 169 1 Subnet Mask Comment Management C HTTP HTTPS Ping LJ snmp LC SSH User Login HTTP HTTPS Add rule to enable redirect from HTTP to HTTPS Step 2 Navigate to Security Services gt Content Filter At the bottom of the page is the html code that can be customized Provided below is some sample code that you can modify for your deployment Variables for Custom Block Page in SonicOS 5 2 SonicOS 5 2 introduced variables allowing administrators to customize their block page even further Below are explanations of the variables If you understand javascript and basic html you can use these to further custom
57. t lt head gt lt title gt Your Page Title lt title gt lt meta HT TP equiv REFRESH content 0 url HT TP x x x x gt lt HEAD gt lt BODY gt Optional Info Here lt BODY gt lt html gt NOTE HT TP x x x x should reference the interface the user is terminating through For example if a user is coming from the LAN and your X0 LAN interface IP is 192 168 1 1 you would use HI TP 192 168 1 1 NOTE SonicOS 5 1 and earlier have a 256 character limit on the CFS block page SonicOS 5 2 increases this number greatly 44 Tech Note Applying Application Firewall Polices to Groups Users Application Firewall is a very flexible tool to manage application specific traffic The goal of this guide is to demonstrate how Application Firewall can be applied to different groups users We will use Application Firewall to block domains for specific groups in this example More examples of what Application Firewall is capable of can be found by reviewing the SonicOS Application Firewall guide here HTTP www sonicwall com downloads Application Firewall 5 1e Feature Module pdf HTTP www sonicwall com downloads SonicOS Application Firewall Practical Examples Guide tec hnote pdf Some good examples include e Using application firewall to bandwidth limit streaming videos from youtube for the general user population but allow IT administrators full bandwidth Scanning documents and files for watermarks to help stem data leakage Forbid ce
58. tings Link Speed Auto Negotiate Use Default MAC Address 00 17 C5 10 41 39 overite DefukMACAddres SC d C Enable Multicast Support C Enable 802 1p tagging Interface MTU 1492 Fragment non VPN outbound packets larger than this Interface s MTU C Ignore Don t Fragment DF Bit Cl Do not send ICMP Fragmentation Needed for outbound packets over the Interface MTU Bandwidth Management C Enable Egress Bandwidth Management N Available Interface Egress Bandwidth 384 000000 Kbps C Enable Ingress Bandwidth Management gt Available Interface Ingress Bandwidth 384 000000 Kbps Ready hgt lt il L internet amp Rom 20 Tech Note After BWM is enabled on the WAN interface a new tab is displayed within FW rule creation the Ethernet BWM tab You can now enable BWM on a rule by rule basis setting a guaranteed bandwidth rate Kbps or a maximum rate or priority and tracking of bandwidth usage In the below screenshot we have restricted POP email to maximum of 100 Kbps for downloads SONICWALL Network Security Appliance Ethernet Bandwidth Management C Enable Outbound Bandwidth Management allow rules only Guaranteed Bandwidth 0000 Maximum Bandwidth Bandwidth Priority U highest Enable Inbound Bandwidth Management allow rules only Guaranteed Bandwidth 0 000 So vi Maximum Bandwidth 100 Kbps v Bandwidth Priority T lowest E
59. ts 28 Tech Note The firewall rules should now look like the below picture Access Rules LAN gt WAN View Style OallRules Matix O Drop down Boxes Priority Source Destination LI Pi i tril Any Allowed Websites O2 5 tll Any Allowed Websites Fis z il Any Pany Fa 4 tll rer Pany Qs s5 tll Any Any Service HTTPS HTTP HTTPS HTTP Any lems 0 3 OT 3 VEE Acton Users Comment Enable Configure Allow All LDAP Users al A 3 Allow All LDAP Users uh A 36 Deny All ul GA 36 Deny All al GA x Allow Al al A 2 NOTE that the downside to using FW rules to block allow websites is that if a user is a member of different groups in LDAP and if different rules are created for different groups it can cause undesirable behavior for a given user Firewall rules are processed from top down and rule processing stops as soon as there is a match This is why it s critical to order your rules appropriately 29 Tech Note Blocking HTTPS SSL Domains with SSL Control With Secure Socket Layer SSL Control it is possible to whitelist and blacklist HTTPS domains as well as other SSL services based on keywords in their certificate SSL control cannot be enforced at the group user level only at the ZONE level For example if you enabled SSL control on the LAN zone all users in the LAN would have the same enforcement policies However SSL Control provides an excellent means to allow legit SSL tr
60. ule from ANY ANY ANY to deny This does create more work for the network admin as it now will be necessary to create rules to allow traffic to leave the internal network The flipside to this additional work is a more secure network Depending on your default rule it will change the way you create FW rules So can you create FW rules that leverage specific groups users with desirable results Possibly The way FW rule processing works is as follows as of SonicOS 5 2 e Rules are processed from top down SONICWALL gt 17 Tech Note e Rule processing stops as soon as there is a match with some caveats see below e Rule logic first looks at Source then Destination Service and Action If there is a match there rule processing stops and then further subset rule processing can happen rules set for schedules users groups or BWM for that specific rule o What cannot occur is two overlapping rules for the same service for different groups For example if you had a FW rule that allowed FTP for Group 1 and below it a FW rule to allow FTP for Group 2 Group 2 would never be allowed to use FTP The first rule that gets a match is the allow rule for FTP and it only applies for Group 1 Recall that rule processing first looks at Source Destination and Service As soon as there is a match rule processing stops Because of that the 2 FTP rule would never be reached In the following example we ll demonstrate how you can leverage
61. vices Multicast Connections Monitor Qos Mapping SSL Control 6 vop ke gA Application Firewall gt VPN b SSLVPN b pS Users qF Firewall Access Rules Restore Defaults Access Rules LAN gt WAN View Style OallRules Matix O Drop down Boxes Add C Priority Source Destination Service Oi l any any DNS Name Service Allow O2 l any any HTTP Allow P 3 3 tll Any Any Any Allow Add Acton Users Items to 3 of 3 CeL hie Restore Defaults Comment Enable Configure All ul A Everyone al GA X All al 2 x Restore Defaults NOTE This configuration will allow any traffic out other than HTTP even without first authenticating If you want to block ALL traffic before authenticating for HTTP then disable the default Any Any Any Allow rule as depicted in rule 3 below The downside to this is that users need to know that they have to authenticate via HTTP before ANY Internet traffic will pass NOTE It is also important to not test these rules when logged in as administrator to the SonicWALL 15 Tech Note NOTE The difference between All and Everyone in a policy rule Selecting All will allow all matching traffic regardless from an authenticated user or not Selecting the Everyone user group will allow traffic from any logged in user but not from a user who has not logged in b m m System T Firewall P Net
62. work Access Rules a g SonicPoint T a Firewall Restore Defaults Access Rules Advanced TCP Settings Access Rules LAN gt WAN ia to 3 of 3 iiie Services View Style OalRules Matrix Drop down Boxes Multicast Connections Monitor Add Delete Restore Defaults gos Mapping a a gt s 2 Priority Source Destination Service Action Users Comment Enable Configure SSL Control aT ee i j An An DNS Name Service Allow All W al a e amp vor Oa a OL av Y Na Allow Mh A gt F J F q F p gi Application Firewall Fi 2 3 ti Any Any HTTP Allow Everyone al ge 38 VPN F 3 3 tll Any Any Any Allow All ul f x b SSLVPN i k i lane Restore Defaults 16 Tech Note If everything is working correctly you should then see users authenticated on the Log gt View page b System source IF Interface O OS Ai Interfaces C gt Network Destination IP Interface Po All Interfaces F gt dehy SonicPoint Filter Logic Priority amp amp Category amp amp Source amp amp Destination e Firewall VoIP Apply Filters Reset Filters Export Log ga Applicaton Firewall j Log View Stop Table Refresh E Refresh interval 10 _ ttems per page 50 items 1 o 50 of 769 Ll gt SSLVPN a0 i b 4 Users a Priority Categor Message Source Destination Notes Rule e E High Availability einai oe a Web Y S EE 06 22 2009 otie Network management 192 168 6 213 10 11 14
63. ww freeproxy_ru www proxify org https megaproxy com https 1070652204 A 67 115 118 67 is currently the IP address to which sslvpn demo sonicwall com resolves and that site uses a certificate issued to sslvpn demo sonicwall com This will result in a match to sonicwall com since matching occurs based on the common name in the certificate B This is the decimal notation for the IP address 63 208 219 44 whose certificate is issued to www megaproxy com C www freeproxy ru will not match prox since the common name on the certificate that is currently presented by this site is a self signed certificate issued to This can however easily be blocked by enabling control of self signed or Untrusted CA certificates 31 Tech Note Step 1 To configure the Whitelist and Blacklist navigate to Firewall gt SSL control gt click the Configure button to bring up the following window SONICWALL Network Security Appliance Custom Lists Pesa nowt subiect common nate of certificate Alack Liat White Lisi prox Sonicwall con i 1 abd E Dea Delis AI Adi Edi Delete Celeta AJ Rumiy Sl pa et Hag Entries can be added edited and deleted with the buttons beneath each list window lanntae Common Mane amiran morn OK Cancel List matching will be based on the subject common name in the certificate presented in the SSL exchange not in the URL resourc
Download Pdf Manuals
Related Search
Related Contents
HP 5308A User's Manual transferpettes - Modverre Grasse - Verrerie et matériel de laboratoire Sony DSC-W220/L Marketing Specifications Williams Sound CHG 3512 User's Manual B - Vandernet Model 611 User Manual CD / MP3 player with 6 built-in headphone sockets USER GUIDE DE_XTd_Manual (21R-4246) v07.cdr Copyright © All rights reserved.
Failed to retrieve file