Dell SonicWALL GX250 Manual page 92

Table of Contents

Advertisement

using names of friends, family, pets, etc. The password should consist of random
characters, such as "a*$#7fe2j%42". The password is case sensitive.
4. Choose the privileges to be enabled for the user by selecting one or both check-
boxes. Two options are available:
A. Remote Access
This option provides unrestricted access to the LAN from a remote location on the
Internet. Only Standard mode supports Remote Access. If NAT is enabled, VPN
client remote access is recommended.
B. Bypass Filters
This option provides unrestricted access to the Internet from the LAN, bypassing
Web, News, Java, and ActiveX blocking.
5. Click Update User.
Note: The SonicWALL supports up to 100 users.
Edit User Settings
To change a user's password or privileges, highlight the name in the Current User
List, make the changes and click Update User. To delete a user, highlight the name
and click Remove User.
Establishing an Authenticated User Session
In order to establish an Authenticated User Session, a user must enter the
SonicWALL LAN IP Address into the Location or Go to field in their Web browser.
Note: The Web browser used to establish an authenticated session must support Java
and JavaScript.
The user sees the SonicWALL authentication window, asking for their user name and
password. After completing these fields and clicking Login, their password is verified
using MD5 authentication. The password is never sent "in the clear" over the Internet,
preventing password theft.
Note: User names are not case sensitive ("john" is equivalent to "JOHN" or "John"),
but passwords are case sensitive ("password" is not the same as "Password").
Once authenticated, remote users are able to access all IP resources on the LAN, and
users on the LAN are able to bypass the Content Filter Lists. The connection closes
if user inactivity on the connection exceeds the configured time-out period. If the
connection is closed, the remote user needs to re-authenticate.
Note: Authenticated Sessions create a log entry when established. However, user
activity is not logged.
Page 92 NETWORK ACCESS RULES

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sonicwall gx650

Table of Contents