User Guide

Page 80 SonicWALL Internet Security Appliance User’s Guide
Add a Known Service
1. Select the name of the service you want to add from the Add a known service list.
2. Click Add. The new service appears in the list box on the right side of the browser
window. Note that some services add more than one entry to the list.
Add a Custom Service
1. Select [Custom Service] from the Add a known service list.
2. Type a unique name, such as “CC:mail” or “Quake” in the Name field.
3. Enter the beginning number of the IP port range and ending number of the IP port
range in the Port Range fields. If the service only requires one IP port, enter the
single port number in both Port Range fields.
Note: Visit <http://www.ietf.org/rfc/rfc1700.txt> for a list of IP port numbers.
4. Select the IP protocol type, TCP, UDP or ICMP, from the Protocol list.
5. Click Add. The new service appears in the list on the right side of the browser window.
Note: If multiple entries with the same name are created, they are grouped together as a
single service and can not function as expected.
Enable Logging
You can enable and disable logging of events in the SonicWALL Event Log. For example,
if Linux authentication messages are filling up your log, you can disable logging of Linux
authentication.
1. Highlight the name of the desired service in the list.
2. Clear the Enable Logging check box.
3. Click Modify.
Delete a Service
To delete a service, highlight the name in the list, and click Delete Service. If multiple
entries with the same name exist, delete all entries to remove the service.
Rules
The SonicWALL evaluates the source IP address, the destination IP address, and the
service type when determining whether to allow or deny traffic. Custom rules take
precedence and override the SonicWALL default rules.
By default, the SonicWALL blocks all traffic from the Internet to the LAN and allows all
traffic from the LAN to the Internet. Custom rules can be created to modify the default
rules. For example, rules can be created for the following purposes:
Allow traffic from the Internet to a mail server on the LAN.
Restrict users on the LAN from using a specified service, such as QuickTime.
Allow specified IP addresses on the Internet to access a sensitive server on the LAN.
integrated_manual.book Page 80 Friday, October 12, 2001 2:56 PM