Solved

How do I read a Sonicwall Configuration file it is encripted

Posted on 2008-10-29
7
6,762 Views
Last Modified: 2013-11-16
I can export the configuration file, However the resultant text file is unreadable.  Example of a portion:

"YmxlR3Vlc3RTZXJ2aWNlc18wPTAmem9uZU9iak1heEd1ZXN0c18wPTAmem9uZU9iakJ5cGFzc0F1dGhfMD0wJnpvbmVPYmpCeXBhc3NBdXRoTWFjT2JqXzA9JnpvbmVPYmpEYXRFbmFibGVkXzA9MCZ6b25lT2JqSW50ZXJHdWVzdENvbW1fMD0wJnpvbmVPYmpCeXBhc3NBdl8wPTAmem9uZU9ialNtdHBSZWRpckVuYWJsZWRfMD0wJnpvbmVPYmpTbXRwUmVkaXJJUF8wPSZ6b25lT2JqV2xhbkRlbnlFbmFibGVfMD0wJnpvbmVPYmpXbGFuRGVueU5ldHdvcmtfMD0mem9uZU9ialdsYW5QYXNzRW5hYmxlXzA9MCZ6b25lT2JqV2xhblBhc3NOZXR3b3JrXzA9JnpvbmVPYmpDdXN0TG9naW5FbmFibGVfMD0wJnpvbmVPYmpDdXN0TG9naW5"
Is there a tool to read and edit this?
0
Comment
Question by:mbpaulsr999
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 4

Assisted Solution

by:bmonroe44
bmonroe44 earned 40 total points
ID: 22834074
You can download the TSR report which will show all of your setting inside the sonicwall.
hope that helps
0
 

Author Comment

by:mbpaulsr999
ID: 22834236
How do I find the TSR report?
0
 
LVL 7

Accepted Solution

by:
VCBooth earned 50 total points
ID: 22841161
Login to the SonicWALL with Administrative rights and then navigate to Diagnostics.

If the top section is not showing the TSR options then click on Show TSR section in the top right.  Select what you want to report on and then click on Download Report.
0
What, When and Where - Security Threats from Q1

Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.

 
LVL 17

Assisted Solution

by:ccomley
ccomley earned 35 total points
ID: 22866582
Depends whar you're trying to do.

The file you've exported is intended to be a "backed up" config that you can re-import should you lose the config, screw it up, or blow the hardware and need to movethe config to the replacement hardware.

It's not intended to be human-readable.

If you want a "hard copy" of the config that is human-readable, then as the lads above suggested, you should save or print the "Tech Support Report". This is many pages long but includes ALL the config, inluding VPN keys, routes, objects, etc, etc...

BUT the TSR is NOT machine-readable, it can' t be re-imported to the box. If it was the only backup you had you would have to go through it page by page manually re-entering all the data.

So - you should probably make BOTH, and remember to update them both any time you make a config change that you decide to keep.

(This applies to all models of Sonicwall firewall from TZ150 to Pro, Std and Enh firmware).


0
 

Author Closing Comment

by:mbpaulsr999
ID: 31511318
Although the total solution took three different reponses the end result was what was needed.  Thanks.  
0
 
LVL 17

Expert Comment

by:ccomley
ID: 22867201
all three answers were correct, mine was just more detailed becauas I decided NOT to assume I knew what you were tryign to do.

But if you had SAID what you were trying to do in the question I'm sure all three of us would've gone straight to the detail you needed! :-)

0
 
LVL 1

Expert Comment

by:MRowan75
ID: 38283857
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question