Solved

Sonicwall TZ100: what to change on default settings + qos on rdp?

Posted on 2014-02-05
2
700 Views
Last Modified: 2016-11-23
Hi,

I have 2 questions on my Sonicwall TZ100 (Dell now):

1.what best practise changes would you do to default settings? Have some rules, policies but didn't change much to deafault settings

2.Can you set priority on specific protocols, f.e. I would like to have RDP absolute priority over SMB traffic. Cannot put it into KB or MB but copying files should not interfere with RDP.

J.
0
Comment
Question by:janhoedt
  • 2
2 Comments
 
LVL 24

Accepted Solution

by:
diverseit earned 500 total points
ID: 39837343
Hi janhoedt,

To address your first question, it really depends on what you are wanting to do. The defaults are pretty much Best Practice already. However, there are many hardening techniques you can apply as a Best Practice as well but they are very lengthy.

A few of the major ones would be as follows:
Firewall Settings > Advanced:
Check both Enable Stealth Mode & Randomize IP ID.
Under IP and UDP Checksum Enforcement check both Enable IP header checksum enforcement &  Enable UDP checksum enforcement.

Purchase CGSS and configure each module.

To answer your second question, yes you can prioritize Access Rules and NAT Policies. Click on the Priority to set higher or lower.

Let me know if you have any other questions!
0
 
LVL 24

Expert Comment

by:diverseit
ID: 39845760
Glad I cloud help. .. Thanks for the points!
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now