Solved

Sonicwall Security Service questions

Posted on 2016-09-01
2
51 Views
Last Modified: 2016-09-01
We have NSA 250M Sonicwall with Security services(Anti-virus,intrusion prevention) until 8/23/2016. It expired a week ago.
The reason I just let it expires is we are waiting for Merger and this will be taken down in a couple of month.
My question is what happens when the license expires? Does it automatically pass virus and intrusion attempts pass through or  does it just not  download new definition files and continue working with existing definitions?

When I click Anti-virus and Intrusion Prevention, it shows like this. It doesn't say whether it still works with existing definitions or it passes through.

gav
Also, when I look at log, it seems filtering intrusion attempt such as ip spoofing,...

2016-09-01-12_52_10-2016-09-01-12_49.png2016-09-01-12_51_28-2016-09-01-12_49.png
0
Comment
Question by:crcsupport
2 Comments
 
LVL 5

Accepted Solution

by:
TechieMD earned 250 total points
ID: 41780278
When your licenses expire, the machine essentially just becomes a stateful packet inspection device. Everything is still logged, judgements on what would happen are shown, but everything just passes through.
0
 
LVL 7

Assisted Solution

by:J Spoor
J Spoor earned 250 total points
ID: 41780279
IP Spoof is part of the code, not of IPS.
Without Security Service active / licensed it will indeed not block intrusions or viruses.


View example configurations and the SonicWALL webui and features on http://livedemo.sonicwall.com or http://ngfw-demo.com

Multiply the effectiveness of your APT Sandbox, stop unknown and zero-day attacks at the gateway. See a demo on http://apt-demo.com or http://atp.demo.com

You can also view the Next-Generation Firewalls via
http://next-generation-firewall.com or http://next-generation-firewall-demo.com
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
7 camera surveillance system hacked 6 52
How do You Stop a DDoS Attack 7 28
Non admin needs to install programs 17 36
ASP server side get value 15 24
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question