SlideShare a Scribd company logo
Dell Enterprise User Forum: NHOL4
Dell Networking Wired, Wireless and
Security Solutions Lab
W-Series Instant Access Points SonicWALL TZ Series Firewalls
X-Series Smart Managed Switches
Dell Gear You will use in the Lab
Lab Setting
• Each of your Stations
– Represents an office or branch
within a larger business
› (or an individual office for a smaller
business)
– Guest & Employee at each
location
– Wireless, Wired, Firewall at
each location
Headquarters
Offices
Lab Agenda & Plan
• Administrator GUIs for
W-Instant, X-Series, and
SonicWALL
• Setup key interfaces and
features
• Test the resulting access
connectivity and
security set up in the lab
Lab Flow
Configure
•Configure X-Series switch
– VLANs for Employee and Guest
– Assign VLANs to ports
•Configure SonicWALL
– Interfaces and site-to-site VPN
•Configure Wireless Access Point
– Guest and Employee access
Test
•Test Guest access
– Access “internet”
– Blocked access to corporate data center
•Test Employee access
– Access “internet”
– Access corporate data center through VPN
•Enable App Control
– Test image files are identified by signature
and blocked
Notes
•Configurations are for demonstration purposes only
•Chrome is the default browser for all configuration tasks
•Wireless authentication used is WPA2-PSK (pre-shared key)
– W-Instant Access Points are capable of enterprise 802.1x authentication.
•Internet access is simulated
– Public internet is simulated with a single subnet, and a webserver hosting a custom
“public” website.
– Corporate Data Center is simulated with a separate webserver hosting a custom “private”
website.
Administrator network
• This lab can be fully configured through the admin
network
• Access through SSID: stationX_admin
• Click on WLAN icon in toolbar, select the admin
network according to your station number
• password “dell1234”
Lab stations are numbered 1 thru 8.
Several configuration settings use the lab station numbers
• example: Subnets 172.20.X.1 and 10.1.100.X
• Wireless SSIDs: E_TestX and G_TestX
Replace X with station
number (see lab guide)
Lab
Dell World User Forum: NHOL4 Session
Dell Networking Wired, Wireless and Security
Solutions Lab
Step-by-Step Lab Guide
Dell Network Solutions Engineering
October 2015
2
Revisions
Date Description Authors
October 2015 Initial release Colin King, Neal Beard
©2015 Dell Inc., All rights reserved.
Except as stated below, no part of this document may be reproduced, distributed or transmitted in any form or by any
means, without express permission of Dell.
You may distribute this document within your company or organization only, without alteration of its contents.
THIS DOCUMENT IS PROVIDED “AS-IS”, AND WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED. IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE SPECIFICALLY DISCLAIMED.
PRODUCT WARRANTIES APPLICABLE TO THE DELL PRODUCTS DESCRIBED IN THIS DOCUMENT MAY BE FOUND
AT: http://www.dell.com/learn/us/en/vn/terms-of-sale-commercial-and-public-sector-warranties Performance of
network reference architectures discussed in this document may vary with differing deployment conditions, network
loads, and the like. Third party products may be included in reference architectures for the convenience of the reader.
Inclusion of such third party products does not necessarily constitute Dell’s recommendation of those products.
Please consult your Dell representative for additional information.
Trademarks used in this text:
Dell™, the Dell logo, Dell Boomi™, Dell Precision™ ,OptiPlex™, Latitude™, PowerEdge™, PowerVault™,
PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ and Vostro™ are
trademarks of Dell Inc. Other Dell trademarks may be used in this document. Cisco Nexus®, Cisco MDS®, Cisco NX-
0S®, and other Cisco Catalyst® are registered trademarks of Cisco System Inc. EMC VNX®, and EMC Unisphere® are
registered trademarks of EMC Corporation. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks
of Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD Opteron™, AMD
Phenom™ and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows
Server®, Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered
trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat® and Red Hat® Enterprise
Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are
registered trademarks of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of
Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks
or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, Virtual SMP®, vMotion®,
vCenter® and vSphere® are registered trademarks or trademarks of VMware, Inc. in the United States or other
countries. IBM® is a registered trademark of International Business Machines Corporation. Broadcom® and
NetXtreme® are registered trademarks of Broadcom Corporation. Qlogic is a registered trademark of QLogic
Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming
the marks and/or names or their products and are the property of their respective owners. Dell disclaims proprietary
interest in the marks and names of others.
3
Table of contents
Revisions............................................................................................................................................................................................. 2
1 Dell Networking Wired, Wireless and Security Solutions Lab............................................................................................4
1.1 Dell Networking X-Series Smart Managed Switches................................................................................................4
1.2 Dell SonicWALL TZ300 Firewall....................................................................................................................................4
1.3 Dell Networking W-Series Instant Access Points, W-IAP205 ................................................................................. 5
1.4 Lab Description and Diagram ....................................................................................................................................... 5
2 Dell Networking X-Series Configuration ............................................................................................................................... 7
3 Dell Networking SonicWALL Firewall Configuration.........................................................................................................20
4 Dell Networking W-IAP205 Wireless Configuration..........................................................................................................27
5 Dell Networking Testing and Validation ..............................................................................................................................35
A Important Lab IP Address Information.................................................................................................................................46
B Lab Notes: .................................................................................................................................................................................47
4
1 Dell Networking Wired, Wireless and Security Solutions Lab
1.1 Dell Networking X-Series Smart Managed Switches
Dell Networking X-Series 1008 and 1018P
The Dell Networking X-Series is a family of smart managed 1GbE and 10GbE Ethernet switches designed
for those who need enterprise-class network control fused with consumer-like ease.
Features Demonstrated in this lab
 Managed mode with GUI
 Setup VLANs and interface IPs
 Trunk mode on interface to wireless access points
 DHCP server
 PoE/PoE+ interface powering for wireless access points
1.2 Dell SonicWALL TZ300 Firewall
Dell SonicWALL TZ300
Dell SonicWALL TZ series firewalls are high-performance, enterprise-grade network security solutions. Dell
SonicWALL products encompass enterprise grade network protection that includes anti-malware,
intrusion prevention, application control and content/URL filtering
Features Demonstrated in this lab
Network Security with focus on:
 Application Control
 VPN – Site to Site
5
1.3 Dell Networking W-Series Instant Access Points, W-IAP205
Dell Networking W-IAP205
W-Series access points maximize mobile device performance in enterprise WiFi environments.
Features Demonstrated in this lab
 Employee and Guest wireless access with policies
 Captive portal with authentication
1.4 Lab Description and Diagram
This lab demonstrates employee and guest wireless access with policies and content filtering. Each station
represents a remote site, incorporating security, switching, and wireless devices.
Lab attendees will start from a base configuration with some pre-configured settings to enable the
features highlighted in the preceding pages.
In this lab, attendees will become experts in:
 Experience with the administrator GUIs
 Setup key interfaces and features
 Tested connectivity and security
6
7
2 Dell Networking X-Series Configuration
Dell Networking X-Series 1008 and 1018P
Objectives:
Configure employee VLAN 20
o Assign vlan to ports 7 and 8
o Assign vlan interface an IP address
 Configure guest VLAN 30
o Assign vlan to ports 5 and 6
o Assign vlan interface an IP address
 Define a static default route to the employee interface on the SonicWALL
Step 1
Connect to the wireless network for your station number SSID: “stationX_admin” (X is the station
number). Password: dell1234
Launch the Chrome browser and type in 192.168.2.1 to browse to the X-Series login page. Login with
username and password of admin/admin and hit enter.
8
Step 2
In the X-Series Dell Networking Administrator GUI Dashboard view, click on the VLAN radio button under
the Configure menu on the right hand side of the screen. This will launch the VLAN wizard and allow the
Guest and Employee VLANs to be configured.
Step 3
In the VLAN wizard, choose Configure VLAN and click Next.
Step 4
Click on the +Add button to add the Employee VLAN 20
9
Step 5
Enter 20 in the VLAN ID field and Employee in the VLAN Name field and click Ok.
Step 6
Click the +Add button to add the Guest VLAN 30
Step 7
Enter 30 in the VLAN ID field and Guest in the VLAN Name field and click Ok.
10
Step 8
After creating VLAN’s 20 and 30 for the Employee and Guest networks, click Next to review the VLANs
created.
Step 9
After confirming that the VLAN numbering and names are correct click Apply to assign ports to the VLANs
11
Step 10
After clicking the Apply button in Step. 9, the assign ports to VLAN wizards is launched. Click Yes to
confirm that assigning ports to VLANS is the next task.
Step 11
Click on ports 7 and 8 (highlights blue), click on Vlan ID 20 then choose Next.
12
Step 12
Review that the correct ports are assigned to the correct Vlan ID then click Apply.
Step 13
In the X-Series Dell Networking Administrator GUI Dashboard view, click on the VLAN radio button under
the Configure menu on the right hand side of the screen. This will launch the VLAN wizard and allow ports
5 and 6 to be assigned to the Employee Vlan 30.
13
Step 14
Select Configure and Assign Ports to VLAN and click Next
Step 15
Click on ports 5 and 6, click on Vlan ID 30 then choose Next.
14
Step 16
Review that the correct ports are assigned to the correct Vlan ID then click Apply.
Now that the Guest and Employee VLANs have been created and ports have been assigned the next step is
to assign an IP address to each Vlan interface.
Step 17
From the X-Series Dashboard main menu click on Switch Management then click on IPv4 Addressing. In
the IPv4 Addressing menu VLAN1 is assigned the current management IP address, click on the Edit icon on
the right hand side of the screen to start assigning IP addresses to the Guest and Employee VLANs.
15
Step 18
Click on the +Add button
Step 19
In the Add IPv4 Addressings page for the Employee Vlan 20:
 Interface Type: VLAN
 Interface: 20
 IP Address Source: Static
 IP address: 172.20.X.1 (X is station number)
 Address Class: Prefix Length
 Prefix Length: 24
Finally in the Apply to: field use the drop down arrow and pick Running and Startup Configuration then
click on Ok.
16
Step 20
Click on Edit again, then +Add icon to add the IP interface to Guest Vlan 30
Step 21
In the Add IPv4 Addressings page for the Guest Vlan 30:
 Interface Type: VLAN
 Interface: 30
 IP Address Source: Static
 IP address: 172.30.X.1 (X is station number)
 Address Class: Prefix Length
 Prefix Length: 24
Finally in the Apply to: field use the drop down arrow and pick Running and Startup Configuration then
click on Ok.
17
Step 22
In the IPv4 Addressing page confirm that the correct IP addresses have been assigned to the correct VLAN
interfaces. To exit this menu click on the Menu > navigation link then click on the Dashboard navigation
link.
Step 23
Now that the Vlans have had an IP address assigned to them the final step in the X-Series configuration is
to assign a default static route that will allow a public address to route through the SonicWALL TZ300. In
order to navigate to the IPv4 Route Settings, from the main Dashboard menu click on Network
Administration, then click on Route Settings, then click on IPv4 Route Settings. In order to set a default
station route click on the Edit icon. (IPv4 routes list is shown below, hit down arrow to reveal if desired)
18
Step 24
In the Add IPv4 Routes Table page:
 Destination IPv4 Prefix: 0.0.0.0
 Network Mask: 0.0.0.0
 Route Type: Remote
 Next Hop: 172.20.X.2 (X is station number)
Finally in the Apply to: field use the drop down arrow and pick Running and Startup Configuration then
click on Ok.
Step 25
In the Edit IPv4 Routes Table page confirm that the static default route is input correctly, then click on the
X to exit this menu.
19
Step 26
The final step in the X-Series lab configuration will be to save all the switch settings to the Startup
Configuration. Click on the Gear Icon in the upper right corner and then click on Save to Startup
Configuration.
20
3 Dell Networking SonicWALL Firewall Configuration
Dell Networking SonicWALL TZ300
Objectives:
 Configure the X3 interface
o Assign a Employee ip address
o Assign this interface to a VPN
 Configure the X4 interface
o Assign a Guest ip address
 Set the VPN to allow the X3 interface
Step 1.
Launch the Chrome browser and type in 192.168.2.2 to browse to the SonicWALL login page. Login with
username and password of admin/password and hit enter.
Note: If the Chrome browser flashes the warning: “Your connection is not private”. Click on the
Advanced link and then click on Proceed to 192.168.2.2 (unsafe).
21
Step 2
In the SonicWALL browser interface, click on Network then click on Interfaces. In the Interfaces section
click on the Configure icon to the far right of the X3 interface.
Step 3
In the Edit Interface applet window, Under the General Tab click on the Unassigned field across from
Zone: and choose LAN
22
Step 4
Once LAN is chosen for the Zone, the next menu choices are:
 Mode / IP Assignment: Static IP Mode
 IP Address: 172.20.X.2 (X is station number)
 Subnet Mask: 255.255.255.0
 Management: HTTPS and Ping
Once all the values are entered click Ok, this will return you back to the Interfaces section.
23
Step 5
In the SonicWALL browser interface, click on Network then click on Interfaces. In the Interfaces section
click on the Configure icon to the far right of the X4 interface.
Step 6
In the Edit Interface applet window, Under the General Tab click on the Unassigned field across from
Zone: and choose LAN. (see picture in Step 3 above)
Step 7
Once LAN is chosen for the Zone, the next menu choices are:
 Mode / IP Assignment: Static IP Mode
 IP Address: 172.30.X.2 (X is station number)
 Subnet Mask: 255.255.255.0
 Management: HTTPS and Ping
Once all the values are entered click Ok, this will return you back to the Interfaces section.
24
Step 8
Next go down the menu to VPN and click on the Add button.
Step 9
In the General tab under Security Policy enter the following values:
 Policy type: Site to Site
 Authentication Method: IKE using Preshared Secret
 Name: To_Corporate
 IPsec Primary Gateway Name or Address: 10.1.100.200
In the IKE Authentication section enter the following values:
 Shared Secret: dell
 Confirm Shared Secret: dell
 Local IKE ID: 10.1.100.X (X is station number)
 Peer IKE ID: 10.1.100.200
Do not click OK, Continue with Step 10.
25
Step 10
Once all the values have been entered on the General tab, click on the Network tab.
Local Networks section: Choose local network from list: X3 Subnet
Remote Networks section: Choose destination network from list: click on the Select Remote Network
drop down arrow and select create new address object
Step 11
When create new address object is selected this generates a new applet window. In this applet window
enter:
 Name: Corporate
 Zone Assignment: LAN
 Type: Network
 Network: 172.20.100.0
 Netmask/Prefix Length:
255.255.255.0
Once these values have been entered click Ok
26
Step 12
Once the values have been properly entered in the Network tab section (Do not click Ok), click on the
Advanced tab and check the box next to Enable Keep Alive. Click Ok.
Step 13
Once the VPN values have been entered and you have clicked Ok in the Advanced tab, the SonicWall GUI
will return to the main VPN interface. In the main VPN interface we can see that VPN Policy is green or
healthy. In the Currently Active VPN Tunnels section, we can see that the VPN policy To_Corporate is
listed.
27
4 Dell Networking W-IAP205 Wireless Configuration
Dell Networking W-Series W-IAP205
Objectives:
 Configure the Employee WLAN
 Configure the Guest WLAN
 Set the VPN
Step 1
Launch the Chrome browser and type in 192.168.2.10X (X is station number) to browse to the W-IAP205
login page. Login with username and password of admin/admin and hit enter.
28
Note: If the Chrome browser flashes a warning “Your connection is not private”. Click on the Advanced
link and then click on Proceed to 192.168.2.2 (unsafe).
Step 2
In the W-IAP205 main page under the Network menu click on New
29
Step 3
In this step the Employee wireless network will be created. After clicking on New, a New WLAN window
will be launched. In this New WLAN window enter in the name or SSID of the Employee network. For each
assigned station the name will be E_TestX (X will be replaced with the assigned station number). Once the
name has been entered click Next.
30
Step 4
Under Client IP and VLAN Assignment:
 Client IP assignment: Network assigned
 Client VLAN assignment: Static
 VLAN ID: 20
Click Next to go to the Security section.
Step 5
In the Security section enter:
 Passphrase: dell1234 Retype: dell1234
Click Next
31
Step 6
Click Finish to return to the main menu.
Step 7
In the W-IAP205 main page under the Network menu click on New
32
Step 8
In this step the Guest wireless network will be created. After clicking on New, a New WLAN window will be
launched. In this New WLAN window enter in the name or SSID of the Guest network. For each assigned
station the name will be G_TestX (X will be replaced with the assigned station number). Once the name
has been entered go to Primary Usage and choose Guest click Next to continue.
Step 9
In the VLAN section under Client VLAN assignment choose Custom. In the drop down menu next to
Custom choose guest (vlan:30). Click Next to continue.
33
Step 10.
In the Security section choose:
 Encryption: Enabled
 Key management: WPA-2 Personal (default setting)
 Passphrase: dell1234
 Retype: dell1234
 Redirect URL: http://10.1.100.101
Click Next to continue.
34
Step 11
In the final Access Rules section click Finish.
Step 12.
In the main W-Series Instant IAP page we can see that both WLAN networks have been successfully
configured.
35
5 Dell Networking Testing and Validation
Now that the networking equipment has been configured to allow guest and employee access to their
online resources, we will test and validate the areas of concern.
Step 1
Connect to the G_TestX (X is station number) WLAN in Windows Network and Sharing Center. Once you
have connected, open chrome and enter the ip address 1.1.1.1 (or any other ip address). This demonstrates
the fact that the IAP will redirect the guest user to the IAP captive portal splash page on any access
attempt. Click on Accept and you will be redirected to the public internet site of the Guest network.
36
Step 2
By accessing this website, this proves that the Guest network on the IAP can reach the internet through
the X-Series switch and the SonicWALL firewall. The ip address 10.1.100.101 in the Chrome url bar is the
same ip address entered in for the URL Redirect on the Security tab for step 10 during the IAP Guest
network configuration. This setting can also be used to direct to an internal home page.
37
Step 3
In the Chrome browser enter the ip address 172.20.100.100. This is the corporate data center web server
for the Employee network, accessed through the VPN. This webpage will not be accessible by the Guest
user due to the topology of this lab configuration. Administrators can further protect their network by
implementing policies and zones within the firewall.
38
Step 4
Disconnect from the Guest network (G_TestX) WLAN and connect to the Employee network (E_TestX)
WLAN. Open the chrome browser, enter the ip address 172.20.100.100 if it is not already there. This ip
address allows employee to access to the internal data center web server.
39
Step 5
Enter the ip address 10.1.100.101. This is the same public internet site that the Guest users were able to
access.
Step 6
Login to the SonicWALL TZ300 admin page at the ip address 172.20.X.2 (X is station number)
Reminder> username:admin password:password
On the menu click on Firewall, then go to App Control Advanced. Under App Control Global Settings
 Check Enable App Control
 Check Enable Logging For All Apps
Click Accept.
Note: the ip management interface was enabled for all three interfaces, admin, employee, and guest.
40
Step 7
TIME CHECK- The app control policy has already been configured for you. If you have time, follow steps
7, 8, and 9 to discover what the policy settings look like. If you’re limited on time, skip to step 10.
In the App Control Page, scroll down to App Control Advanced and click on the Category drop down
menu. Choose FILETYPE-DETECTION, click on the Configure icon for Image.
41
Step 8
In the Image configuration settings:
 Block: Enable
 Log: Enable
 Included Users/Groups: All (Admin, Employee, and Guest)
 Included IP Address Range: All
Click Cancel when you are finished reviewing the settings.
42
Step 9
Under the App Control Advanced section, in View Style: click on the Application drop down menu and
choose Image, next click on the Viewed By: drop down menu and choose Signature. We can now see
what image file types the advanced app control is filtering or blocking.
43
Step 10
Logout of the SonicWALL. Open a new browser window. In the Chrome browser click on the Clear Cache
button on the bookmark bar then click on the Clear browsing data button.
44
Step 11
In the Chrome URL field enter the ip address 10.1.100.101. With the SonicWALL firewall image app control
enabled the .gif and .jpg images on the public internet web page are being blocked.
45
Step 12.
Log back in to the SonicWall firewall. In the SonicWALL menu scroll down to Log, click on it to expand its
sub-menu choices and then click on Log Monitor. In the Log Monitor entries, there will be two
Application Control Firewall Alerts for GIF and JPEG HTTP download attempts.
46
A Important Lab IP Address Information
X-Series Switch SonicWALL W-Series Instant
X-1008P/1018P TZ300 W-IAP205
Management
IP address
Management
IP address
Management
IP address
Station 1 192.168.2.1 192.168.2.2 192.168.2.101
Station 2 192.168.2.1 192.168.2.2 192.168.2.102
Station 3 192.168.2.1 192.168.2.2 192.168.2.103
Station 4 192.168.2.1 192.168.2.2 192.168.2.104
Station 5 192.168.2.1 192.168.2.2 192.168.2.105
Station 6 192.168.2.1 192.168.2.2 192.168.2.106
Station 7 192.168.2.1 192.168.2.2 192.168.2.107
Station 8 192.168.2.1 192.168.2.2 192.168.2.108
X-Series Switch SonicWALL
X-1008P/1018P TZ300
Employee
VLAN 20 interface
IP address
Employee
VLAN 20 interface
IP address
Station 1 172.20.1.1 172.20.1.2
Station 2 172.20.2.1 172.20.2.2
Station 3 172.20.3.1 172.20.3.2
Station 4 172.20.4.1 172.20.4.2
Station 5 172.20.5.1 172.20.5.2
Station 6 172.20.6.1 172.20.6.2
Station 7 172.20.7.1 172.20.7.2
Station 8 172.20.8.1 172.20.8.2
X-Series Switch SonicWALL
X-1008P/1018P TZ300
Guest
VLAN 30 interface
IP address
Guest
VLAN 30 interface
IP address
Station 1 172.30.1.1 172.30.1.2
Station 2 172.30.2.1 172.30.2.2
Station 3 172.30.3.1 172.30.3.2
Station 4 172.30.4.1 172.30.4.2
Station 5 172.30.5.1 172.30.5.2
Station 6 172.30.6.1 172.30.6.2
Station 7 172.30.7.1 172.30.7.2
Station 8 172.30.8.1 172.30.8.2
47
B Lab Notes:

More Related Content

PDF
Dell Storage Management
PDF
The Evolving Data Center Network: Open and Software-Defined
PDF
MT58 High performance graphics for VDI: A technical discussion
PDF
2020 Vision For Your Network
PDF
MT41 Dell EMC VMAX: Ask the Experts
PPS
Dell EMC storage sc series
PDF
MT25 Server technology trends, workload impacts, and the Dell Point of View
PDF
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
Dell Storage Management
The Evolving Data Center Network: Open and Software-Defined
MT58 High performance graphics for VDI: A technical discussion
2020 Vision For Your Network
MT41 Dell EMC VMAX: Ask the Experts
Dell EMC storage sc series
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...

What's hot (20)

PDF
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
PDF
The Software Based Data Center. Is It For You?
PDF
MT47 Modernize infrastructure for a modern data center
PDF
MT46 Virtualization Integration with Unity
PDF
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
PDF
MT42 The impact of high performance Oracle workloads on the evolution of the ...
PDF
Diagnosability versus The Cloud, Redwood Shores 2011-08-30
PDF
Tailoring Converged Solutions To Fit Your Business Needs, Not The Other Way A...
PDF
MT49 Dell EMC XtremIO: Product Overview and New Use Cases
PDF
MT01 The business imperatives driving cloud adoption
PDF
Introducing Lenovo XClarity: Simplified Hardware Resource Management
PPTX
Desktop as a Service DaaS in India by BSNL SIS
PDF
Whitepaper: Evolution of the Software Defined Data Center - Happiest Minds
PDF
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
PPT
Cloud computing simplified
PPT
Grid rac preso 051007
PDF
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...
PPT
Desktop as a service (daas)
PDF
9. intel prez sesiune hw
PDF
VMworld 2013: SDDC is Here and Now: A Success Story
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
The Software Based Data Center. Is It For You?
MT47 Modernize infrastructure for a modern data center
MT46 Virtualization Integration with Unity
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT42 The impact of high performance Oracle workloads on the evolution of the ...
Diagnosability versus The Cloud, Redwood Shores 2011-08-30
Tailoring Converged Solutions To Fit Your Business Needs, Not The Other Way A...
MT49 Dell EMC XtremIO: Product Overview and New Use Cases
MT01 The business imperatives driving cloud adoption
Introducing Lenovo XClarity: Simplified Hardware Resource Management
Desktop as a Service DaaS in India by BSNL SIS
Whitepaper: Evolution of the Software Defined Data Center - Happiest Minds
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Cloud computing simplified
Grid rac preso 051007
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...
Desktop as a service (daas)
9. intel prez sesiune hw
VMworld 2013: SDDC is Here and Now: A Success Story
Ad

Viewers also liked (14)

PDF
Dell Data Center Networking Overview
PDF
Dell Cloud Manager Overview
PDF
Sonic wall tz series
PDF
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
PDF
Dell EMC VxRAIL Appliance based on VMware SDS
PDF
MT23 Benefits of Modular Computing from Data Center to Branch Office
PDF
MT129 Isilon Data Lake Overview
PDF
John Kenevey, Open Compute "Open Compute Project: history, value proposition...
PDF
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
PPT
Networking
PPTX
Flexible and Real-Time Stream Processing with Apache Flink
PPTX
Real Time Data Processing using Spark Streaming | Data Day Texas 2015
PPT
PPTX
Firewall presentation
Dell Data Center Networking Overview
Dell Cloud Manager Overview
Sonic wall tz series
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Dell EMC VxRAIL Appliance based on VMware SDS
MT23 Benefits of Modular Computing from Data Center to Branch Office
MT129 Isilon Data Lake Overview
John Kenevey, Open Compute "Open Compute Project: history, value proposition...
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
Networking
Flexible and Real-Time Stream Processing with Apache Flink
Real Time Data Processing using Spark Streaming | Data Day Texas 2015
Firewall presentation
Ad

Similar to Dell Networking Wired, Wireless and Security Solutions Lab (20)

PDF
MT17_Building Integrated and Secure Networks with limited IT Support
PDF
PLNOG15: Dell Open Networking – revolution in networking we deserve! - Andrze...
PDF
Sonicwall wireless & sra
DOC
Chapter 9 lab a security policy development and implementation (instructor ve...
PPT
wireless lan security.ppt
PPTX
EMEA-DSG Lab
PDF
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
PDF
DellEMC Networking Product Portfolio Guide
DOCX
GREAT MINDS
PPT
wireless lan security for their all details
PPS
Colubris Basic Customer Presentation
DOCX
CCNA 2 Skills Assessment - SBCCNA 2 Skills Assessment - SBTopolo.docx
PDF
Modernize & transform your network
PDF
Securing Your Linux System
PPTX
Performance out of the box developers
PPTX
HP_NextGEN_Training_Q4_2015
PDF
Dell Networking Switch Configuration Examples
PDF
SDN, com fer-ho realitat i quins avantatges puc treure-hi
PDF
PLNOG16: Dell One Network – Unifikacja sieci LAN, Andrzej Oleszek
PPTX
Advanced ClearPass Workshop
MT17_Building Integrated and Secure Networks with limited IT Support
PLNOG15: Dell Open Networking – revolution in networking we deserve! - Andrze...
Sonicwall wireless & sra
Chapter 9 lab a security policy development and implementation (instructor ve...
wireless lan security.ppt
EMEA-DSG Lab
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
DellEMC Networking Product Portfolio Guide
GREAT MINDS
wireless lan security for their all details
Colubris Basic Customer Presentation
CCNA 2 Skills Assessment - SBCCNA 2 Skills Assessment - SBTopolo.docx
Modernize & transform your network
Securing Your Linux System
Performance out of the box developers
HP_NextGEN_Training_Q4_2015
Dell Networking Switch Configuration Examples
SDN, com fer-ho realitat i quins avantatges puc treure-hi
PLNOG16: Dell One Network – Unifikacja sieci LAN, Andrzej Oleszek
Advanced ClearPass Workshop

More from Dell World (20)

PDF
Dell PowerEdge Zero Touch Provisioning
PDF
Simplifying Systems Management
PDF
Channel Partners: Lead with Dell Software Solutions
PDF
Innovating Teaching & Learning: Next Generation Student Access Model
PDF
Executing on the promise of the Internet of Things (IoT)
PDF
Focus on business, not backups
PDF
NVMe PCIe and TLC V-NAND It’s about Time
PDF
Key Security Insights: Examining 2014 to predict emerging threats
PDF
The Keys To A Successful Identity And Access Management Program: How Does You...
PDF
Client Security Strategies To Defeat Advanced Threats
PDF
What a data-centric strategy gives you that others do not
PDF
Cloud: To Build or Buy - Can You Justify On-Premises IT?
PDF
Cloud security: Accelerating cloud adoption
PDF
Detecting advanced and evasive threats on the network
PDF
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
PDF
Client solutions for the modern workforce
PDF
Prescriptive Cloud Services for the Future Ready Enterprise
PDF
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
PDF
Innovations in desktop virtualization: Expanding to workstation use cases
PDF
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Dell PowerEdge Zero Touch Provisioning
Simplifying Systems Management
Channel Partners: Lead with Dell Software Solutions
Innovating Teaching & Learning: Next Generation Student Access Model
Executing on the promise of the Internet of Things (IoT)
Focus on business, not backups
NVMe PCIe and TLC V-NAND It’s about Time
Key Security Insights: Examining 2014 to predict emerging threats
The Keys To A Successful Identity And Access Management Program: How Does You...
Client Security Strategies To Defeat Advanced Threats
What a data-centric strategy gives you that others do not
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud security: Accelerating cloud adoption
Detecting advanced and evasive threats on the network
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
Client solutions for the modern workforce
Prescriptive Cloud Services for the Future Ready Enterprise
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Innovations in desktop virtualization: Expanding to workstation use cases
Extensibility: The Key To Managing Your Entire Cloud Portfolio

Recently uploaded (20)

PPTX
making presentation that do no stick.pptx
PPTX
INFERTILITY (FEMALE FACTORS).pptxgvcghhfcg
PPTX
sdn_based_controller_for_mobile_network_traffic_management1.pptx
PPTX
Operating System Processes_Scheduler OSS
PDF
Cableado de Controladores Logicos Programables
PPTX
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PPTX
Fundamentals of Computer.pptx Computer BSC
PPTX
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
PDF
Core Components of IoT, The elements need for IOT
PPTX
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
PPT
Hypersensitivity Namisha1111111111-WPS.ppt
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PDF
Chapter -24-By Dr Sajid Ali Ansari 2021.pdf
PPTX
Embeded System for Artificial intelligence 2.pptx
PPTX
KVL KCL ppt electrical electronics eee tiet
PPTX
code of ethics.pptxdvhwbssssSAssscasascc
PPTX
figurative-languagepowerpoint-150309132252-conversion-gate01.pptx
DOCX
A PROPOSAL ON IoT climate sensor 2.docx
PPT
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
PDF
How NGOs Save Costs with Affordable IT Rentals
making presentation that do no stick.pptx
INFERTILITY (FEMALE FACTORS).pptxgvcghhfcg
sdn_based_controller_for_mobile_network_traffic_management1.pptx
Operating System Processes_Scheduler OSS
Cableado de Controladores Logicos Programables
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
Fundamentals of Computer.pptx Computer BSC
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
Core Components of IoT, The elements need for IOT
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
Hypersensitivity Namisha1111111111-WPS.ppt
Dynamic Checkweighers and Automatic Weighing Machine Solutions
Chapter -24-By Dr Sajid Ali Ansari 2021.pdf
Embeded System for Artificial intelligence 2.pptx
KVL KCL ppt electrical electronics eee tiet
code of ethics.pptxdvhwbssssSAssscasascc
figurative-languagepowerpoint-150309132252-conversion-gate01.pptx
A PROPOSAL ON IoT climate sensor 2.docx
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
How NGOs Save Costs with Affordable IT Rentals

Dell Networking Wired, Wireless and Security Solutions Lab

  • 1. Dell Enterprise User Forum: NHOL4 Dell Networking Wired, Wireless and Security Solutions Lab
  • 2. W-Series Instant Access Points SonicWALL TZ Series Firewalls X-Series Smart Managed Switches Dell Gear You will use in the Lab
  • 3. Lab Setting • Each of your Stations – Represents an office or branch within a larger business › (or an individual office for a smaller business) – Guest & Employee at each location – Wireless, Wired, Firewall at each location Headquarters Offices
  • 4. Lab Agenda & Plan • Administrator GUIs for W-Instant, X-Series, and SonicWALL • Setup key interfaces and features • Test the resulting access connectivity and security set up in the lab
  • 5. Lab Flow Configure •Configure X-Series switch – VLANs for Employee and Guest – Assign VLANs to ports •Configure SonicWALL – Interfaces and site-to-site VPN •Configure Wireless Access Point – Guest and Employee access Test •Test Guest access – Access “internet” – Blocked access to corporate data center •Test Employee access – Access “internet” – Access corporate data center through VPN •Enable App Control – Test image files are identified by signature and blocked
  • 6. Notes •Configurations are for demonstration purposes only •Chrome is the default browser for all configuration tasks •Wireless authentication used is WPA2-PSK (pre-shared key) – W-Instant Access Points are capable of enterprise 802.1x authentication. •Internet access is simulated – Public internet is simulated with a single subnet, and a webserver hosting a custom “public” website. – Corporate Data Center is simulated with a separate webserver hosting a custom “private” website.
  • 7. Administrator network • This lab can be fully configured through the admin network • Access through SSID: stationX_admin • Click on WLAN icon in toolbar, select the admin network according to your station number • password “dell1234” Lab stations are numbered 1 thru 8. Several configuration settings use the lab station numbers • example: Subnets 172.20.X.1 and 10.1.100.X • Wireless SSIDs: E_TestX and G_TestX Replace X with station number (see lab guide)
  • 8. Lab
  • 9. Dell World User Forum: NHOL4 Session Dell Networking Wired, Wireless and Security Solutions Lab Step-by-Step Lab Guide Dell Network Solutions Engineering October 2015
  • 10. 2 Revisions Date Description Authors October 2015 Initial release Colin King, Neal Beard ©2015 Dell Inc., All rights reserved. Except as stated below, no part of this document may be reproduced, distributed or transmitted in any form or by any means, without express permission of Dell. You may distribute this document within your company or organization only, without alteration of its contents. THIS DOCUMENT IS PROVIDED “AS-IS”, AND WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE SPECIFICALLY DISCLAIMED. PRODUCT WARRANTIES APPLICABLE TO THE DELL PRODUCTS DESCRIBED IN THIS DOCUMENT MAY BE FOUND AT: http://www.dell.com/learn/us/en/vn/terms-of-sale-commercial-and-public-sector-warranties Performance of network reference architectures discussed in this document may vary with differing deployment conditions, network loads, and the like. Third party products may be included in reference architectures for the convenience of the reader. Inclusion of such third party products does not necessarily constitute Dell’s recommendation of those products. Please consult your Dell representative for additional information. Trademarks used in this text: Dell™, the Dell logo, Dell Boomi™, Dell Precision™ ,OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ and Vostro™ are trademarks of Dell Inc. Other Dell trademarks may be used in this document. Cisco Nexus®, Cisco MDS®, Cisco NX- 0S®, and other Cisco Catalyst® are registered trademarks of Cisco System Inc. EMC VNX®, and EMC Unisphere® are registered trademarks of EMC Corporation. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD Opteron™, AMD Phenom™ and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®, Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat® and Red Hat® Enterprise Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are registered trademarks of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, Virtual SMP®, vMotion®, vCenter® and vSphere® are registered trademarks or trademarks of VMware, Inc. in the United States or other countries. IBM® is a registered trademark of International Business Machines Corporation. Broadcom® and NetXtreme® are registered trademarks of Broadcom Corporation. Qlogic is a registered trademark of QLogic Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and/or names or their products and are the property of their respective owners. Dell disclaims proprietary interest in the marks and names of others.
  • 11. 3 Table of contents Revisions............................................................................................................................................................................................. 2 1 Dell Networking Wired, Wireless and Security Solutions Lab............................................................................................4 1.1 Dell Networking X-Series Smart Managed Switches................................................................................................4 1.2 Dell SonicWALL TZ300 Firewall....................................................................................................................................4 1.3 Dell Networking W-Series Instant Access Points, W-IAP205 ................................................................................. 5 1.4 Lab Description and Diagram ....................................................................................................................................... 5 2 Dell Networking X-Series Configuration ............................................................................................................................... 7 3 Dell Networking SonicWALL Firewall Configuration.........................................................................................................20 4 Dell Networking W-IAP205 Wireless Configuration..........................................................................................................27 5 Dell Networking Testing and Validation ..............................................................................................................................35 A Important Lab IP Address Information.................................................................................................................................46 B Lab Notes: .................................................................................................................................................................................47
  • 12. 4 1 Dell Networking Wired, Wireless and Security Solutions Lab 1.1 Dell Networking X-Series Smart Managed Switches Dell Networking X-Series 1008 and 1018P The Dell Networking X-Series is a family of smart managed 1GbE and 10GbE Ethernet switches designed for those who need enterprise-class network control fused with consumer-like ease. Features Demonstrated in this lab  Managed mode with GUI  Setup VLANs and interface IPs  Trunk mode on interface to wireless access points  DHCP server  PoE/PoE+ interface powering for wireless access points 1.2 Dell SonicWALL TZ300 Firewall Dell SonicWALL TZ300 Dell SonicWALL TZ series firewalls are high-performance, enterprise-grade network security solutions. Dell SonicWALL products encompass enterprise grade network protection that includes anti-malware, intrusion prevention, application control and content/URL filtering Features Demonstrated in this lab Network Security with focus on:  Application Control  VPN – Site to Site
  • 13. 5 1.3 Dell Networking W-Series Instant Access Points, W-IAP205 Dell Networking W-IAP205 W-Series access points maximize mobile device performance in enterprise WiFi environments. Features Demonstrated in this lab  Employee and Guest wireless access with policies  Captive portal with authentication 1.4 Lab Description and Diagram This lab demonstrates employee and guest wireless access with policies and content filtering. Each station represents a remote site, incorporating security, switching, and wireless devices. Lab attendees will start from a base configuration with some pre-configured settings to enable the features highlighted in the preceding pages. In this lab, attendees will become experts in:  Experience with the administrator GUIs  Setup key interfaces and features  Tested connectivity and security
  • 14. 6
  • 15. 7 2 Dell Networking X-Series Configuration Dell Networking X-Series 1008 and 1018P Objectives: Configure employee VLAN 20 o Assign vlan to ports 7 and 8 o Assign vlan interface an IP address  Configure guest VLAN 30 o Assign vlan to ports 5 and 6 o Assign vlan interface an IP address  Define a static default route to the employee interface on the SonicWALL Step 1 Connect to the wireless network for your station number SSID: “stationX_admin” (X is the station number). Password: dell1234 Launch the Chrome browser and type in 192.168.2.1 to browse to the X-Series login page. Login with username and password of admin/admin and hit enter.
  • 16. 8 Step 2 In the X-Series Dell Networking Administrator GUI Dashboard view, click on the VLAN radio button under the Configure menu on the right hand side of the screen. This will launch the VLAN wizard and allow the Guest and Employee VLANs to be configured. Step 3 In the VLAN wizard, choose Configure VLAN and click Next. Step 4 Click on the +Add button to add the Employee VLAN 20
  • 17. 9 Step 5 Enter 20 in the VLAN ID field and Employee in the VLAN Name field and click Ok. Step 6 Click the +Add button to add the Guest VLAN 30 Step 7 Enter 30 in the VLAN ID field and Guest in the VLAN Name field and click Ok.
  • 18. 10 Step 8 After creating VLAN’s 20 and 30 for the Employee and Guest networks, click Next to review the VLANs created. Step 9 After confirming that the VLAN numbering and names are correct click Apply to assign ports to the VLANs
  • 19. 11 Step 10 After clicking the Apply button in Step. 9, the assign ports to VLAN wizards is launched. Click Yes to confirm that assigning ports to VLANS is the next task. Step 11 Click on ports 7 and 8 (highlights blue), click on Vlan ID 20 then choose Next.
  • 20. 12 Step 12 Review that the correct ports are assigned to the correct Vlan ID then click Apply. Step 13 In the X-Series Dell Networking Administrator GUI Dashboard view, click on the VLAN radio button under the Configure menu on the right hand side of the screen. This will launch the VLAN wizard and allow ports 5 and 6 to be assigned to the Employee Vlan 30.
  • 21. 13 Step 14 Select Configure and Assign Ports to VLAN and click Next Step 15 Click on ports 5 and 6, click on Vlan ID 30 then choose Next.
  • 22. 14 Step 16 Review that the correct ports are assigned to the correct Vlan ID then click Apply. Now that the Guest and Employee VLANs have been created and ports have been assigned the next step is to assign an IP address to each Vlan interface. Step 17 From the X-Series Dashboard main menu click on Switch Management then click on IPv4 Addressing. In the IPv4 Addressing menu VLAN1 is assigned the current management IP address, click on the Edit icon on the right hand side of the screen to start assigning IP addresses to the Guest and Employee VLANs.
  • 23. 15 Step 18 Click on the +Add button Step 19 In the Add IPv4 Addressings page for the Employee Vlan 20:  Interface Type: VLAN  Interface: 20  IP Address Source: Static  IP address: 172.20.X.1 (X is station number)  Address Class: Prefix Length  Prefix Length: 24 Finally in the Apply to: field use the drop down arrow and pick Running and Startup Configuration then click on Ok.
  • 24. 16 Step 20 Click on Edit again, then +Add icon to add the IP interface to Guest Vlan 30 Step 21 In the Add IPv4 Addressings page for the Guest Vlan 30:  Interface Type: VLAN  Interface: 30  IP Address Source: Static  IP address: 172.30.X.1 (X is station number)  Address Class: Prefix Length  Prefix Length: 24 Finally in the Apply to: field use the drop down arrow and pick Running and Startup Configuration then click on Ok.
  • 25. 17 Step 22 In the IPv4 Addressing page confirm that the correct IP addresses have been assigned to the correct VLAN interfaces. To exit this menu click on the Menu > navigation link then click on the Dashboard navigation link. Step 23 Now that the Vlans have had an IP address assigned to them the final step in the X-Series configuration is to assign a default static route that will allow a public address to route through the SonicWALL TZ300. In order to navigate to the IPv4 Route Settings, from the main Dashboard menu click on Network Administration, then click on Route Settings, then click on IPv4 Route Settings. In order to set a default station route click on the Edit icon. (IPv4 routes list is shown below, hit down arrow to reveal if desired)
  • 26. 18 Step 24 In the Add IPv4 Routes Table page:  Destination IPv4 Prefix: 0.0.0.0  Network Mask: 0.0.0.0  Route Type: Remote  Next Hop: 172.20.X.2 (X is station number) Finally in the Apply to: field use the drop down arrow and pick Running and Startup Configuration then click on Ok. Step 25 In the Edit IPv4 Routes Table page confirm that the static default route is input correctly, then click on the X to exit this menu.
  • 27. 19 Step 26 The final step in the X-Series lab configuration will be to save all the switch settings to the Startup Configuration. Click on the Gear Icon in the upper right corner and then click on Save to Startup Configuration.
  • 28. 20 3 Dell Networking SonicWALL Firewall Configuration Dell Networking SonicWALL TZ300 Objectives:  Configure the X3 interface o Assign a Employee ip address o Assign this interface to a VPN  Configure the X4 interface o Assign a Guest ip address  Set the VPN to allow the X3 interface Step 1. Launch the Chrome browser and type in 192.168.2.2 to browse to the SonicWALL login page. Login with username and password of admin/password and hit enter. Note: If the Chrome browser flashes the warning: “Your connection is not private”. Click on the Advanced link and then click on Proceed to 192.168.2.2 (unsafe).
  • 29. 21 Step 2 In the SonicWALL browser interface, click on Network then click on Interfaces. In the Interfaces section click on the Configure icon to the far right of the X3 interface. Step 3 In the Edit Interface applet window, Under the General Tab click on the Unassigned field across from Zone: and choose LAN
  • 30. 22 Step 4 Once LAN is chosen for the Zone, the next menu choices are:  Mode / IP Assignment: Static IP Mode  IP Address: 172.20.X.2 (X is station number)  Subnet Mask: 255.255.255.0  Management: HTTPS and Ping Once all the values are entered click Ok, this will return you back to the Interfaces section.
  • 31. 23 Step 5 In the SonicWALL browser interface, click on Network then click on Interfaces. In the Interfaces section click on the Configure icon to the far right of the X4 interface. Step 6 In the Edit Interface applet window, Under the General Tab click on the Unassigned field across from Zone: and choose LAN. (see picture in Step 3 above) Step 7 Once LAN is chosen for the Zone, the next menu choices are:  Mode / IP Assignment: Static IP Mode  IP Address: 172.30.X.2 (X is station number)  Subnet Mask: 255.255.255.0  Management: HTTPS and Ping Once all the values are entered click Ok, this will return you back to the Interfaces section.
  • 32. 24 Step 8 Next go down the menu to VPN and click on the Add button. Step 9 In the General tab under Security Policy enter the following values:  Policy type: Site to Site  Authentication Method: IKE using Preshared Secret  Name: To_Corporate  IPsec Primary Gateway Name or Address: 10.1.100.200 In the IKE Authentication section enter the following values:  Shared Secret: dell  Confirm Shared Secret: dell  Local IKE ID: 10.1.100.X (X is station number)  Peer IKE ID: 10.1.100.200 Do not click OK, Continue with Step 10.
  • 33. 25 Step 10 Once all the values have been entered on the General tab, click on the Network tab. Local Networks section: Choose local network from list: X3 Subnet Remote Networks section: Choose destination network from list: click on the Select Remote Network drop down arrow and select create new address object Step 11 When create new address object is selected this generates a new applet window. In this applet window enter:  Name: Corporate  Zone Assignment: LAN  Type: Network  Network: 172.20.100.0  Netmask/Prefix Length: 255.255.255.0 Once these values have been entered click Ok
  • 34. 26 Step 12 Once the values have been properly entered in the Network tab section (Do not click Ok), click on the Advanced tab and check the box next to Enable Keep Alive. Click Ok. Step 13 Once the VPN values have been entered and you have clicked Ok in the Advanced tab, the SonicWall GUI will return to the main VPN interface. In the main VPN interface we can see that VPN Policy is green or healthy. In the Currently Active VPN Tunnels section, we can see that the VPN policy To_Corporate is listed.
  • 35. 27 4 Dell Networking W-IAP205 Wireless Configuration Dell Networking W-Series W-IAP205 Objectives:  Configure the Employee WLAN  Configure the Guest WLAN  Set the VPN Step 1 Launch the Chrome browser and type in 192.168.2.10X (X is station number) to browse to the W-IAP205 login page. Login with username and password of admin/admin and hit enter.
  • 36. 28 Note: If the Chrome browser flashes a warning “Your connection is not private”. Click on the Advanced link and then click on Proceed to 192.168.2.2 (unsafe). Step 2 In the W-IAP205 main page under the Network menu click on New
  • 37. 29 Step 3 In this step the Employee wireless network will be created. After clicking on New, a New WLAN window will be launched. In this New WLAN window enter in the name or SSID of the Employee network. For each assigned station the name will be E_TestX (X will be replaced with the assigned station number). Once the name has been entered click Next.
  • 38. 30 Step 4 Under Client IP and VLAN Assignment:  Client IP assignment: Network assigned  Client VLAN assignment: Static  VLAN ID: 20 Click Next to go to the Security section. Step 5 In the Security section enter:  Passphrase: dell1234 Retype: dell1234 Click Next
  • 39. 31 Step 6 Click Finish to return to the main menu. Step 7 In the W-IAP205 main page under the Network menu click on New
  • 40. 32 Step 8 In this step the Guest wireless network will be created. After clicking on New, a New WLAN window will be launched. In this New WLAN window enter in the name or SSID of the Guest network. For each assigned station the name will be G_TestX (X will be replaced with the assigned station number). Once the name has been entered go to Primary Usage and choose Guest click Next to continue. Step 9 In the VLAN section under Client VLAN assignment choose Custom. In the drop down menu next to Custom choose guest (vlan:30). Click Next to continue.
  • 41. 33 Step 10. In the Security section choose:  Encryption: Enabled  Key management: WPA-2 Personal (default setting)  Passphrase: dell1234  Retype: dell1234  Redirect URL: http://10.1.100.101 Click Next to continue.
  • 42. 34 Step 11 In the final Access Rules section click Finish. Step 12. In the main W-Series Instant IAP page we can see that both WLAN networks have been successfully configured.
  • 43. 35 5 Dell Networking Testing and Validation Now that the networking equipment has been configured to allow guest and employee access to their online resources, we will test and validate the areas of concern. Step 1 Connect to the G_TestX (X is station number) WLAN in Windows Network and Sharing Center. Once you have connected, open chrome and enter the ip address 1.1.1.1 (or any other ip address). This demonstrates the fact that the IAP will redirect the guest user to the IAP captive portal splash page on any access attempt. Click on Accept and you will be redirected to the public internet site of the Guest network.
  • 44. 36 Step 2 By accessing this website, this proves that the Guest network on the IAP can reach the internet through the X-Series switch and the SonicWALL firewall. The ip address 10.1.100.101 in the Chrome url bar is the same ip address entered in for the URL Redirect on the Security tab for step 10 during the IAP Guest network configuration. This setting can also be used to direct to an internal home page.
  • 45. 37 Step 3 In the Chrome browser enter the ip address 172.20.100.100. This is the corporate data center web server for the Employee network, accessed through the VPN. This webpage will not be accessible by the Guest user due to the topology of this lab configuration. Administrators can further protect their network by implementing policies and zones within the firewall.
  • 46. 38 Step 4 Disconnect from the Guest network (G_TestX) WLAN and connect to the Employee network (E_TestX) WLAN. Open the chrome browser, enter the ip address 172.20.100.100 if it is not already there. This ip address allows employee to access to the internal data center web server.
  • 47. 39 Step 5 Enter the ip address 10.1.100.101. This is the same public internet site that the Guest users were able to access. Step 6 Login to the SonicWALL TZ300 admin page at the ip address 172.20.X.2 (X is station number) Reminder> username:admin password:password On the menu click on Firewall, then go to App Control Advanced. Under App Control Global Settings  Check Enable App Control  Check Enable Logging For All Apps Click Accept. Note: the ip management interface was enabled for all three interfaces, admin, employee, and guest.
  • 48. 40 Step 7 TIME CHECK- The app control policy has already been configured for you. If you have time, follow steps 7, 8, and 9 to discover what the policy settings look like. If you’re limited on time, skip to step 10. In the App Control Page, scroll down to App Control Advanced and click on the Category drop down menu. Choose FILETYPE-DETECTION, click on the Configure icon for Image.
  • 49. 41 Step 8 In the Image configuration settings:  Block: Enable  Log: Enable  Included Users/Groups: All (Admin, Employee, and Guest)  Included IP Address Range: All Click Cancel when you are finished reviewing the settings.
  • 50. 42 Step 9 Under the App Control Advanced section, in View Style: click on the Application drop down menu and choose Image, next click on the Viewed By: drop down menu and choose Signature. We can now see what image file types the advanced app control is filtering or blocking.
  • 51. 43 Step 10 Logout of the SonicWALL. Open a new browser window. In the Chrome browser click on the Clear Cache button on the bookmark bar then click on the Clear browsing data button.
  • 52. 44 Step 11 In the Chrome URL field enter the ip address 10.1.100.101. With the SonicWALL firewall image app control enabled the .gif and .jpg images on the public internet web page are being blocked.
  • 53. 45 Step 12. Log back in to the SonicWall firewall. In the SonicWALL menu scroll down to Log, click on it to expand its sub-menu choices and then click on Log Monitor. In the Log Monitor entries, there will be two Application Control Firewall Alerts for GIF and JPEG HTTP download attempts.
  • 54. 46 A Important Lab IP Address Information X-Series Switch SonicWALL W-Series Instant X-1008P/1018P TZ300 W-IAP205 Management IP address Management IP address Management IP address Station 1 192.168.2.1 192.168.2.2 192.168.2.101 Station 2 192.168.2.1 192.168.2.2 192.168.2.102 Station 3 192.168.2.1 192.168.2.2 192.168.2.103 Station 4 192.168.2.1 192.168.2.2 192.168.2.104 Station 5 192.168.2.1 192.168.2.2 192.168.2.105 Station 6 192.168.2.1 192.168.2.2 192.168.2.106 Station 7 192.168.2.1 192.168.2.2 192.168.2.107 Station 8 192.168.2.1 192.168.2.2 192.168.2.108 X-Series Switch SonicWALL X-1008P/1018P TZ300 Employee VLAN 20 interface IP address Employee VLAN 20 interface IP address Station 1 172.20.1.1 172.20.1.2 Station 2 172.20.2.1 172.20.2.2 Station 3 172.20.3.1 172.20.3.2 Station 4 172.20.4.1 172.20.4.2 Station 5 172.20.5.1 172.20.5.2 Station 6 172.20.6.1 172.20.6.2 Station 7 172.20.7.1 172.20.7.2 Station 8 172.20.8.1 172.20.8.2 X-Series Switch SonicWALL X-1008P/1018P TZ300 Guest VLAN 30 interface IP address Guest VLAN 30 interface IP address Station 1 172.30.1.1 172.30.1.2 Station 2 172.30.2.1 172.30.2.2 Station 3 172.30.3.1 172.30.3.2 Station 4 172.30.4.1 172.30.4.2 Station 5 172.30.5.1 172.30.5.2 Station 6 172.30.6.1 172.30.6.2 Station 7 172.30.7.1 172.30.7.2 Station 8 172.30.8.1 172.30.8.2