SonicOS 7.1 Tools & Monitors

Administration Guide

About SonicOS

This guide is part of the SonicOS collection of administrative guides that describes how to administer and monitor the SonicWall family of firewalls. SonicOS provides network administrators the management interface, API (Application Program Interface), and the Command Line Interface (CLI) for firewall configuration by setting objects to secure and protect the network services, to manage traffic, and to provide the desired level of network service. This guide focuses on:

Working with SonicOS

SonicOS provides a web management interface for configuring, managing, and monitoring the features, policies, security services, connected devices, and threats to your network. SonicOS runs on top of SonicCore, SonicWall's secure underlying operating system. The SonicOS management interface facilitates:

SonicWall offers two different modes of operation in SonicOS; the modes differ mainly in the areas of policy, object configuration and diagnostics.

This table identifies which modes can be used on the different SonicWall firewalls:

Firewall TypeClassic ModePolicy ModeComments
TZ SeriesyesnoThe entry level TZ Series, also known as desktop firewalls, deliver revamped features such as 5G readiness, better connectivity options, improved threat, SSL and decryption performance that address HTPPS bandwidth issues; built-in SD-WAN, and lawful TLS 1.3 decryption support.
NSa SeriesyesnoNSa firewalls provide your mid sized network with enhanced security. They are designed specifically for businesses with 250 and up. It can provide cloud-based and on-box capabilities like TLS/SSL decryption and inspection, application intelligence and control, SD-WAN, real-time visualization, and WLAN management.
NSsp 10700, NSsp 11700, NSsp 13700yesnoThe NSsp platforms high-end firewalls that deliver the advanced threat protection and fast speeds that large enterprises, data centers, and service providers need.
NSsp 15700noyesThe NSsp 15700 is designed for large distributed enterprises, data centers, government agencies and services providers. It provides advanced threat protection like Real-Time Deep Memory Inspection, multi-instance firewall configuration, and unified policy creation and modification, with scalability and availability.
NSv SeriesyesyesThe NSv series firewalls offers all the security advantages of a physical firewall with the operational and economic benefits of virtualization. The NSv firewalls can operate in either Policy Mode or Classic Mode. You can switch between modes, but some configuration information from extra interfaces is removed.

SonicOS Workflow

When working with SonicWall products, you can use the following workflow as a guide for setting up your security solution.

You begin your planning as you start making your purchasing decisions. Your sales partners can help you assess your network and make recommendations based on the kinds of security services you need. You can learn more about SonicWall products by reviewing product information and solutions. After selecting the solution, you can schedule your implementation.

After planning and scheduling your solution, you begin setting up the firewalls. The Getting Started Guides for your products can help you begin setting up the pieces to your solution. The getting started guides are designed to help you install the firewall to a minimal level of operation. Before performing any detailed configuration tasks described in the SonicOS Administration Guides, you should have your firewall set up and basic operation validated.

The configuration block of the workflow refers to the many tasks that combine to define how your firewall is integrated into your security solution and how it behaves when protecting your environment. Depending on the features of your security solution, this task can be quite complex. The System Administration Guides are broken into the key command sets and features. Some documents may be used for all solutions, but others may be used use only if you integrated that feature into your solution. For example, High Availability or Wireless Access Points are not necessarily used by all customers. More information about a feature's workflow is presented in the feature administration guide. Refer to the specific Administration Guide for a SonicOS feature for more information.

Configuration tends to be a one-time activity, although you might make minor adjustments after monitoring performance or after diagnosing an issue. The configuration activity can be broken down into the more detailed flow as the following figure shows. This also mirrors the key functions that are listed across the top of the management interface.

Workflow Diagram Description: The workflow is visualized with boxes and arrows. The main stages are: Planning, Setup, Configuration, Monitor & Report, and Adjust Performance / Diagnose Issues. A more detailed configuration flow shows: Device Configuration, Network Configuration, HA Configuration (optional), Define Objects, Define Policies, Validate User Authentication.

There is some flexibility in the order in which you do things, but this is the general work-flow you would follow when configuring your firewall. Start by defining the settings on the firewall. Next you set up the system and other devices that your firewall is connected to, and you can choose to implement High Availability when done. After your device, network, and system is configured, you should define the objects that you want to monitor. Then you use those objects to define the policies that protect your network. The final step to preparing your setup is to validate the user authentication.

How to Use the SonicOS Administration Guides

The SonicOS Administration Guide is a collection of guides that detail the features represented by each of the main menu items in the management interface. Within each guide, you can find topics covering commands in that menu group, along with procedures and in-depth information. The exceptions are the SonicOS 7.1 Monitor Guide and the SonicOS 7.1 Objects Guide which combine the topics for each of those functions into a single book.

To help you understand how the books align with the features and commands, the following figure shows the books organized like the SonicWall management interface.

The SonicOS Administration Guides, along with related documentation, such as the getting started guides, are available on the https://www.sonicwall.com/support/technical-documentation/.

Guide Conventions

These text conventions are used in this guide:

Convention descriptions:

ConventionDescription
Bold textUsed in procedures to identify elements in the management interface like dialog boxes, windows, screen names, messages, and buttons. Also used for file names and text or values you are being instructed to select or type into the interface.
Function | Menu group > Menu itemIndicates a multiple step menu choice on the user interface. For example, NETWORK | System > Interfaces means to select the NETWORK functions at the top of the window, then click on System in the left navigation menu to open the menu group (if needed) and select Interfaces to display the page.
CodeIndicates sample computer programming code. If bold, it represents text to be typed in the command line interface.
<Variable>Represents a variable name. The variable name and angle brackets need to be replaced with an actual value. For example in the segment serialnumber=<your serial number>, replace the variable and brackets with the serial number from your device, such as serialnumber=2CB8ED000004.
ItalicsIndicates the name of a technical manual. Also indicates emphasis on certain words in a sentence, such as the first instance of a significant term or concept.

Using Packet Monitor

The Packet Monitor is a mechanism that allows you to monitor individual data packets that traverse your SonicWall network security appliance. Packets can be either monitored or mirrored. The monitored packets contain both data and addressing information. Addressing information from the packet header includes the following:

You can configure the packet monitor feature in the enhanced management interface. The management interface provides a way to configure the monitor criteria, display settings, mirror settings, and file export settings, and displays the captured packets. Current configurations are displayed on this page, hover over the information symbols to view the details.

Topics:

Benefits of Packet Monitor

The packet monitor feature provides the functionality and flexibility that you need to examine network traffic without the use of external utilities, such as Wireshark (formerly known as Ethereal). Packet monitor includes the following features:

How Does Packet Monitor Work?

As an administrator, you can configure the general settings, monitor filter, display filter, advanced filter settings, and FTP settings of the packet monitor tool. As network packets enter the packet monitor subsystem, the monitor filter settings are applied, and the resulting packets are written to the capture buffer. The display filter settings are applied as you view the buffer contents in the management interface. You can log the capture buffer to view in the management interface, or you can configure automatic transfer to the FTP server when the buffer is full.

Default settings are provided so that you can start using packet monitor without configuring it first. The basic functionality is:

Refer to Configuring Packet Monitor for a high-level view of the packet monitor subsystem that shows the different filters and how they are applied.

Packet Monitor Subsystem Diagram Description: The diagram illustrates the flow of packets through the monitoring system. Packets enter the system and are first processed by a Monitor Filter. They are then stored in a Capture Buffer. From the buffer, packets can be sent to the Management Host or automatically exported to a Remote FTP Server when the buffer is full. Packets are categorized as Captured, Mirrored, Forwarded, Consumed, Dropped, or Intermediate.

Supported Packet Types

When specifying the Ethernet or IP packet types that you want to monitor or display, you can use either the standard acronym for the type, if supported, or the corresponding hexadecimal representation. To determine the hex value for a protocol, refer to the RFC for the number assigned to it by IANA.

Supported TypesProtocol AcronymsNotes
Supported Ethernet Types
  • ARP
  • IP
  • PPPoE-DIS
  • PPPoE-SES
To specify both PPPoE-DIS and PPPoE-SES, you can simply use PPPoE.
Supported IP Types
  • TCP
  • UDP
  • ICMP
  • IGMP
  • GRE
  • AH
  • ESP

Configuring Packet Monitor

You can access the packet monitor tool on the Monitor > Tools & Monitors > Packet Monitor page of the management interface. There are six main areas of configuration for packet monitor, one of which is specifically for packet mirror. The following sections describe the configuration options, and provide procedures for accessing and configuring the filter settings, log settings, and mirror settings:

Configuring General Settings

This section describes how to configure packet monitor general settings, including the number of bytes to capture per packet and the buffer wrap option. You can specify the number of bytes using either decimal or hexadecimal, with a minimum value of 64. The buffer wrap option enables the packet capture to continue even when the buffer becomes full, by overwriting the buffer from the beginning.

To configure the general settings:

  1. Navigate to the Tools & Monitors > Packet Monitor page.
  2. Select the General tab.
  3. Select the Settings tab.

4. In the Number of Bytes To Capture (per packet) box, type the number of bytes to capture from each packet. The minimum value is 64 and the maximum value is 65535.

5. To continue capturing packets after the buffer fills up, select Wrap Capture Buffer Once Full. Selecting this option causes packet capture to start writing captured packets at the beginning of the buffer again after the buffer fills. This option has no effect if FTP server logging is enabled on the Logging tab, because the buffer is automatically wrapped when FTP is enabled.

6. Under Exclude Filter, select Exclude encrypted GMS traffic to prevent capturing or mirroring of encrypted management or syslog traffic to or from SonicWall GMS. This setting only affects encrypted traffic within a configured primary or secondary GMS tunnel. GMS management traffic is not excluded if it is sent through a separate tunnel.

7. Use the Exclude Management Traffic settings to prevent capturing or mirroring of management traffic to the appliance. Select the checkbox for each type of traffic (HTTP/HTTPS, SNMP, or SSH) to exclude. If management traffic is sent through a tunnel, the packets are not excluded.

8. Use the Exclude Syslog Traffic to settings to prevent capturing or mirroring of syslog traffic to the logging servers. Select the checkbox for each type of server (Syslog Servers or GMS Server) to exclude. If syslog traffic is sent through a tunnel, the packets are not excluded.

9. Use the Exclude Internal Traffic for settings to prevent capturing or mirroring of internal traffic between the SonicWall network security appliance and its High Availability partner or a connected SonicPoint. Select the checkbox for each type of traffic (HA, SonicPoint, BCP, Inter-Blade, or Back-Plane) to exclude.

10. To save your settings and exit the configuration window, click Save.

Configuring the Monitor Filter

All filters set on the Monitor Filter page are applied to both packet capture and packet mirroring.

To configure Monitor Filter settings:

  1. Navigate to the Tools & Monitors > Packet Monitor page.
  2. Select the General tab.
  3. Select the Monitor Filter tab.

4. Choose Enable filter based on the firewall/app rule if you are using firewall rules to capture specific traffic. Before the Enable filter based on the firewall rule option is selected, be certain you have selected one or more access rules on which to monitor packet traffic. This configuration is done from the POLICY > Rules and Policies > Access Rules page.

5. Specify how Packet Monitor filters packets using these options:

[NOTE] If a field is left blank, no filtering is done on that field. Packets are captured or mirrored without regard to the value contained in that field of their headers.

6. To save your settings and exit the configuration window, click Save.

Configuring Display Filter Settings

This section describes how to configure packet monitor display filter settings. The values that you provide here are compared to corresponding fields in the captured packets, and only those packets that match are displayed. These settings apply only to the display of captured packets on the management interface, and do not affect packet mirroring.

If a field is left blank, no filtering is done on that field. Packets are displayed without regard to the value contained in that field of their headers.

To configure Packet Monitor display filter settings:

  1. Navigate to the Tools & Monitors > Packet Monitor page.
  2. Select the General tab.
  3. Select the Display Filter tab.

4. In the Interface Name(s) box, type the SonicWall network security interfaces for which to display packets, or use the negative format (!X0) to display packets captured from all interfaces except those specified. You can specify up to ten interfaces separated by commas. Refer to the Network > Interfaces screen in the management interface for the available interface names.

5. In the Ether Type(s) box, enter the Ethernet types for which you want to display packets, or use the negative format (!ARP) to display packets of all Ethernet types except those specified. You can specify up to ten Ethernet types separated by commas. Currently, these Ethernet types are supported:

The latter two can be specified by PPPoE alone. You can also use hexadecimal values to represent the Ethernet types, or mix hex values with the standard representations; for example: ARP, 0x800, IP. Normally, you would only use hex values for Ethernet types that are not supported by acronym in SonicOS. (Refer to Supported Packet Types for more information.)

6. In the IP Type(s) box, enter the IP packet types for which you want to display packets, or use the negative format (!UDP) to display packets of all IP types except those specified. You can specify up to ten IP types separated by commas. These IP types are supported:

You can also use hexadecimal values to represent the IP types, or mix hex values with the standard representations; for example: TCP, 0x1, 0x6. To display all IP types, leave blank. (Refer to Supported Packet Types for more information.)

7. In the Source IP Address(es) box, type the IP addresses from which you want to display packets, or use the negative format (!10.1.2.3) to display packets captured from all source addresses except those specified.

8. In the Source Port(s) box, type the port numbers from which you want to display packets, or use the negative format (!25) to display packets captured from all source ports except those specified.

9. In the Destination IP Address(es) box, type the IP addresses for which you want to display packets, or use the negative format (!10.1.2.3) to display packets with all destination addresses except those specified.

10. In the Destination Port(s) box, type the port numbers for which you want to display packets, or use the negative format (!80) to display packets with all destination ports except those specified.

11. Select Enable Bidirectional Address and Port Matching to match the values in the source and destination fields against either the source or destination information in each captured packet.

12. Select Forwarded to display captured packets that the SonicWall network security appliance forwarded.

13. Select Generated to display captured packets that the SonicWall network security appliance generated.

14. Select Consumed to display captured packets that the SonicWall network security appliance consumed.

15. Select Dropped to display captured packets that the SonicWall network security appliance dropped.

16. To save your settings and exit the configuration window, click Save.

Configuring Logging Settings

This section describes how to configure Packet Monitor logging settings. These settings provide a way to configure automatic logging of the capture buffer to an external FTP server. When the buffer fills up, the packets are transferred to the FTP server. The capture continues without interruption.

If you configure automatic FTP logging, this supersedes the setting for wrapping the buffer when full. With automatic FTP logging, the capture buffer is effectively wrapped when full, but you also retain all the data rather than overwriting it each time the buffer wraps.

To configure logging settings:

  1. Navigate to the Tools & Monitors > Packet Monitor page.
  2. Select the General tab.
  3. Select the Logging tab.

4. In the FTP Server IP Address box, type the IP address of the FTP server.

[NOTE] Make sure that the FTP server IP address is reachable by the SonicWall network security appliance. An IP address that is reachable only through a VPN tunnel is not supported.

5. In the Login ID box, type the login name that the SonicWall network security appliance should use to connect to the FTP server.

6. In the Password box, type the password that the SonicWall network security appliance should use to connect to the FTP server.

7. In the Directory Path box, type the directory location for the transferred files. The files are written to this location relative to the default FTP root directory. For libcap format, files are named packet-log--<>.cap, where the <> contains a run number and date including hour, month, day, and year. For example, packet-log--3-22-08292006.cap.

8. For HTML format, file names are in the form packet-log_h-<>.html. For example, an HTML file name is: packet-log_h-3-22-08292006.html.

9. Select Log To FTP Server Automatically to enable automatic transfer of the capture file to the FTP server when the buffer is full. Files are transferred in both libcap and HTML format.

10. Select Log HTML File Along With .cap File (FTP) to enable transfer of the file in HTML format as well as libcap format.

11. Click Log Now to test the connection to the FTP server and transfer the capture buffer contents to it.

12. For example, packet-log-F-3-22-08292006.cap or packet-log_h-F-3-22-08292006.html.

13. To save your settings and exit the configuration window, click Save.

Configuring Advanced Monitor Filter Settings

This section describes how to configure monitoring for packets generated by the SonicWall network security appliance and for intermediate traffic.

To configure the Advanced Monitor Filter settings:

  1. Navigate to Tools & Monitors > Packet Monitor.
  2. Click the General tab.
  3. Click the Advanced Monitor Filter tab.

4. To monitor packets generated by the SonicWall network security appliance, select Monitor Firewall Generated Packets.

5. Even when other monitor filters do not match, this option ensures that packets generated by the SonicWall network security appliance are captured. This includes packets generated by HTTP(S), L2TP, DHCP servers, PPP, PPPOE, and routing protocols. Captured packets are marked with 's' in the incoming interface area when they are from the system stack. Otherwise, the incoming interface is not specified.

6. To monitor intermediate packets generated by the SonicWall network security appliance, select Monitor Intermediate Packets. Selecting this checkbox enables, but does not select, the subsequent checkboxes for monitoring specific types of intermediate traffic. Select the checkbox for any of the following options to monitor that type of intermediate traffic:

7. Restore original ports on SSL decrypted traffic – Select to restore the original TCP ports from the encrypted connection in the SSL decrypted packets.

[NOTE] Monitor filters are still applied to all selected intermediate traffic types.

8. To save your settings and exit the configuration window, click Save.

Starting and Stopping Packet Mirror

You can start a packet mirroring session that uses your configured mirror settings. On the MONITOR | Tools & Monitors > Packet Monitor page, click Start Mirror. It is not necessary to first configure specific criteria for display, logging, FTP export, and other settings. Packet mirroring stops when you click Stop Capture.

Monitoring Captured Packets

The Captured Packets page provides several buttons for general control of the packet monitor feature and display.

The other buttons and displays on this page are described in these sections:

Starting and Stopping Packet Capture

You can start a packet capture that uses default settings without configuring specific criteria for packet capture, display, FTP export, and other settings. If you start a default packet capture, the SonicWall network security appliance captures all packets, except those for internal communication, and stops when the buffer is full or when you click Stop Capture.

To manage packet captures, navigate to MONITOR | Tools & Monitor > Packet Monitor and select the Captured Packets tab:

Configuring Mirror Settings

This section describes how to configure Packet Monitor mirror settings. Mirror settings provide a way to send packets to a different physical port of the same firewall or to send packets to, or receive them from, a remote SonicWall network security appliance.

To configure mirror settings:

  1. Navigate to the Tools & Monitors > Packet Monitor page.
  2. Select the General tab.
  3. Select the Mirror tab.

4. In the Mirror Settings section, type the desired maximum mirror rate into the Maximum mirror rate (in kilobits per second) field. If this rate is exceeded during mirroring, the excess packets are not mirrored and are counted as skipped packets. This rate applies to both local and remote mirroring. The default and minimum value is 100kbps, and the maximum is 1Gbps.

5. Select Mirror only IP packets to prevent mirroring of other Ether type packets, such as ARP or PPPoE. If selected, this option overrides any non-IP Ether types selected on the Monitor Filter view.

6. In the Local Mirror Settings section, select the destination interface for locally mirrored packets in the Mirror filtered packets to Interface (NSA platforms only) drop-down menu.

7. In the Remote Mirror Settings (Sender) section, in the Mirror filtered packets to remote SonicWall firewall (IP Address) field, type the IP address of the remote SonicWall to which mirrored packets are sent.

[NOTE] The remote SonicWall network security appliance must be configured to receive the mirrored packets.

8. In the Encrypt remote mirrored packets via IPSec (preshared key-IKE) field, type the preshared key to be used to encrypt traffic when sending mirrored packets to the remote SonicWall network security appliance. Configuring this field enables an IPSec transport mode tunnel between this appliance and the remote SonicWall network security appliance. This pre-shared key is used by IKE to negotiate the IPSec keys.

9. In the Remote Mirror Settings (Receiver) section, in the Receive mirrored packets from remote SonicWall firewall (IP Address) field, type the IP address of the remote SonicWall network security appliance from which mirrored packets are received.

[NOTE] The remote SonicWall network security appliance must be configured to send the mirrored packets.

10. In the Decrypt remote mirrored packets via IPSec (preshared key-IKE) field, type the pre-shared key to be used to decrypt traffic when receiving mirrored packets from the remote SonicWall network security appliance. Configuring this field enables an IPSec transport mode tunnel between this appliance and the remote SonicWall network security appliance. This pre-shared key is used by IKE to negotiate the IPSec keys.

11. Select the interface from the Send received remote mirrored packets to Interface (NSA platforms only) drop-down menu to mirror received packets to another interface on the local SonicWall network security appliance.

12. Select Send received remote mirrored packets to capture buffer to save received packets in the local capture buffer. This option is independent of sending received packets to another interface, and both can be enabled.

13. To save your settings and exit the configuration window, click Save.

Viewing Packet Monitoring Statistics

The Statistics page displays status indicators for packet capture (trace), mirroring, and FTP logging. Information pop-up tooltips display the configuration settings.

Topics:

Capture Statistics

Navigate to the MONITOR | Tools & Monitor > Packet Monitor page and select the Statistics tab.

In the Capture Statistics section, Trace shows one of the following three conditions:

The Capture Statistics section also displays:

[NOTE] Although the buffer wrap option clears the buffer upon wrapping to the beginning, this is not considered lost data.

Local Mirror Statistics

Navigate to the MONITOR | Tools & Monitor > Packet Monitor page and select the Statistics tab. The Local Mirror Statistics section displays this information about packets sent to another physical interface on the same SonicWall network security appliance:

The status indicator shows one of the following three conditions:

It also displays these statistics:

Remote Mirror TX Statistics

Navigate to the MONITOR | Tools & Monitor > Packet Monitor page and select the Statistics tab. The Remote Mirror TX Statistics status indicator shows the following:

It also displays these statistics:

Remote Mirror RX Statistics

Navigate to the MONITOR | Tools & Monitor > Packet Monitor page and select the Statistics tab. Remote Mirror RX Statistics track the packets received from a remote SonicWall network security appliance.

The status indicator shows one of these conditions:

It also displays these statistics:

FTP Statistics

Navigate to the MONITOR | Tools & Monitor > Packet Monitor page and select the Statistics tab. FTP Statistics displays the following information:

To restart automatic FTP logging, see Restarting FTP Logging on page 85.

It also displays these statistics:

If automatic FTP logging is off, either because of a failed connection or simply disabled, you can restart it in Configure > Logging.

To restart FTP logging:

  1. Navigate to the Tools & Monitors > Packet Monitor page.
  2. Select the General tab.
  3. Select the Logging tab.
  4. Verify that the settings are correct for each item on the page. (Refer to Configuring Logging Settings for more information.)
  5. To change the FTP logging status page to active, select Log To FTP Server Automatically.
  6. Optionally, test the connection by clicking Log Now.
  7. To save your settings and exit the dialog, click Save.

Current Buffer Statistics

Navigate to the MONITOR | Tools & Monitor > Packet Monitor page and select the Statistics tab. The Current Buffer Statistics summarizes the number of each type of packet in the local capture buffer:

Viewing Connections

Your SonicWall network security appliance maintains a connections log for tracking all active connections to the SonicWall network security appliance.

To view the Connections table:

  1. Navigate to MONITOR | Tools & Monitors > Connections.
  2. Click IPv4 or IPv6 to view the connections for that IP type.

The column names for the table are described in the following:

Column NameDescription
Src MACMAC address of the source device.
Src VendorManufacturer of the source device.
Src IPIP address of the source device.
Src PortPort number of the source device.
Dst MACMAC address of the destination device.
Dst VendorManufacturer of the destination device.
Dst IPIP address of the destination device.
Dst PortPort number of the destination device.
ProtocolProtocol used for the connection, such as TCP or ICMPv6.
Src IfaceInterface on the source device.
Dst IfaceInterface on the destination device.
Flow TypeFlow type of the connection, such as generic or HTTP Management.
IPS CategoryType of Intrusion Prevention System (IPS) used; N/A = Not Available.
Expiry (sec)Number of seconds remaining before the connection expires.
Tx BytesNumber of bytes transferred.
Rx BytesNumber of bytes received.
Tx PktsNumber of packets transferred.
Rx PktsNumber of packets received.
FlushContains the Flush icon for each entry.

Filtering the Connection Log

Filter the Connections table so it displays only those connections matching the criteria specified in the Filter option.

Filter by:

Filter Logic displays how the filter is applied.

The fields you enter values into are combined into a search string with a logical AND. For example, if you enter values for Source IP and Destination IP, the search string looks for connections matching: Source IP AND Destination IP

Check the Group box next to any two or more criteria to combine them with a logical OR. For example, if you enter values for Source IP, Destination IP, and Protocol, and check Group next to Source IP and Destination IP, the search string looks for connections matching: (Source IP OR Destination IP) AND Protocol

Connections Log Functions

Table of Event Log Functions:

FunctionAction
IPv4/IPv6The Connection Log is configured the same for IPv6 and IPv4. To change the view, select the IP version from the drop-down menu. IPv4 is the default.
RefreshClick to immediately refresh the Event Log.
Export to fileExports the data to an external file. From the drop-down menu, select the file format: CSV, Text, or Email.
ClearDeletes all logs displayed in the Event Log. You are asked to confirm your decision before the events are deleted.
FlushClick this icon to flush that connection from the table. This option is found in the far right column of the table.

Monitoring Core 0 Processes

The Core 0 Processes page shows the individual system processes on core 0, their CPU utilization, and their system time.

A table displays process information including Name, Priority, Total %, Total (Secs), Current %, and Current (Secs). Sample processes listed include sonicosv, tGbicMon, tpsuProbeTask, tAsFlhWr, t3rdAppHandler, dhcpc6lnotify, tSarc, tWlbDnsLkp, tSchedObjTimer, tNetMon, tNetMonXmit, tTimerTask, tMsTimerTask, tNSecsTimerTask, v6Control, tHandleNetlink, tSpoofTask, tSpoofArpTask, cloudSyncTask, tsfGenTask. Totals for tasks and system idle/usage are also shown.

Using Packet Replay

Packet replay is an integrated tool to firewall for testing and debugging purposes. You can replay packets in these ways:

Replayed packets are restrained from traveling outside this firewall; they are dropped before transmitting through interfaces.

Topics:

Single Packets

These procedures describe how to craft a packet for analysis. Some fields may change when the IP Type is changed.

Topics:

Packet Crafting

The following procedure uses IP Type = UDP.

To craft a packet:

  1. Navigate to MONITOR > Tools & Monitor > Packet Replay.
  2. Click Single Packet.
  3. Choose Packet Crafting.
  4. Enter the following information; options change depending on your selection for IP Type:

IP TYPE = UDP

FieldDefinition
Receiving InterfaceSelect the interface from which the packet is received.
Destination MACEnter the destination MAC address.
Source MACEnter the source MAC address.
Ether TypeSelect the protocol type. The default is IPv4.
IP TypeSelect UDP.
Source IPEnter the source IP address.
Destination IPEnter the destination IP address.
TTLEnter the IP header.
Source PortEnter the UDP source port number.
Destination PortEnter the UDP destination port number.

5. If you select IP Type = ICMP, these fields are different from UDP:

IP TYPE = ICMP

FieldDefinition
ICMP TypeSelect Echo Request or Echo Response from the drop-down menu.
IDType in the ICMP identifier.
SequenceType in the ICMP sequence number.

6. If you select IP Type = IGMP, these fields are different from UDP:

IP TYPE = IGMP

FieldDefinition
IGMP TypeSelect IGMP Type from the drop-down menu. The default is Membership Query.
Max ResponseType in the IGMP maximum response timeout. Enter the value in seconds.
Group IP AddressType in the group IP address for the query.

7. In the Payload field, enter or copy the payload hex data.

8. Click Send. The crafted packet is sent to the firewall engine.

Packet Buffer

To build a packet buffer:

  1. Navigate to MONITOR > Tools & Monitor > Packet Replay.
  2. Click Single Packet.
  3. Choose Packet Buffer.
  4. From Receiving Interface, select the interface to receive the data.
  5. Enter the Packet Buffer data, in hex.
  6. Click Send. The crafted packet is sent to the firewall engine.

Replay Pcap File

The Pcap filter can be defined by IP address or MAC address.

Topics:

Replaying an IP Pcap File

To define by IP:

  1. Navigate to MONITOR > Tools & Monitor > Packet Replay.
  2. Click Packets from File.
  3. Click IP. Two IP filters are provided.
  4. For each IP filter, complete the following:
FieldDefinition
IP AddressEnter the destination address to be looked up.
Receiving InterfaceSelect the receiving interface. The IP packets that have the destination address listed in IP Address are assumed to arrive from the interface selected in this option.
New IP AddressIf enabled (the option is selected), the new IP address listed in this field replaces the filtered destination IP address when replaying the packets.

5. To search for and select a Pcap file to be replayed. click Choose File.

Replaying a MAC Pcap File

To define by Mac address:

  1. Navigate to MONITOR > Tools & Monitor > Packet Replay.
  2. Click Packets from File.
  3. Click MAC. Two IP filters are provided.
  4. For each IP filter, complete the following:
FieldDefinition
MAC AddressEnter the destination address to be looked up.
Receiving InterfaceSelect the receiving interface. The IP packets that have the destination address listed in MAC Address are assumed to arrive from the interface selected in this option.
New IP AddressIf enabled (the option is selected), the new IP address listed in this field replaces the filtered destination IP address when replaying the packets.

5. To search for and select a Pcap file to be replayed. click Choose File.

Captured Packets

Captured and replayed packets are displayed on the Captured Packets page. It provides three sections to display different views of captured packets:

To view the list of captured packets:

  1. Navigate to MONITOR > Tools & Monitor > Packet Replay.
  2. Click Captured Packets.

Use these options to manage the Captured Packets:

About Captured Packets

The Captured Packets page displays these statistics about each packet:

AbbreviationDefinition
iInterface
hcHardware-based encryption or decryption
scSoftware-based encryption or decryption
mMulticast
rPacket reassembly
sSystem stack
ipIP helper
fFragmentation
AbbreviationDefinition
iInterface
hcHardware-based encryption or decryption
scSoftware-based encryption or decryption
mMulticast
rPacket reassembly
sSystem stack
ipIP helper
fFragmentation
Ethernet typePacket type
IP packetsTCP, UDP, or another protocol that runs over IP
PPPoE packetsPPPoE Discovery or PPPoE Session
ARP packetsRequest or Reply
Packet StatusDisplayed ValueDefinition of Displayed Value
DroppedModule-ID = <integer>
Drop-code = <integer>
Value for the protocol subsystem ID
Reason for dropping the packet
ConsumedReference-ID: <code>
Module-ID = <integer>
SonicWall-specific data
Value for the protocol subsystem ID

Packet Detail

When you click a packet on the Captured Packets page, the packet header fields are displayed on the Packet Detail page. The display varies depending on the type of packet that you select.

Hex Dump

When you click a packet in the Captured Packets page, the packet data is displayed in hexadecimal and ASCII format on the Hex Dump page.

SonicWall Support

Technical support is available to customers who have purchased SonicWall products with a valid maintenance contract.

The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. To access the Support Portal, go to https://www.sonicwall.com/support.

The Support Portal enables you to:

To contact SonicWall Support, visit https://www.sonicwall.com/support/contact-support.

About This Document

SonicOS Tools & Monitors Administration Guide

Updated - December 2023

Software Version - 7.1

232-006096-00 Rev A

Copyright © 2023 SonicWall Inc. All rights reserved.

The information in this document is provided in connection with SonicWall and/or its affiliates’ products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of products.

EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL SONICWALL AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF SONICWALL AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its affiliates make no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. and/or its affiliates do not make any commitment to update the information contained in this document.

For more information, visit https://www.sonicwall.com/legal.

End User Product Agreement

To view the SonicWall End User Product Agreement, go to: https://www.sonicwall.com/legal/end-user-product-agreements/.

Open Source Code

SonicWall Inc. is able to provide a machine-readable copy of open source code with restrictive licenses such as GPL, LGPL, AGPL when applicable per license requirements. To obtain a complete machine-readable copy, send your written requests, along with certified check or money order in the amount of USD 25.00 payable to “SonicWall Inc.”, to:

General Public License Source Code Request
Attn: Jennifer Anderson
1033 McCarthy Blvd
Milpitas, CA 95035

Models: SonicOS 7.1 Tools and Monitors, SonicOS 7.1, Tools and Monitors, Monitors

File Info : application/pdf, 39 Pages, 1.44MB

PDF preview unavailable. Download the PDF instead.

sonicos-7-1-tools and monitors

References

madbuild

Related Documents

Preview SonicOS 8 Capture ATP Administration Guide
Comprehensive guide to administering SonicWall's Capture ATP service on SonicOS 8, covering setup, configuration, threat analysis, and management for enhanced network security.
Preview SonicOS 7.1 System Administration Guide
A comprehensive guide to administering and monitoring the SonicWall family of firewalls using SonicOS 7.1. This document details network configuration, security services, and advanced features for network administrators.
Preview SonicOS 7.1 Device Log Administration Guide
A comprehensive guide for network administrators on configuring and managing device logging features within SonicOS 7.1 for SonicWall firewalls. Details monitoring network activity, troubleshooting issues, and enhancing security through logging.
Preview SonicOS 7.1 Access Points Administration Guide
This administration guide from SonicWall provides comprehensive instructions for configuring, managing, and troubleshooting SonicOS 7.1 Access Points, including SonicPoint and SonicWave devices. Learn about provisioning, firmware updates, RF monitoring, and advanced security features.
Preview SonicOS 7.1 Logs Administration Guide
Comprehensive administration guide for SonicOS 7.1, detailing system logs, auditing logs, threat logs, and SonicWall support resources. Learn to configure, manage, and monitor your SonicWall firewall security.
Preview SonicOS 7.1 Content Filtering Administration Guide
Comprehensive guide to configuring and managing SonicWall's Content Filtering Service (CFS) within SonicOS 7.1, covering profile objects, action objects, reputation match objects, policies, rules, and monitoring.
Preview SonicOS 7.1 Dashboard Administration Guide - SonicWall
Comprehensive administration guide for SonicWall SonicOS 7.1, focusing on the Dashboard features for network monitoring, security management, and device configuration. Learn about system views, access points, topology, threat analysis, and more.
Preview SonicWall TZ80 Firewall: SonicOS 8 Getting Started Guide
Learn how to configure and deploy the SonicWall TZ80 firewall with SonicOS 8. This guide covers essential setup, security services, and network management for small offices and home offices.