SonicOS 7.1 Logs Administration Guide
Version: 7.1
Published: December 2023
About SonicOS
This guide is part of the SonicOS collection of administrative guides that describes how to administer and monitor the SonicWall family of firewalls. SonicOS provides network administrators the management interface, API (Application Program Interface), and the Command Line Interface (CLI) for firewall configuration by setting objects to secure and protect the network services, to manage traffic, and to provide the desired level of network service.
Topics:
- Working with SonicOS
- SonicOS Workflow
- How to Use the SonicOS Administration Guides
- Guide Conventions
Working with SonicOS
SonicOS provides a web management interface for configuring, managing, and monitoring the features, policies, security services, connected devices, and threats to your network. SonicOS runs on top of SonicCore, SonicWall's secure underlying operating system.
The SonicOS management interface facilitates:
- Setting up and configuring your firewall
- Configuring external devices like access points or switches
- Configuring networks and external system options that connect to your firewall
- Defining objects and policies for protection
- Monitoring the health and status of the security appliance, network, users, and connections
- Monitoring traffic, users, and threats
- Investigating events
SonicWall offers two different modes of operation in SonicOS; the modes differ mainly in the areas of policy, object configuration and diagnostics.
- Policy Mode provides a unified policy configuration work flow. It combines Layer 3 to Layer 7 policy enforcement for security policies and optimizes the work flow for other policy types. This unified policy work flow gathers many security settings into one place, which were previously configured on different pages of the management interface.
- Classic Mode is more consistent with earlier releases of SonicOS; you need to develop individual policies and actions for specific security services. The Classic Mode has a redesigned interface.
The following table identifies which modes can be used on different SonicWall firewalls:
Firewall Type | Classic Mode | Policy Mode | Comments |
---|---|---|---|
TZ Series | yes | no | The entry level TZ Series, also known as desktop firewalls, deliver revamped features such as 5G readiness, better connectivity options, improved threat, SSL and decryption performance that address HTPPS bandwidth issues; built-in SD-WAN, and lawful TLS 1.3 decryption support. |
NSa Series | yes | no | NSa firewalls provide your mid sized network with enhanced security. They are designed specifically for businesses with 250 and up. It can provide cloud-based and on-box capabilities like TLS/SSL decryption and inspection, application intelligence and control, SD-WAN, real-time visualization, and WLAN management. |
NSsp 10700, NSsp 11700, NSsp 13700 | yes | no | The NSsp platforms high-end firewalls that deliver the advanced threat protection and fast speeds that large enterprises, data centers, and service providers need. |
NSsp 15700 | no | yes | The NSsp 15700 is designed for large distributed enterprises, data centers, government agencies and services providers. It provides advanced threat protection like Real-Time Deep Memory Inspection, multi-instance firewall configuration, and unified policy creation and modification, with scalability and availability. |
NSv Series | yes | yes | The NSv series firewalls offer all the security advantages of a physical firewall with the operational and economic benefits of virtualization. The NSv firewalls can operate in either Policy Mode or Classic Mode. You can switch between modes, but some configuration information from extra interfaces is removed. |
In addition to the management interface, SonicOS also has a full-featured API and a CLI to manage the firewalls. For more information, refer to:
- SonicOS Command Line Interface Reference Guide
SonicOS Workflow
When working with SonicWall products, you can use the following workflow as a guide for setting up your security solution.
A diagram shows a workflow starting with 'Planning', leading to 'Setup', then 'Configuration', followed by 'Monitor & Report', with branches to 'Adjust Performance' and 'Diagnose Issues'.
You begin your planning as you start making your purchasing decisions. Your sales partners can help you assess your network and make recommendations based on the kinds of security services you need. You can learn more about SonicWall products by reviewing product information and solutions. After selecting the solution, you can schedule your implementation.
After planning and scheduling your solution, you begin setting up the firewalls. The Getting Started Guides for your products can help you begin setting up the pieces to your solution. The getting started guides are designed to help you install the firewall to a minimal level of operation. Before performing any detailed configuration tasks described in the SonicOS Administration Guides, you should have your firewall set up and basic operation validated.
The configuration block of the workflow refers to the many tasks that combine to define how your firewall is integrated into your security solution and how it behaves when protecting your environment. Depending on the features of your security solution, this task can be quite complex. The System Administration Guides are broken into the key command sets and features. Some documents may be used for all solutions, but others may be used only if you integrated that feature into your solution. For example, High Availability or Wireless Access Points are not necessarily used by all customers. More information about a feature's workflow is presented in the feature administration guide. Refer to the specific Administration Guide for a SonicOS feature for more information.
Configuration tends to be a one-time activity, although you might make minor adjustments after monitoring performance or after diagnosing an issue. The configuration activity can be broken down into the more detailed flow as the following figure shows. This also mirrors the key functions that are listed across the top of the management interface.
A diagram shows the workflow steps: 'Device Configuration', 'Network Configuration', 'HA Configuration (optional)', 'Define Objects', 'Define Policies', 'Validate User Authentication'.
There is some flexibility in the order in which you do things, but this is the general work-flow you would follow when configuring your firewall. Start by defining the settings on the firewall. Next you set up the system and other devices that your firewall is connected to, and you can choose to implement High Availability when done. After your device, network, and system is configured, you should define the objects that you want to monitor. Then you use those objects to define the policies that protect your network. The final step to preparing your setup is to validate the user authentication.
How to Use the SonicOS Administration Guides
The SonicOS Administration Guide is a collection of guides that detail the features represented by each of the main menu items in the management interface. Within each guide, you can find topics covering commands in that menu group, along with procedures and in-depth information. The exceptions are the SonicOS 7.1 Monitor Guide and the SonicOS 7.1 Objects Guide which combine the topics for each of those functions into a single book.
To help you understand how the books align with the features and commands, the following figure shows the books organized like the SonicWall management interface.
A diagram illustrates the organization of SonicOS administration guides corresponding to the management interface menu structure: HOME (About SonicOS), MONITOR (Monitoring Guide, AppFlow, Logs, Tools & Monitor), DEVICE (Settings Guide, High Availability Guide, Users Guide, Appflow Guide, Network Access Control Guide, Log Guide, Diagnostics Guide, Switch Network Guide, Access Points Guide, WWAN Guide), NETWORK (System Guide, Firewall Guide, VoIP Guide, DNS Guide, SD-WAN Guide, IPSec VPN Guide, SSL VPN Guide), OBJECT (Objects Guide, Match Objects, Profile Objects, Action Objects, Action Profiles), POLICY (Rules and Policies Guide, DPI-SSL Guide, DPI SSH Guide, Security Services Guide, Anti-Spam Guide, Capture ATP Guide, DNS Security Guide, Endpoint Guide).
The SonicOS Administration Guides, along with related documentation, such as the getting started guides, are available on the https://www.sonicwall.com/support/technical-documentation/.
Guide Conventions
These text conventions are used in this guide:
- ⓘ NOTE: A NOTE icon indicates supporting information.
- ❗ IMPORTANT: An IMPORTANT icon indicates supporting information.
- ? TIP: A TIP icon indicates helpful information.
- ⚠️ CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.
- ? WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.
Convention | Description |
---|---|
Bold text | Used in procedures to identify elements in the management interface like dialog boxes, windows, screen names, messages, and buttons. Also used for file names and text or values you are being instructed to select or type into the interface. |
Function | Menu group > Menu item | Indicates a multiple step menu choice on the user interface. For example, NETWORK | System > Interfaces means to select the NETWORK functions at the top of the window, then click on System in the left navigation menu to open the menu group (if needed) and select Interfaces to display the page. |
Code |
Indicates sample computer programming code. If bold, it represents text to be typed in the command line interface. |
<Variable> | Represents a variable name. The variable name and angle brackets need to be replaced with an actual value. For example in the segment serialnumber=<your serial number> , replace the variable and brackets with the serial number from your device, such as serialnumber=2CB8ED000004 . |
Italics | Indicates the name of a technical manual. Also indicates emphasis on certain words in a sentence, such as the first instance of a significant term or concept. |
System Logs
The SonicWall network security appliance maintains an Event log for tracking potential security threats.
Topics:
- Viewing System Logs
- System Log Functions
- Display Options
- Filtering the View
Viewing System Logs
To view system events, navigate to MONITOR | Logs > System Logs page.
For a description of the:
- Functions, see System Log Functions
- Columns, see Display Options
System Log Functions
The System Log table provides numerous settings to allow you to navigate, view, and export results. Table columns can be customized, so that you can view full data on any event, or only the data you need. Table entries can be sorted to display in either ascending or descending order.
To sort the entries in the Event Log, click the column heading. The entries are sorted by ascending or descending order. The arrow to the right of the column name indicates the sorting status. A down arrow means ascending order. An up arrow indicates a descending order.
The top row of the Event Log contains various functions. Functions pertaining only to Event Logs are described in the below table.
Option | Function | Action |
---|---|---|
[Filter Icon] Filter | Filter | Set the filter for any specific log in the Event Log. You can set the filters based on GENERAL, SOURCE, and DESTINATION categories. For more information, refer to Filtering the View. |
[Search Icon] Search... | Search | The Event Log displays the log entries that match the search string. |
[Refresh Icon] Refresh | Refresh | Click to refresh the system log data. |
[Configure Icon] Configure Log | Configure Log | Click this link and you are navigated to DEVICE | Log > Settings to configure the items which needs to be tracked in the Event Log. |
[Clear Icon] Clear Logs | Clear Logs | Click to clear the logs from the table. |
[Export Icon] Export | Export | Click to export the logs in CSV, TXT files, and email. |
Display Options
Customize the Events log to display as many or few columns that meet your needs.
To select which columns to display:
- Navigate to MONITOR | Logs > System Logs.
- Click [Grid Icon]. The Grid Settings dialog displays:
A screenshot shows the Grid Settings dialog with column selection options. The available columns are listed with checkboxes and counts.
Select the items you want to appear as columns in the System Log.
General | Description | |
---|---|---|
Time | Local date and time the event occurred. ⓘ IMPORTANT: This option is selected by default. It is dimmed, and cannot be deselected. | |
ID | Identifying number for the event. ❗ IMPORTANT: This option is selected by default. It is dimmed, and cannot be deselected. | |
Category | Category of the event. This option is selected by default. | |
Group | Group designation of the event. | |
Event | Name of the event. | |
Msg Type | Type of message; usually Standard Message String. | |
Priority | Priority level of the event, such as Inform (information) or Error. ⓘ IMPORTANT: This option is selected by default. | |
Message | Information about the event. | |
Interface | Information about the protocol of the packet triggering the event. | |
Source | Name of the source device, if applicable. This option is selected by default. | |
Source IP | IP address of the source device. | |
Source Port | Port number of the source. | |
Source Interface | Source network and IP address, if applicable. | |
Destination | Name of the destination device, if applicable. This option is selected by default. | |
Destination IP | IP address of the destination device. | |
Destination Port | Port number of the destination. | |
Destination Interface | Destination network and IP address, if applicable. | |
Protocol | Information about the NAT policy in effect, if any. | |
Source Name | Protocol source name. | |
Source NAT IP | Source address from the Source NAT IP address pool. | |
Source NAT Port | Port number for the Source NAT. | |
In SPI | Indicates whether the ingress packet is in Stateful Packet Inspection (SPI) mode, if applicable. | |
Destination Name | Protocol destination name. | |
Destination NAT IP | Destination address from the Source NAT IP address pool. | |
Destination NAT Port | Port number for the Destination NAT. | |
Out SPI | Indicates whether the egress packet is in Stateful Packet Inspection (SPI) mode, if applicable. | |
IP Protocol | Protocol used to send error and control messages, if known. This option is selected by default. | |
ICMP Type | ICMP packet's ICMP type, if known. | |
ICMP Code | ICMP packet's ICMP code, if known. | |
Connection | Information about SPI, Access and IDP Rules, and policies, if any. | |
TX Bytes | Number of bytes transmitted. | |
RX Bytes | Number of bytes received. | |
Access Rule | Name of the Access Rule triggering the event, if any. | |
NAT Policy | Name of the NAT policy. | |
VPN Policy | Name of the VPN policy triggering the event, if any. | |
User Name | Name of the user whose action triggered the event. | |
Session Time | Duration of the session before the event. | |
Session Type | Type of session triggering the event. | |
IDP Rule | Name of the IDP Rule triggering the event, if any. | |
IDP Priority | Priority of the IDP Rule. | |
Application | Information about the application being used. | |
HTTP OP | NPCS object op requestMethod HTTP OP code. | |
URL | URL of the NPCS object op requestMethod HTTP OP code. | |
HTTP Result | HTTP result code (such as, 200, 403) of Website hit rpkt cn1Label Packet received. | |
Block Category | Block category that triggered the event. | |
Application | The application being used. | |
Others | Information about the user, session, and application, if known. | |
FW Action | Configured firewall action. If no action has been specified, displays N/A. | |
Notes | Includes notes. This option is selected by default. | |
Operation | Action | Provides option to disable the events. |
4. When done, click Apply to preserve any changes or click Restore Default to revert back to the default settings.
You can perform the following actions on the System Logs page:
- To export the logs in CSV, TXT files, and email, click [Export Icon] and select the required format.
- To clear the logs from the table, click [Clear Logs Icon].
- To refresh the page, click [Refresh Icon].
- To view more details of the log, click the triangle icon of the log.
Filtering the View
The Filter View input field at the top left corner of the System Log enables you to narrow your search using drop-down options and search strings.
To filter the System Event logs:
- Navigate to MONITOR | Logs > System Logs.
- Click [Filter Icon].
A screenshot shows the filter interface with fields for General, Source, and Destination, along with dropdowns for Priority, Category, and time range.
- Select any filtering scheme you want. Filter on just one field or you can filter on all of them. In the General, Source and Destination fields, you can enter a partial string to filter on.
- Click Accept.
OR
Click Reset to clear the filters applied.
Auditing Logs
This section describes in detail the recording feature that collects and records information on any changes in the security appliance configuration. To access this feature, navigate to MONITOR | Logs > Auditing Logs in the SonicOS web management interface.
What is Configuration Auditing
Configuration auditing is a feature that automatically records any configuration changes that an administrator attempts from one of the available user interfaces, web management (via HTTP and HTTPS), command line (via console or SSH), or SonicWall GMS. A configuration auditing records table is created to record all attempted configuration changes, both successful and failed. With configuration auditing, SonicOS archives the history of its configuration changes, so that the administrator or others can later revisit and analyze the records. This feature is enabled by default for the platforms where it is available.
Benefits of Configuration Auditing
Auditing of configuration change records can be useful as described below:
- Automatic documentation of any configuration changes performed by an administrator
- Assistance in troubleshooting unexpected changes in run-time system behavior
- Visibility, continuity, and consistency where there are several administrators, either simultaneously or consecutively. Each administrator has access to a record of changes performed or attempted by all other administrators.
- Third party integration with Firewall Manager, SEIM systems, logging and reporting solutions
- Compliance with regulations such as SOX, FISMA, NIST, DISA STIP
What Information is Recorded
Configuration auditing generates a record for every configuration change. The record includes:
- Which parameter was changed
- When the change was made
- Who made the change
- From where the change was made
- Details of the change, such as the previous and subsequent values
What Information is Not Recorded
The following are not included in the Configuration Auditing operation:
- Importing a Settings File - Configuration changes due to importing a settings file are currently not recorded by the configuration auditing feature. Since all current settings are cleared prior to applying imported configurations, the assumption is that all existing configurations are modified.
- WXA configuration settings - SonicOS does not audit any configuration changes in WAN Acceleration. Some settings are saved on the WXA instead of the firewall, although the settings can be configured from the SonicOS web management interface.
- ZEBOS settings for BGP/OSPF/RIP routing configurations - SonicOS stores these settings as one long string of ZEBOS CLI commands. Records of changes made by these commands are not duplicated in the configuration auditing operation.
- Anti-Spam Junk Store applications - Configuration settings changed through a proxy server running a junk store are excluded from configuration auditing.
- Licensing - All aspects of system licensing are authenticated through MySonicWall, and are not recorded through configuration auditing.
- Uploading a file from Home > Capture ATP - does not audit uploading a file from the page, because the contents of this page do not reside on the firewall.
Audit Recording in High Availability Configurations
The Configuration Auditing operation records changes individually for each device. It does not synchronize the recorded information between appliances in an HA pair. When the active HA unit next synchronizes with the standby HA unit, it sends configuration changes to the standby unit. The synchronization operation information updates the auditing record of the standby device in the pair. On the standby unit, the auditing record indicates that the configuration changes it recorded came from the active unit.
Modifying and Supplementing Configuration Auditing
Configuration Auditing operations can be modified and supplemented through the following:
SNMP Trap Control
SNMP (Simple Network Management Protocol) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks. SNMP traps allow the user to monitor security appliance status and configuration through a Management Information Database (MIB). Configuration auditing works in conjunction with SNMP by giving the user the option to enable a trap for each logged event collected during a network configuration change, whether successful or failed.
E-CLI Commands
E-CLI (Enterprise Command Line Interface) commands are available for configuration auditing record setting and display, for those administrators who like to work from the command line. You can use the following E-CLI commands to enable or disable configuration auditing and to view records:
To work with settings:
config(C0EAE49CE84C)# log audit settings
(config-audit)# enable
(config-audit)# debug
(config-audit)# auditall
(config-audit)# commit
To show audit records:
(config-audit)# show log audit view
Auditing Record Storage and Persistence
Configuration auditing records are saved to non-volatile storage (such as flash), so that records can be restored, if required, after a reboot. The number of records saved is directly proportional to the capability of the device, as defined in the product matrix below. Higher-end platforms can store more records than lower-end devices. Devices with no flash or smaller flash capacity do not support configuration auditing.
All configuration auditing records, on any platform, are deleted when the appliance is rebooted with factory defaults.
Managing the Audit Logs Table
The administrator can manage the auditing records in many useful ways. The following activities are available:
Topics:
- Viewing Auditing Logs
- Manually Emailing Auditing Logs
- Exporting Auditing Logs
- Refreshing the Auditing Logs
- Displaying the Auditing Logs on the console
- Auditing All Parameters During Addition
Viewing Auditing Logs
The MONITOR | Logs > Auditing Logs page displays all the configuration auditing records. It allows a user to view, search, and sort the records.
- The first column is expandable to display the summary of the log entry.
- There are also buttons for Select all Columns and Restore Default for ease of operation. Click [Grid Settings Icon] to perform the desired action.
- The user can search for a specific string pattern and highlight the matched results, if any are found.
- Failed configuration changes are marked in red.
- All columns are sortable.
A screenshot shows the Auditing Logs table with columns like AUDIT ID, TRANSACTION ID, TIME, AUDIT PATH, GROUP INDEX, GROUP NAME, DESCRIPTION, OLD VALUE, NEW VALUE, TRANSACTION TYPE. Sample data is displayed.
Manually Emailing Auditing Logs
When a valid mail server and email address are configured, the user can click the email button on the tool bar of the Auditing Records page to manually email auditing records at any time. The button is disabled if either the mail server or the email address is not configured under DEVICE | Log > Automation.
The DEVICE | Log > Automation page includes settings for configuring the SonicWall to send log files using Email and configuring mail server settings.
A screenshot shows the Auditing Records page with an 'Email Audit Records' button and sample log data.
Exporting Auditing Logs
There are two export options for auditing records. You can export the records as a text file or as a CSV file.
A screenshot shows the Auditing Records page with an 'Export' button and options for CSV and Text export.
Refreshing the Auditing Logs
The Refresh button provides a way to refresh the page and display the latest auditing records, as seen below.
A screenshot shows the Auditing Records page with a 'Refresh' button and updated log data.
Displaying the Auditing Logs on the console
Click Supplemental > Display Auditing Records on Console option to display the auditing records on the console in a text format.
Auditing All Parameters During Addition
By default, configuration auditing only logs significant changes, defined as changes where the new value of the parameter is different from the default value. Click Supplemental > Audit Supplemental Parameter Changes option to record all parameter changes during an addition activity, even when the new values are the same as the default values.
A screenshot shows the Auditing Records page with the 'Audit Supplemental Parameter Changes' option highlighted.
Threat Logs
This section describes in detail the recording feature that collects and records information on any changes in the security appliance configuration. To access this feature, navigate to MONITOR | Logs > Threat Logs in the SonicOS web management interface.
A screenshot shows the Threat Logs interface with columns like TIMESTAMP, USERNAME, THREAT, TIME, IP ADDRESS, etc.
Topics:
- Viewing Threat Logs
- Threat Log Functions
- Display Options
Viewing Threat Logs
To view threat events, navigate to MONITOR | Logs > Threat Logs page.
For a description of the:
- Functions, see Threat Log Functions
- Columns, see Display Options
Threat Log Functions
The Threat Log table provides numerous settings to allow you to navigate, view, and export results. Table columns can be customized, so that you can view full data on any event, or only the data you need. Table entries can be sorted to display in either ascending or descending order.
To sort the entries in the Event Log, click the column heading. The entries are sorted by ascending or descending order. The arrow to the right of the column name indicates the sorting status. A down arrow means ascending order. An up arrow indicates a descending order.
The top row of the Event Log contains various functions. Functions pertaining only to Event Logs are described in the below table.
Option | Function | Action |
---|---|---|
[Search Icon] Search... | Search | The Event Log displays the log entries that match the search string. |
[Time Interval Slider] 60 Secs | Time Interval | Set the slider to filter the Event Log based on the time interval for the Event Log. You can set the slider anywhere between 60 Sec to 365 days. |
[Custom Limit Dropdown] Custom Limit: 50 | Custom | Select the interval for the Event Log. The event logs displays the maximum entries in the table based on selection.
|
[Refresh Icon] Refresh | Refresh | Click to refresh the log data. |
[Export Icon] Export | Export | Click to export the logs. |
Display Options
Customize the Events log to display as many or few columns that meet your needs.
To select which columns to display:
- Navigate to MONITOR | Logs > Threat Logs.
- Click [Grid Icon]. The Grid Settings dialog displays:
A screenshot shows the Grid Settings dialog for Threat Logs, listing columns like Timestamp, Application, URL, User Name, Threat, Time, IP Address, etc., with selection counts.
Select the items you want to appear as columns in the Threat Log.
Category Name | Column |
---|---|
Timestamp | Time |
Application | Application Component |
URL | URL URL Rating URL Severity |
User Name | User Name |
Threat | Virus Intrusion Spyware Botnet |
Time | Start Time Last Updated |
IP Address | Initiator IP Responder IP |
IP | Protocol Name |
Port | Initiator Port Responder Port |
Country | Initiator Responder |
FileName | FileName |
Capture ATP | Action |
Interface | Initiator Interface Initiator Interface |
BWM | Inbound Priority Outbound Priority |
Statistics | All Counters Initiator Bytes Responder Bytes |
Status | Flow Status Blocked Reason |
Policies | Security Rule NAT Rule Init Route Rule Resp Route Rule Decryption SSL Rule Decryption SSH Rule DoS Rule |
MAC | Init MAC Responder MAC |
Miscellaneous | Initiator Gateway Responder Gateway Initiator VPN Name Gateway VPN Name |
4. When done, click Apply to preserve any changes or click Restore Default to revert back to the default settings.
SonicWall Support
Technical support is available to customers who have purchased SonicWall products with a valid maintenance contract.
The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. To access the Support Portal, go to https://www.sonicwall.com/support.
The Support Portal enables you to:
- View knowledge base articles and technical documentation
- View and participate in the Community forum discussions at https://community.sonicwall.com/technology-and-support.
- View video tutorials
- Access https://mysonicwall.com
- Learn about SonicWall Professional Services at https://sonicwall.com/pes.
- Review SonicWall Support services and warranty information
- Register for training and certification
- Request technical support or customer service
To contact SonicWall Support, visit https://www.sonicwall.com/support/contact-support.
About This Document
Document Title: SonicOS Logs Administration Guide
Updated: December 2023
Software Version: 7.1
Document Revision: 232-006095-00 Rev A
Copyright © 2023 SonicWall Inc. All rights reserved.
The information in this document is provided in connection with SonicWall and/or its affiliates' products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL SONICWALL AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF SONICWALL AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its affiliates make no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. and/or its affiliates do not make any commitment to update the information contained in this document.
For more information, visit https://www.sonicwall.com/legal.
End User Product Agreement
To view the SonicWall End User Product Agreement, go to: https://www.sonicwall.com/legal/end-user-product-agreements/.
Open Source Code
SonicWall Inc. is able to provide a machine-readable copy of open source code with restrictive licenses such as GPL, LGPL, AGPL when applicable per license requirements. To obtain a complete machine-readable copy, send your written requests, along with certified check or money order in the amount of USD 25.00 payable to "SonicWall Inc.", to:
General Public License Source Code Request
Attn: Jennifer Anderson
1033 McCarthy Blvd
Milpitas, CA 95035