August 2, 2017

SonicWALL Hidden Features and Configuration Options

SonicWall Hidden Features and Configuration Options

The hidden HTML page can be found on all TZ, NSA, SOHO and various other SonicWALL models.  When you enter this configuration page, the unit displays the following disclaimer:Warning: these settings are not documented and changing settings here could prevent proper operation of the SonicWall. Only make such changes if instructed by SonicWall technical support.

Access this hidden page by logging into your SonicWALL and manually type the following address "https://<your SonicWALL IP>/diag.html"

The hidden HTML page provides a long list of additional configuration options such as:

  • Download Trace Log
  • ARP related options such as: enable/disable ARP bridging, limit ARPS of non-responsive IPs, only allow ARP entries with unicast addresses
  • Routing and Network Settings such as: enable TCP packet option tagging, enable TCP sequence number randomization, perform SYN validation
  • DNS and DNS proxy settings
  • DHCP settings such as: Enable DHCP server network pre-discovery
  • VoIP settings
  • VPN settings
  • Encryption settings
  • Firewall settings
  • Security service settings
  • Threat API settings that enable or disable threat API filtering
  • DPI-SSL settings
  • High availability settings
  • Network failover and load balancing
  • PPPOE settings
  • Management settings
  • User authentication settings
  • Diagnostics settings
  • Watchdog settings
  • Wireless settings
  • Anti-spam service settings
  • Remote assistance switch to allow Dell remote access
  • WAN acceleration settings
  • GeoIP/Location service settings
  • Flow reporting
  • Log settings
  • IPv6 settings
  • ICMP settings

Latest Posts

July 16, 2021

Why End Point Detection (EDR) Offers Better Security

The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.

Read More
July 12, 2021

What is a Crypto Wallet and How to Secure it

There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.‍

Read More
July 7, 2021

How to better defend against cyberattacks

The first and most crucial thing any company can do to reduce the likelihood of a cyberattack is to train their employees about cyberthreats and how to recognize them. This may seem obvious and intuitive, but the fact of the matter is that human error accounts for a large percentage of successful cyberattacks.

Read More

You have questions, we have answers

What can we help you with?