en-US
search-icon

Cloud GMS Admin Guide

Appendices

Configuring Open Authentication and Social Login

About OAuth and Social Login

Social Login is a form of single sign-on authentication that utilizes existing user credentials from social networking services such as Facebook, Twitter, or Google+ to then sign in to a third-party website instead of creating a new login account specifically for that website. The Open Authentication (OAuth) Social Login feature can be used with guest service on wireless zones, LAN zones, or DMZ zones using pass-through authentication; see External Authentication Server Login Topology. Pass-though authentication is a method of performing authentication to a domain controller that resides within a trusted domain. Wireless guest services are widely used in public WiFi hot spots and corporate WiFi services set up for guests.

External Authentication Server Login Topology

Topics:  

What are OAuth and Social Login?

OAuth is an open standard for authorization. OAuth provides client applications “secure delegated access” to server resources on behalf of a resource owner, and specifies a process for owners to authorize third-party access to their server resources without sharing their credentials.

Social Login, also known as social sign-in, is a form of single sign-on (SSO) using existing login information from a social networking service such as Facebook, Twitter, or Google+ to sign into a third-party website instead of creating a new login account specifically for that website.

Benefits of OAuth and Social Login

Topics:  

OAuth

OAuth is a popular mechanism that assists users in sharing data between applications. You can take advantage of OAuth by using it as a login provider for your web application.

Other advantages
Limiting customer profiles on the net
Fewer passwords to track
Not required to submit a password where trust might be an issue
You can still prevent access from the OAuth provider
Lower risk of ID theft. Authentication is assumed by the provider
Lower risk of bug failure with authentication using previously proven APIs
Less storage requirement on your data servers
Disadvantages
You cannot tailor user profiles for your own applications
User confusion in creating accounts with OAuth providers when they do not have existing accounts

Social Login

Social login is designed to simplify the login process and to realize a higher conversion rate for registrations.

Other advantages
Quick registration
Remember fewer logins
Target-rich content
Use of multiple identities
Collection of visitor data
Detailed or personalized user experience
Familiar login environments
Fewer failed logins
Ease of use for mobile
Disadvantages
Low trust level
Non-Social users excluded
Data accuracy can be falsified
Blocked content from Social networks
Security issues

How Do OAuth and Social Login Work?

The Open Authentication (OAuth) and Social Login features can both be used with internal wireless services and SonicPoints as a wireless zone guest service. Guests can log in to the Internet using your company’s corporate WiFi. Wireless guest services are widely used in public WiFi hot spots and corporate WiFi services set up for guests.

Both OAuth and Social Login use wireless guest services that include Internet access and can be configured to use either or both of these methods of connection:

No Redirect

No Redirect provides open Internet access to guests with no required encryption, so guests are allowed to connect to the provided WiFi freely.

No redirect can also provide WPA/WEP passphrase or password access where guests would need a passcode to use the available WiFi. The passcode could be provided through other means, such as on a receipt.

Redirect to a landing page

A landing web page provides the most widely used hot spot access. While the layer 2 WiFi access is open, guests are directed to a landing web page when accessing the first layer; see Oauth Flow. Some other redirect access options include:

No authentication on the landing page
Guests can create a new login account and then sign in with it
Guests can sign up using a code sent to them by SMS to a mobile phone, email, or other method
Scanning a QR code with a mobile app
Using a social login

Oauth Flow

Supported Platforms

Open Authentication and Social Login is supported on SonicWall firewalls:

Under GMS Management running GMS 8.3

Requirements for Development and Production

A Facebook account
Enable Facebook For Developers
External server
Public accessible
Has a domain name
PHP support
SSL Certificate
Sonicwall firewall
Can be reached by the external server (by IP or FQDN)
Wireless (internal or SonicPoint)

About Lightweight Hotspot Messaging (LHM)

Lightweight Hotspot Messaging (LHM) leverages the SonicWall Guest Service model, wherein users can be classified and authorized for differentiated network access through a SonicWall security appliance. For example, the SonicWall can be configured such that any user connecting through an interface belonging to a guest-services-enabled WLAN (wireless LAN) Zone only has access to the Internet (Untrusted network), but does not have access to the LAN (Trusted network). This allows a single firewall to offer simultaneous access to trusted and guest users.

LHM extends the Guest Services model by breaking apart the authentication and authorization processes, thereby allowing the authentication to occur external to the SonicWall. This allows for extensive customization of the authentication interface, and also allows for any kind of imaginable authentication scheme to be used.

A side by side view of the original Guest Services authorization flow and the LHM authorization flow is shown in the Comparison of authorization flows table:

 

Comparison of authorization flows

Original Guest Services Authorization Flow

LHM Authorization Flow

LHM defines the method and syntax for communications between a SonicWall wireless access device (such as a SOHO W firewall, a TZ Wireless series firewall, or a SonicPoint with a governing SonicWall security appliance) and an Authentication Back-End (ABE) for authenticating Hotspot users and providing them parametrically bound network access. LHM configuration example depicts a generic configuration.

LHM configuration example

LHM allows network operators to provide centralized management of multiple Hotspot locations by providing an interface between SonicWall’s Wireless Guest Services and any existing ABE. LHM is an adaptation of the generalized WISPr and GIS specifications.

LHM was designed to satisfy the requirements of a particularly common operational environment rather than a broad set of environments. Specifically, LHM allows for Hotspot user-management and authentication to occur entirely on the network operator’s ABE, supporting any method of account creation and management, and any extent of site customization and branding. This approach enables integration into any existing environment without dependencies upon particular billing, accounting or database systems, and also provides the network operator with unrestricted control of the site’s design, from look-and-feel to redirection.

Configuring Facebook for Social Login

Topics:  

Facebook Settings

To login to Facebook for Developers:
1
Open a Web browser
2
Log in to your Facebook for Developers account at https://developers.facebook.com/.

3
Complete the login process or sign up for a new developer’s account.
4
Click Settings in the left column.

See Example of settings for Facebook for developers to fill the form, but adjust the Facebook Settings to work with your LHM server.

Example of settings for Facebook for developers

Client OAuth Settings

You should adjust your Client OAuth settings at Facebook for Developers, https://developers.facebook.com/ (Products > Facebook Login > Settings), similar to those shown in Example of OAuth Facebook settings.

Example of OAuth Facebook settings

Guest Status (demo)

When a wireless client is allowed access to the SonicWall WiFi, the owner’s account name and information is sent to Cloud GMS. You can collect and store this information in your own databases.

Configuring Open Authentication and Social Login

Topics:  

About Configuring Guest Services

Although Cloud GMS provides its own guest account management, you can use your own IT infrastructure to better accommodate your business requirements. This configuration can be done by setting up external guest authentication or a social login. The Guest tab (see Current Guest Services settings on Edit Zone dialog) is provided in the Add/Edit Zone dialogs of the Cloud GMS wireless zone, LAN zone, or DMZ zone (Network > Zones).

Current Guest Services settings on Edit Zone dialog

About Configuring Social Login

This feature simplifies cumbersome logins for end users as well as provides reliable demographic information to web developers.

To prepare for configuring Social Login:
1
Create a wireless zone, LAN zone, or DMZ zone as described Network > Zones and set up or edit a network zone with security capabilities. For more information on adding the network zone, see Configuring Zones.
2
In Cloud GMS, the external server can also be created or selected as a Lightweight Hotspot Messaging (LHM) server IP or FQDN address object.

Configuring Social Login in Cloud GMS

Setting up your firewall properly requires some configuration. The firewall blocks most Internet applications, but a few should be allowed for this feature to function correctly.

* 
IMPORTANT: An LHM server should be in service before configuring Social Login.
To configure your firewall for Social Login:
1
Go to Network > Zones to set up or edit a network zone with wireless security capabilities.
* 
NOTE: The external server can also be created or selected as an Lightweight Hotspot Messaging (LHM) server IP or FQDN address object.
2
Click the WLAN Edit icon to access the WLAN network zone. The Edit Zone dialog displays.

3
Click the Guest tab.

4
Select Enable Guest Services. The other options activate.
5
Select Enable External Guest Authentication. The Configure button activates.
6
Click Configure. The External Guest Authentication dialog displays.

7
For the External Web Server Settings, you should have an LHM server already in service. Select an Address Object associated with that server from the Host Server Host drop-down menu.
8
Configure the rest of the page as described in Configuring Zones.
9
In the Social Network Login section, select Enable Social Network Login. The social networks activate.
10
Select one or more social network to enable for open authentication:
Facebook
Google
Twitter

Cloud GMS automatically creates the necessary pass-through authentication network domains for allowing authentication process traffic between the authentication server and the user. The automatically added address object groups are named Default Social Login Pass Group. This address object group is appended to the currently configured pass networks, if any, or it is added into a new group called Social Login Pass Group.

11
Click the Auth Pages tab.

12
Enter a Login Page location, such as login.php, but based on your developer’s input pages. These scripts are hosted by your own LHM server, so you should be able to make sure they function correctly.
13
Complete the remaining fields.
14
Click OK.

Verifying the Social Login Configuration

You can verify the correct configuration of Open Authentication and Social Login by viewing the Network > Address Objects page.

To verify settings:
1
Navigate to Network > Address Objects.
2
Select the Address Groups tab.

The page should show:

Domains have been added automatically.
Facebook, Google, and/or Twitter login traffic can pass through successfully.

SonicWall Support and Training

The official, Education-developed eLearning course for Cloud GMS can be found under “Global Management System Certification Training.” There are 10 video sections stored there, modularized to focus on specific topics. This training is the basis for the CSSA certificate developed for Cloud GMS. There is an excellent section on how to operate the Workflow feature. See:

https://support.sonicwall.com/sonicwall-gms/training/109/global-management-system-certification-cssa-level-course

There are also two BrightTALK webinars on the subject available at:

Best Practices: Cloud GMS - Deployment Acquisition & Management Tasks

https://www.brighttalk.com/webcast/5052/158275

Best Practices: Cloud GMS and Analyzer - Getting the Most Out of Reports

https://www.brighttalk.com/webcast/5052/150671

Another resource Cloud GMS administrators might find useful is the “GMS Video Training Series,” available at http://software.sonicwall.com/gmsvp/Dev-Training/index.html - this training does not require a login, and is available externally to both partners and customers. The content was created and presented by the Cloud GMS Development team and describes exactly how developed features function, release-by-release.

This appendix contains the following sections:

Security Status

Feature

Instantly know your node’s security status by using the SonicWall™ Cloud Global Management System (Cloud GMS) Dashboard.

The Dashboard allows you to monitor your entire firewall network at-a-glance.

Best Practices

Customize your Dashboard to include components such as security alerts, threat posturing, data usage, application usage, firewall status, as well as any external RSS websites that might interest you.

Backup Utilities

Feature

Stop losing hours of work and months of data using the Cloud GMS backup utility.

The Backup/Restore utility helps retain firewall configuration settings and historical data in the event of a catastrophe, potentially saving hours of work and months of priceless information.

Best Practices

Create a daily schedule of Basic Backups for all your firewall and Cloud GMS settings, as well as weekly Application Backups of your Cloud GMS database content, firewall firmware images, and daily backup items. You can also schedule monthly Complete Backups of your entire firewall syslog history, reports generated to date, and weekly and daily backup items.

Change View

Feature

Efficiently manage and informatively report on firewalls with Change View by clicking the Change View icon located at the top left of the button bar.

The Change View feature allows you to logically group your firewalls for ease-of-management and informative summary reporting.

Best Practices

Use the default views pre-defined by hardware model, firmware release, alphabetically. Add custom views such as a company name, a geographical location, or any other criteria that makes managing and reporting on groups of firewalls more efficient for your needs.

For more information, see Changing Views.

Role-based User Access

Feature

Precisely govern user privileges using Role-based User Access.

Role-based Access allows screen-by-screen privileges for any number of Cloud GMS User roles, ranging from the SuperAdmin to the standard user who can view only one report.

Best Practices
Create categories of user roles such as Admins, Operators, and Guest Users.
Assign unit permissions for firewalls in Change View (see Change View) to categories of user roles.
Assign Action Permissions to categories of user roles (such as Add Unit, Delete Unit, Manage Views, Show Dashboard, Enable CLI, and Webservices).
Assign a schedule and/or an expiration that the account is enabled. There is no practical limit to the number of users you can create, each with over 5 x10128 combinations of administrative privileges.

For more information, see Users.

Report Panel Customization

Feature

See usage and threat patterns and conduct forensic investigations by customizing the output of the Report panel.

The Cloud GMS Reporting feature includes over 70 pre-defined “one-click” reports, each customizable by date range, filtering criteria, and live link drill-down options.

Best Practices
Specify the time range of the report of interest to narrow the event (for example, Custom).
Choose the number rows to see the “top” occurrences (such as 20).
Use the Cloud GMS Filter Bar parameters and operators to narrow the report results (such as Intrusion LIKE QuickTime).
Use the Cloud GMS buttons to Save, Schedule Report, Export to PDF, and Export to CSV to repeat the customized report and create soft copies for offline analysis and distribution.

For more information, see Managing Firewall Reports.

Universal Scheduled Reports

Feature

Get regular security and compliance assurances using automated Universal Scheduled Reports.

The Universal Schedule Report feature enables you to schedule any of the 70+ pre-defined reports, as well as your own custom reports, or compliance reports for PCI, HIPAA, and SOX.

Best Practices
Customize your report with a meaningful title on the cover sheet (such as Report Content and Firewall(s)).
Add an appropriate logo (for example, a company or client name).
Optimize performance by running reports on separate schedules (10 or fewer firewalls per schedule, 10 or fewer reports per firewall), or 10 or fewer rows per report).

Alert Settings

Feature

Perform realtime monitoring of your security infrastructure using automated Alerts.

The Alert Settings feature proactively sends alerts for urgent status updates such as firewall down, WAN down, high CPU utilization, high bandwidth utilization, disk quota, and customized criteria such as threat events.

Best Practices:
Enable all of the default Alert Settings: Unit Status Report, Database Info, New Firmware Availability, and so on.
Customize Threshold and Alert Settings to suit your organization's need for realtime notification of network security events.

For more information, see Adding Alerts.

Registration and Upgrades

Feature

Manage your entire inventory of network firewall licenses using Registration/Upgrades.

The Registration/Upgrades feature uses a single screen, searchable view of licensing for the entire firewall network.

Best Practices
Filter views by the Security Service name, Subscription type, or the Expiration Date.
Synchronize licenses with www.MySonicWall.com without having to individually log in to each firewall.
Upgrade the firmware on firewalls using an image from www.MySonicWall.com or an image file stored locally on Cloud GMS.
Save money on AV clients and VPN client licenses by sharing them amongst firewalls within a Cloud GMS License Sharing Group.
Create hard copies or .PDF copies of your license inventory.

For more information, see Registering and Upgrading SonicWall Firewall Appliances.

Administrator Passwords

Feature

Restrict local administrator access to a firewall by having Cloud GMS generate a new, random password for the firewall using the firewall Policies > System > Administrator screen.

Best Practices

Change the firewall administrator password immediately after the firewall has been acquired by Cloud GMS by leaving the password fields empty so that Cloud GMS generates a random password. Only authorized Cloud GMS users with assigned privileges to the unit are able to make changes to the firewall.

For more information, see Configuring Administrator Settings.

 

Cloud GMS FAQ

This appendix contains the following sections:

Features

Feature Comparison

What are some the feature differences between Cloud GMS and on-prem GMS?

On-prem GMS is the flagship SonicWall central firewall console, providing a premier set of industry-leading Management and Reporting features. On-prem Management features are on par with those directly on the firewall. On-prem Reporting features include over 140 one-click reports, fully customizable reports and templates, live drill-down and forensic pivoting links, automated scheduling and emailing, and advanced monitoring and alerting functionality. Our industry-exclusive dual-engine Reporting is unique in central firewall consoles combining Syslog and IPFIX Flow Reporting in one application and at no extra charge.

SonicWall Cloud GMS is the essentials SonicWall central firewall console, providing nearly 100% identical Management functionality to on-prem GMS Management. Cloud GMS Reporting employs our highest performance engine, the Flow Reporting engine, and this engine lays the foundation for some powerful Cloud Analytics that the data scientists and engineers at SonicWall are researching and developing.

Here are the most important feature differences:

Available in Cloud GMS but not in On-prem:

SonicWall Application Risk Management Report with configurable start/stop date/timestamp

Coming Soon to Cloud GMS (available today only in on-prem):

Automated scheduling and emailing of .pdf reports
PCI, HIPAA, SOX one-click reporting templates

Flagship Features in On-prem (not available in Cloud GMS):

Dual-Reporting engines (Syslog, in addition to IPFIX)
Management/reporting of SuperMassive firewalls
Management/reporting of SMA and Email Security appliances
Geographical dashboard with customizable summary report widgets
CLI and Web Services API
Net Monitor SNMP handling and relay management
Realtime Syslog monitoring
Live Monitor syslog scanning/alerting

Workflow/Change Management

Does Cloud GMS include the Workflow and Change Management features?

Yes, Cloud GMS includes the Workflow and Change Management features. These features work together to provide admins with the ability to configure policy changes in change orders, to compare the change orders against the current firewall policy, to validate the logic of change orders, and to process the review and approval of a change order prior to automating its deployment. All of the details surrounding each change order are logged to provide an audit trail of any changes made to a firewall's policy rule set. Workflow and Change Management could be enabled/disabled according the needs of the admin.

Role-based Access

Can Partners delegate logins to end-users to access their firewalls using the Partner's Cloud GMS?

Yes. Through MySonicWall User Groups, Partners can grant permission to an end-users' MySonicWall ID to access the Partner's GMS tenant. Each end-user's access privileges can be uniquely restricted by the Partner admin on a highly granular firewall-by-firewall, screen-by-screen, read/write basis.

Data Retention

What is the data retention period of Cloud GMS?

Cloud GMS retains IPFIX flow data for three months on a rolling basis.

2-step Authentication

Is two-step authentication available?

Yes. Two-step authentication to Cloud GMS is available and it employs the MySonicWall 2SA mechanism.

Sales

Service Description

What is Cloud GMS?

Cloud GMS is a cloud-based management and reporting solution for SonicWall firewalls and wireless access points and Dell X-Series switches.

Gold Award

Is it true that Cloud GMS won an award at RSA 2017?

Yes. We are proud to say that Cloud GMS won a Gold Award from Info Security Products during RSA 2017 in San Francisco in the category of New Products and Services.

Price Level

How much is Cloud GMS?

Cloud GMS aims to make the cost of average-size and below GMS system more affordable. MySonicWall contains current pricing, or contact SonicWall Sales to help you determine if your cash flow position makes Cloud GMS or on-prem GMS a better long-term investment for your firm.

License Structure

What is the structure of the offering?

Here are the particulars of the license structure:

Two price levels - one for TZ/SOHO Series and one NSA Series firewalls
Subscription license, not a perpetual license
Each license is associated with a specific firewall Serial number, non-transferrable
One year in duration, stackable for multi-year
Features include Management and historical Flow Reporting
Includes 24x7x365 Support
Only one Cloud GMS instance per MySonicWall login.

The SonicWall Cloud GMS yearly subscription license is distinct from the on-prem GMS perpetual node license. The two licenses are not interchangeable. However, a single MySonicWall account could have a mix of one Cloud GMS instance and any number of on-prem GMS instances.

Security-as-a-Service Program

Is Cloud GMS available in the SECaaS program?

Yes, Cloud GMS is available through the SonicWall Security-as-a-Service program as an upgrade option in new and existing SECaaS firewall bundles. For these upgrades, Cloud GMS is offered at a discounted rate. Cloud GMS is also available as a standalone offering with monthly billing for use with non-SECaaS firewalls.

Partner Solution

Is there a partner-level requirement for Cloud GMS?

All partner levels: Registered, Silver, Gold, and Platinum partners are eligible to register for Cloud GMS accounts.

Free Trial

How do I register for a free trial?

In MySonicWall, click try to start a free 30-day trial for each firewall that you would like to manage using Cloud GMS.

Live Demo

Is Cloud GMS available on Live Demo?

Live Demo will get a Cloud GMS instance soon. We are working on a means to share a MySonicWall login to allow secure, shared access to a single Live Demo instance. In the meantime, Live Demo does have a GMS 8.3 system that demonstrates the Management features of Cloud GMS (including Workflow) and performs Flow Reporting on select Live Demo firewalls.

Purchase

How do I buy Cloud GMS?

To purchase Cloud GMS for a particular firewall, click the shopping cart icon and follow the prompts to register and receive your activation key. Alternatively, contact SonicWall Sales to register and receive your key.

Through the Buy Service screen, you can also elect the Auto-Renew option.

After Purchase

What happens after I purchase Cloud GMS?

After purchase, the registration process begins automatically with an email confirming successful provisioning of your Cloud GMS instance. You are now ready to login to the system at https://Cloud.MySonicWall.com. Alternatively, you can login via the Manage links next to the firewalls listed in your MySonicWall.com My Products page. After logging in, to provision a firewall for acquisition by Cloud GMS, see the online Cloud GMS Getting Started Guide for the step-by-step procedure.

Subscription Renewals

How will I know it is time to renew?

As the Cloud GMS subscription expiration nears, you will receive periodic email notifications, increasing in frequency. You can renew through MySonicWall or by contacting SonicWall Sales. Should your subscription expire, you are no longer able to log in to Cloud GMS to manage the firewall and to view historical reports, but the firewall itself continues to operate securely and it can be accessed by logging in to it directly.

Geographical Considerations

Where will Cloud GMS be available?

We are releasing Cloud GMS to North/South America and Asia/Pacific (including ANZ and Japan) in spring 2017 connecting to a US-based datacenter. In summer 2017, we are targeting release in EMEA connecting to a European-based datacenter. See the end-user product agreements that follow for an understanding of the implications to data, users, and firewalls within each region.

End-user Product Agreements

Where can Partners find the licensing terms and conditions for Cloud GMS?

Read the SonicWall end-user product agreements pertaining to your geographical region https://www.sonicwall.com/legal/eupa.aspx Cloud GMS is categorized as a Software as a Service (SaaS) in the EUPAs.

Canadian Datacenter

Will there be a Canada-based datacenter?

At this time, we do not have plans for a Canadian datacenter. However, we continually monitor the market and could reconsider our plans if conditions change.

Trade-in

Is there a trade-in program for partners who are using on-prem GMS today, but want to switch to Cloud GMS?

We do not have a trade-in credit for GMS on-prem licenses, so if a partner wants to migrate from an on-prem GMS to Cloud GMS, the most economical strategy is to switch over to a Cloud subscription when the on-prem Support term expires.

Roadmap

Can you tell me anything about what is coming next in Cloud GMS?

We have great plans and an exciting future ahead for Cloud in general. You can be assured that the Cloud GMS system is running on the latest, most reliable and feature-rich version. Moreover, it is always be up-to-date when it comes to the latest maintenance updates and cumulative hot fixes. You will see incremental improvements every few weeks and major enhancements every few months. Over time, reporting will get more powerful, management will become easier, the user experience will be more enjoyable, and firewalls will be much simpler to add. As a cloud solution, you do not need to maintain an on-site deployment to benefit - simply log in and the latest and greatest versions are at your service. In general, you see the SonicWall Cloud experience integrates as a seamless whole with more security features and applications joining our growing Cloud portfolio.

Training

Online Training

I am new to GMS. Where is the best place to start learning about it?

We have free, online 24x7 training under the Certified SonicWall System Administrator (CSSA) certification program https://support.sonicwall.com/sonicwall-gms/training/109/global-management-system-certification-cssa-level-course In the course of a half-day; you will know all the basics of GMS operation.

Support

Support Entitlement

Does Cloud GMS include Support?

Yes, Cloud GMS includes 24x7x365 Support through Support engineers trained and specializing in Cloud GMS.

Service Response Times

What are SonicWall's service response times?

See our severity level response times for service requests here: https://support.sonicwall.com/essentials/sonicwall-sr-severity-levels-response-times.

SonicOS Versions

What versions of SonicOS are supported?

Cloud GMS supports SonicOS 5.8, 5.9, and 6.2 firewalls. SonicWall requests that you upgrade to the latest SonicOS General Release or Feature Release versions for the highest performance, greatest protection, and up-to-date hot fixes. As of May 1, 2017, those are 5.8.4.2 (GR), 5.9.1.7 (GR), 5.9.1.8 (FR), and 6.2.7.0 (GR).

SonicOS 5.9 and Flow Reporting

Why doesn't SonicOS 5.9 have Flow Reporting?

Because of memory constraints on SonicWall hardware now in Support Retirement Mode (for example, the TZ 2xx Series), 5.9 memory allocations for IPv6 do not leave enough resources for the sending IPFIX for Flow Reporting. Consequently, SonicOS 5.9 firewalls do not have data for historical reporting. However, 5.9 firewalls can still be managed by Cloud GMS.

SuperMassive Support

Why aren't SuperMassive firewalls supported?

The SonicWall-recommended best practice is to manage SuperMassive firewalls using an on-prem GMS deployment. This type of dedicated platform provides the greatest control over the large amounts traffic from the firewall and the data stored on GMS.

Technical

Data Security

How do I know that my data is secure?

Management is performed securely over HTTPS. IPFIX reporting data is sent over an encrypted tunnel from managed firewalls to the SonicWall datacenter. This tunnel is auto-created during provisioning.

Data Storage

How much storage is allocated per firewall in Cloud GMS?

Cloud GMS stores IPFIX flow data for three months on a rolling basis. We do not use a storage quota per firewall.

Datacenter Information

What can you tell me about the datacenters?

The Cloud GMS datacenters are built using the latest high-availability, redundant hardware and software technologies. They are pro-actively monitored using state-of-the-art IT tools and supported 24x7x365. Should the need arise for an outage; we will make every effort to provide advance notice, barring any circumstances beyond the reasonable control of SonicWall.

Application Visualization License

Do I need to purchase an Application Visualization license for Flow Reporting to work?

No. When you subscribe to Cloud GMS, SonicWall activates an Application Visualization license in the background at no additional cost to enable Flow Reporting to work.

Migrating From On-prem

If I change from on-prem, what is the best method to migrate my firewalls?

TBD - AddUnit.xml

Flow Reporting not in SonicOS 5.9

What is the reason that Flow Reporting does not appear for SonicOS 5.9 firewalls?

Because of the memory allocated to support IPv6, SonicOS 5.9 does not support the sending of IPFIX for Flow Reporting. However, SonicOS 5.9 firewalls can still be managed from Cloud GMS.

License Agreements

You can view the End User License Agreement and all Third-Party Product Licenses in the Console > Help > About screen of the SonicWall™ Cloud Global Management System (Cloud GMS) user interface.

This appendix details the following licensing agreements:

End User Software License Agreement

PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE SONICWALL PRODUCT. BY INSTALLING OR USING THE SONICWALL PRODUCT, YOU (AS THE CUSTOMER, OR IF NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO BIND THE CUSTOMER) INDICATE ACCEPTANCE OF AND AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT FOR AND ON BEHALF OF THE CUSTOMER. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT, THEN DO NOT USE THE PRODUCT AND RETURN IT TO THE PLACE OF PURCHASE WITH PROOF OF PURCHASE WITHIN THIRTY (30) DAYS OF PURCHASE FOR A REFUND. IF YOU DO PROCEED TO INSTALL OR USE THE SONICWALL PRODUCT, YOU WILL HAVE INDICATED ACCEPTANCE AND AGREEMENT WITH THE TERMS AND CONDITIONS HEREIN. NOTWITHSTANDING THE FOREGOING, THIS AGREEMENT SHALL NOT SUPERSEDE ANY OTHER SIGNED AGREEMENT BETWEEN YOU AND SONICWALL THAT EXPRESSLY GOVERNS USE OF THE SONICWALL PRODUCT. IN INSTANCES WHERE YOU PURCHASE THROUGH A RESELLER OR DISTRIBUTOR, FINAL PRICES AND TERMS AND CONDITIONS OF SALE, INCLUDING WITHOUT LIMITATION ANY TERMS REGARDING PAYMENT OR RETURNS, WILL BE AS AGREED BETWEEN YOU AND THE THIRD PARTY FROM WHICH YOU MAKE SUCH PURCHASES; HOWEVER, THE TERMS SET FORTH HEREIN REGARDING YOUR USE OF THE SOFTWARE REMAIN APPLICABLE.

“Product” means the SonicWall labeled hardware and related documentation (“Hardware”) and/or proprietary SonicWall labeled software, firmware and related documentation (“Software”) purchased by you (“Customer” or “you”) either directly from SonicWall or a Reseller. “Services” means the Support Services described below and any other services provided with or for the Products directly by SonicWall or its agents. “Reseller” shall mean those entities to which SonicWall or SonicWall’s authorized distributors distribute the Products for resale to end users. Except as otherwise agreed upon by the parties, this Agreement will also cover any updates and upgrades to the Products provided to Customer by SonicWall directly or through a Reseller (except as might be otherwise indicated, such updates and upgrades shall be deemed Products).

1
LICENSE(S) AND RESTRICTIONS
a
Licenses—Subject to the terms and conditions of this Agreement, SonicWall grants to Customer, and Customer accepts from SonicWall, a nonexclusive, non-transferable (except as otherwise set forth herein) and non-sublicensable license (“License”) to: (i) execute and use the Software on the Hardware with which the Software is provided (pre-installed) in accordance with the applicable Documentation; and, (ii) for Software provided in standalone form (without Hardware), install, execute and use the Software on the Hardware or hardware device(s) on which it is intended to be used in accordance with the applicable Documentation and the License purchased. If Customer purchased multiple copies of standalone Software, Customer’s License to such standalone Software includes the right to install, use and execute up to the number of copies of Software Licenses purchased.

In addition, the License includes the right to (x) make a reasonable number of additional copies of the Software to be used solely for non-productive archival purposes, and (y) make and use copies of the end user documentation for Hardware and/or Software provided with the Products (“Documentation”) as reasonably necessary to support Customer’s authorized users in their use of the Products.

b
License Limitations—Order acknowledgments, Documentation and/or the particular type of the Products/Licenses purchased by Customer might specify limits on Customer’s use of the Software, and which limits apply to the License(s) granted hereunder for such Software. Such limits might consist of limiting the number of copies of the Software, the term of the License, or the number or amount of nodes, storage space, sessions, calls, users, subscribers, clusters, devices, ports, bandwidth, throughput or other elements, and/or require the purchase of separate Licenses to use or obtain particular features, functionalities, services, applications or other items. Use of the Software shall be subject to all such limitations.
c
For Customer’s Internal Business—Each License shall be used by Customer solely to manage its own internal business operations as well as the business operations of its Affiliates. Notwithstanding the foregoing, if Customer is in the regular business of providing firewall, VPN or security management for a fee to entities that are not its Affiliates (“MSP Customers”), Customer may use the Products for its MSP Customers provided that either (i) Customer, and not MSP Customers, maintain control and possession of the Products, and (ii) MSP Customers do not use the Software. If MSP Customers have possession and/or control of Products in whole or in part, this Agreement must be provided to MSP Customers and they must agree that their use of the Products is subject to the terms and conditions of this Agreement. Customer will not provide, make available to, or permit use of the Software in whole or in part by, any third party, including MSP Customers and contractors, without SonicWall's prior written consent, unless such use by the third party is solely on Customer’s behalf, is strictly in compliance with the terms and conditions of this Agreement, and Customer is liable for any breach of this Agreement by such third party. Customer agrees to indemnify and hold SonicWall harmless from and against any claims by MSP Customers against SonicWall relating to the Products and/or Customer’s services for MSP Customers. “Affiliate” means any legal entity controlled by a party to this Agreement, but only for so long as such control relationship exists.
d
Evaluation License—If the Software is provided by SonicWall or a Reseller at no charge for evaluation purposes, then Section 1(a) above shall not apply to such Software and instead Customer is granted a non-production License to use such Software and the associated documentation solely for Customer’s own internal evaluation purposes for an evaluation period of up to thirty (30) days from the date of delivery of the Software, plus any extensions granted by SonicWall in writing (the “Evaluation Period”). There is no fee for Customer’s use of the Software for nonproduction evaluation purposes during the Evaluation Period, however, Customer is responsible for any applicable shipping charges or taxes which may be incurred, and any fees which may be associated with usage beyond the scope permitted herein. NOTWITHSTANDING ANYTHING OTHERWISE SET FORTH IN THIS AGREEMENT, CUSTOMER UNDERSTANDS AND AGREES THAT EVALUATION SOFTWARE IS PROVIDED “AS IS” AND THAT SONICWALL DOES NOT PROVIDE A WARRANTY OR MAINTENANCE SERVICES FOR EVALUATION LICENSES, AND SONICWALL BEARS NO LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, SPECIAL OR CONSEQUENTIAL DAMAGES RESULTING FROM USE (OR ATTEMPTED USE) OF THE EVALUATION SOFTWARE THROUGH AND AFTER THE EVALUATION PERIOD AND HAS NO DUTY TO PROVIDE SUPPORT TO CUSTOMER.
e
Restrictions—Customer may not (i) modify, translate, localize, adapt, rent, lease, loan, create or prepare derivative works of, or create a patent based on the Software or any part thereof, (ii) make copies except as expressly authorized under this Agreement, (iii) copy the Software onto any public or distributed network, (iv) modify or resell the Software, use the Software in connection with the operation of any nuclear facilities, or use for purposes which are competitive to SonicWall, or (v) except as expressly authorized in Section 2(c) above, operate the Software for use in any time-sharing, outsourcing, service bureau or application service provider type environment. Unless and except to the extent authorized in the applicable Documentation, Software provided with and/or as the Product, in part or whole, is licensed for use only in accordance with the Documentation as part of the Product, and Software components making up a Product may not be separated from, nor used on a separate or standalone basis from the Product. Each permitted copy of the Software and Documentation made by Customer hereunder must contain all titles, trademarks, copyrights and restricted rights notices as in the original. Customer understands and agrees that the Products may work in conjunction with third party products and Customer agrees to be responsible for ensuring that it is properly licensed to use such third party products. Any Software provided in object code form is licensed hereunder only in object code form. Except to the extent allowed by applicable law if located in the European Union, and then only with prior written notice to SonicWall, Customer shall not disassemble, decompile or reverse engineer the Software in whole or in part or authorize others to do so. Customer agrees not to use the Software to perform comparisons or other “benchmarking” activities, either alone or in connection with any other software or service, without SonicWall’s written permission; or publish any such performance information or comparisons.
f
Third Party Software—There may be certain third party owned software provided along with, or incorporated within, the Products (“Third Party Software”). Except as set forth below, such Third Party Software shall be considered Software governed by the terms and conditions of this Agreement. However, some Products may contain other Third Party Software that is provided with a separate license agreement, in which case such Third Party Software will be governed exclusively by such separate license agreement (“Third Party License”) and not this Agreement. Any such Third Party Software that is governed by a Third Party License, and not this Agreement, will be identified on the applicable Product page on SonicWall’s website and/or in a file provided with the Product. Except as SonicWall may otherwise inform Customer in writing, the Third Party License gives Customer at least the license rights granted above, and may provide additional license rights as to the Third Party Software, but only with respect to the particular Third Party Software to which the Third Party License applies. SUCH THIRD PARTY SOFTWARE UNDER A THIRD PARTY LICENSE IS PROVIDED WITHOUT ANY WARRANTY FROM SONICWALL AND ITS SUPPLIERS, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. Notwithstanding the foregoing, SonicWall shall honor its warranty, maintenance and support obligations in respect to the SonicWall Products regardless of whether the warranty, maintenance or support issue is caused in whole or in part by the Third Party Software provided by SonicWall with the Product.
g
Updates/Upgrades—If Customer purchases or otherwise is eligible to receive a Software update or upgrade, you must be properly licensed to use the Product identified by SonicWall as being eligible for the update/upgrade in order to install and use the Software update/upgrade. A Software update/ upgrade replaces and/or supplements the Software Product that formed the basis for your eligibility for the update/upgrade, and does not provide you an additional License (copy) of the Software to use separately from the Software Product to be updated/upgraded. You may use the resulting updated/upgraded Product only in accordance with the terms of this Agreement.
h
Activation Keys May Expire—Certain Products, including Security Services that provide regular ongoing updates for Software (e.g., Security Service consisting of anti-virus signature updates), may come with an activation key or license key (a key that must be entered to activate the Product, “Activation Key”). If the Activation Key for a Product is not activated within five (5) years from the date of issuance by SonicWall, such Activation Key(s) may expire and no longer activate the Product. Products that come with an expiring Activation Key will operate for the contracted term of the License (or purchased Security Service), so long as the Activation Key is activated within five (5) years from SonicWall’s date of issuance.
2
OWNERSHIP

SonicWall and its licensors are the sole and exclusive owners of the Software, and all underlying intellectual property rights in the Hardware. All rights not expressly granted to Customer are reserved by SonicWall and its licensors.

3
TERMINATION OF LICENSE(S)

All licenses to the Software hereunder shall terminate if Customer fails to comply with any of the provisions of this Agreement and does not remedy such breach within thirty (30) days after receiving written notice from SonicWall. Customer agrees upon termination to immediately cease using the Software and to destroy all copies of the Software which may have been provided or created hereunder.

4
SUPPORT SERVICES

SonicWall’s current Support Service offerings (“Support Services”) and the terms and conditions applicable to such Support Services are set forth in SonicWall’s Support Services Terms located http://www.sonicwall.com/us/support/Services.html and are incorporated herein by reference. Support Services may require an additional fee. Unless otherwise agreed to in writing, SonicWall’s Support Services are subject to SonicWall’s Support Services Terms which are in effect at the time the Support Services are purchased by Customer, and these terms and conditions will be incorporated herein by reference at that time. SonicWall reserves the right to change the Support Services Terms from time to time by posting such changes on its website, which shall apply to any Support Services purchased on or after the date of such posting.

5
SONICWALL WARRANTY
a
Warranty—SonicWall warrants to Customer (original purchaser Customer only) that for the applicable warranty period (“Warranty Period”) the Hardware will be free from any material defects in materials or workmanship and the Software, if any, will substantially conform to the Documentation applicable to the Software and the License purchased (“Limited Warranty”). Except as may indicated otherwise in writing by SonicWall, the Warranty Period for Hardware is one year from the date of registration of the Hardware Product (or if sooner, seven days after initial delivery of the Hardware Product to Customer), and the applicable warranty period for Software is ninety days from the date of registration of the Software Product (or if sooner, seven days after initial delivery/download) of the Software Product to/by Customer. SonicWall does not warrant that use of the Product(s) will be uninterrupted or error free nor that SonicWall will correct all errors. The Limited Warranty shall not apply to any non-conformance (i) that SonicWall cannot recreate after exercising commercially reasonable efforts to attempt to do so; (ii) caused by misuse of the Product or by using the Product in a manner that is inconsistent with this Agreement or the Documentation; (iii) arising from the modification of the Products by anyone other than SonicWall; or (iv) caused by any problem or error in third party software or hardware not provided by SonicWall with the Product regardless of whether or not the SonicWall Product is designed to operate with such third party software or hardware. SonicWall's sole obligation and Customer's sole and exclusive remedy under any express or implied warranties hereunder shall be for SonicWall to use commercially reasonable efforts to provide error corrections and/or, if applicable, repair or replace parts in accordance with SonicWall’s Support Services Terms. Customer shall have no rights or remedies under this Limited Warranty unless SonicWall receives Customer’s detailed written warranty claim within the applicable warranty period.
b
Disclaimer—EXCEPT FOR THE EXPRESS WARRANTIES SET FORTH ABOVE, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW SONICWALL HEREBY DISCLAIMS ON BEHALF OF ITSELF, ITS SUPPLIERS, DISTRIBUTORS AND RESELLERS ALL WARRANTIES, EXPRESS, STATUTORY AND IMPLIED, APPLICABLE TO THE PRODUCTS, SERVICES AND/OR THE SUBJECT MATTER OF THIS AGREEMENT, INCLUDING, BUT NOT LIMITED TO, ANY WARRANTY OF MERCHANTABILITY, NON-INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE.
6
LIMITATION OF LIABILITY

The Products are not designed, manufactured, authorized or warranted to be suitable for use in any system where a failure of such system could result in a situation that threatens the safety of human life, including without limitation any such medical, life support, aviation or nuclear applications. Any such use and subsequent liabilities that may arise from such use are totally the responsibility of Customer, and all liability of SonicWall, whether in contract, tort (including without limitation negligence) or otherwise in relation to the same is excluded. Customer shall be responsible for mirroring its data, for backing it up frequently and regularly, and for taking all reasonable precautions to prevent data loss or corruption. SonicWall shall not be responsible for any system downtime, loss or corruption of data or loss of production. NOTWITHSTANDING ANYTHING ELSE IN THIS AGREEMENT OR OTHERWISE, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL SONICWALL, ITS SUPPLIERS, DISTRIBUTORS OR RESELLERS BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, PUNITIVE OR CONSEQUENTIAL DAMAGES, LOST OR CORRUPTED DATA, LOST PROFITS OR SAVINGS, LOSS OF BUSINESS, REPUTATION, GOODWILL OR OTHER ECONOMIC LOSS OR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, ARISING OUT OF OR RELATED TO THIS AGREEMENT, THE PRODUCTS OR THE SERVICES, WHETHER OR NOT BASED ON TORT, CONTRACT, STRICT LIABILITY OR ANY OTHER LEGAL THEORY AND WHETHER OR NOT SONICWALL HAS BEEN ADVISED OR KNEW OF THE POSSIBILITY OF SUCH DAMAGES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, SONICWALL'S MAXIMUM LIABILITY TO CUSTOMER ARISING FROM OR RELATING TO THIS AGREEMENT SHALL BE LIMITED TO THE AMOUNTS RECEIVED BY SONICWALL FOR THE PRODUCTS AND THE SERVICES PURCHASED BY CUSTOMER, PROVIDED THAT WHERE ANY CLAIM AGAINST SONICWALL RELATES TO PARTICULAR PRODUCTS AND/OR SERVICES, SONICWALL'S MAXIMUM LIABILITY SHALL BE LIMITED TO THE AGGREGATE AMOUNT RECEIVED BY SONICWALL IN RESPECT OF THE PRODUCTS AND/OR SERVICES PURCHASED BY CUSTOMER AFFECTED BY THE MATTER GIVING RISE TO THE CLAIM. (FOR MAINTENANCE SERVICES OR A PRODUCT SUBJECT TO RECURRING FEES, THE LIABILITY SHALL NOT EXCEED THE AMOUNT RECEIVED BY SONICWALL FOR SUCH MAINTENANCE SERVICE OR PRODUCT PURCHASED BY CUSTOMER DURING THE TWELVE (12) MONTHS PRECEDING THE CLAIM).

CUSTOMER EXPRESSLY AGREES TO THE ALLOCATION OF LIABILITY SET FORTH IN THIS SECTION, AND ACKNOWLEDGES THAT WITHOUT ITS AGREEMENT TO THESE LIMITATIONS, THE PRICES CHARGED FOR THE PRODUCTS AND SERVICES WOULD BE HIGHER.

7
GOVERNMENT RESTRICTIONS

Customer agrees that the Products provided under this Agreement, which may include technology and encryption, are subject to the customs and export control laws and regulations of the United States, may be rendered or performed either in the U.S., in countries outside the U.S., or outside of the borders of the country in which Customer or Customer’s system is located, and may also be subject to the customs and export laws and regulations of the country in which the Products are rendered or received. Customer agrees to abide by those laws and regulations. Customer agrees that it will not export or re-export the Products without SonicWall's prior written consent, and then only in compliance with all requirements of applicable law, including but not limited to U.S. export control regulations. Customer has the responsibility to obtain any required licenses to export, re-export or import the Products. Customer shall defend, indemnify and hold SonicWall and its suppliers harmless from any claims arising out of Customer’s violation of any export control laws relating to any exporting of the Products. By accepting this Agreement and receiving the Products, Customer confirms that it and its employees and agents who may access the Products are not listed on any governmental export exclusion lists and will not export or re-export the Products to any country embargoed by the U.S. or to any specially denied national (SDN) or denied entity identified by the U.S. Applicable export restrictions and exclusions are available at the official web site of the U.S. Department of Commerce Bureau of Industry and Security (www.bis.doc.gov). For purchase by U.S. governmental entities, the technical data and computer software in the Products are commercial technical data and commercial computer software as subject to FAR Sections 12.211, 12.212, 27.405-3 and DFARS Section 227.7202. The rights to use the Products and the underlying commercial technical data and computer software is limited to those rights customarily provided to the public purchasers as set forth in this Agreement. The Software and accompanying Documentation are deemed to be “commercial computer software” and “commercial computer software documentation,” respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release, performance, display or disclosure of the Software and accompanying Documentation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement.

8
GENERAL
a
Governing Law and Venue—This Agreement shall be governed by and construed in accordance with the laws of the State of California, without giving effect to any conflict of laws principles that would require the application of laws of a different state. The parties agree that neither the United Nations Convention on Contracts for the International Sale of Goods, nor the Uniform Computer Information Transaction Act (UCITA) shall apply to this Agreement, regardless of the states in which the parties do business or are incorporated. Any action seeking enforcement of this Agreement or any provision hereof shall be brought exclusively in the state or federal courts located in the County of Santa Clara, State of California, United States of America. Each party hereby agrees to submit to the jurisdiction of such courts. Notwithstanding the foregoing, SonicWall is entitled to seek immediate injunctive relief in any jurisdiction in the event of any alleged breach of Section 1 and/or to otherwise protect its intellectual property.
b
Assignment—Except as otherwise set forth herein, Customer shall not, in whole or part, assign or transfer any part of this Agreement or any rights hereunder without the prior written consent of SonicWall. Any attempted transfer or assignment by Customer that is not permitted by this Agreement shall be null and void. Any transfer/assignment of a License that is permitted hereunder shall require the assignment/transfer of all copies of the applicable Software along with a copy of this Agreement, the assignee must agree to all terms and conditions of this Agreement as a condition of the assignment/transfer, and the License(s) held by the transferor Customer shall terminate upon any such transfer/assignment.
c
Severability—If any provision of this Agreement shall be held by a court of competent jurisdiction to be contrary to law, such provision will be enforced to the maximum extent permissible and the remaining provisions of this Agreement will remain in full force and effect.
d
Privacy Policy—Customer hereby acknowledges and agrees that SonicWall’s performance of this Agreement may require SonicWall to process or store personal data of Customer, its employees and Affiliates, and to transmit such data within SonicWall or to SonicWall Affiliates, partners and/or agents. Such processing, storage, and transmission may be used for the purpose of enabling SonicWall to perform its obligations under this Agreement, and as described in SonicWall’s Privacy Policy (www.SonicWall.com/us/Privacy_Policy.html, “Privacy Policy”) and may take place in any of the countries in which SonicWall and its Affiliates conduct business. SonicWall reserves the right to change the Privacy Policy from time to time as described in the Privacy Policy.
e
Notices—All notices provided hereunder shall be in writing, delivered personally, or sent by internationally recognized express courier service (e.g., Federal Express), addressed to the legal department of the respective party or to such other address as may be specified in writing by either of the parties to the other in accordance with this Section.
f
Disclosure of Customer Status—SonicWall may include Customer in its listing of customers and, upon written consent by Customer, announce Customer's selection of SonicWall in its marketing communications.
g
Waiver—Performance of any obligation required by a party hereunder may be waived only by a written waiver signed by an authorized representative of the other party, which waiver shall be effective only with respect to the specific obligation described therein. Any waiver or failure to enforce any provision of this Agreement on one occasion will not be deemed a waiver of any other provision or of such provision on any other occasion.
h
Force Majeure—Each party will be excused from performance for any period during which, and to the extent that, it is prevented from performing any obligation or service as a result of causes beyond its reasonable control, and without its fault or negligence, including without limitation, acts of God, strikes, lockouts, riots, acts of war, epidemics, communication line failures, and power failures.
i
Audit—Customer shall maintain accurate records to verify compliance with this Agreement. Upon request by SonicWall, Customer shall furnish (a copy of) such records to SonicWall and certify its compliance with this Agreement.
j
Headings—Headings in this Agreement are for convenience only and do not affect the meaning or interpretation of this Agreement. This Agreement will not be construed either in favor of or against one party or the other, but rather in accordance with its fair meaning. When the term “including” is used in this Agreement it will be construed in each case to mean “including, but not limited to.”
k
Entire Agreement—This Agreement is intended by the parties as a final expression of their agreement with respect to the subject matter hereof and may not be contradicted by evidence of any prior or contemporaneous agreement unless such agreement is signed by both parties. In the absence of such an agreement, this Agreement shall constitute the complete and exclusive statement of the terms and conditions and no extrinsic evidence whatsoever may be introduced in any judicial proceeding that may involve the Agreement. This Agreement represents the complete agreement and understanding of the parties with respect to the subject matter herein. This Agreement may be modified only through a written instrument signed by both parties.

 

SonicWall Support

Technical support is available to customers who have purchased SonicWall products with a valid maintenance contract and to customers who have trial versions.

The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. To access the Support Portal, go to https://support.sonicwall.com.

The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. In addition, the Support Portal provides direct access to product support engineers through an online Service Request system.

The Support Portal enables you to:

View knowledge base articles and technical documentation
Download software
View video tutorials
Collaborate with peers and experts in user forums
Get licensing assistance
Access MySonicWall
Learn about SonicWall professional services
Register for training and certification

To contact SonicWall Support, refer to https://support.sonicwall.com/contact-support.

To view the SonicWall End User Product Agreement (EUPA), see https://www.sonicwall.com/legal/eupa.aspx. Select the language based on your geographic location to see the EUPA that applies to your region.