UPDATE: SonicWall has released an online tool that analyzes firewall configuration files and provides targeted remediation guidance. The tool streamlines the process by automatically identifying which services require action, eliminating the need for administrators to follow lengthy conditional checklists.Â
The tool is available at: https://www.sonicwall.com/firewall-config-analysis-tool
Overview
Follow the IF/THEN statements below to determine the recommended steps based on the features enabled on the target firewall.
Configuration Groups (Execute in Order)
GROUP 1: Core Authentication Systems - CRITICAL (DO FIRST)
Execute all items in this group before proceeding to other groups. These form the foundation of all other authentication.
IF Local Users are enabled:
- THEN:Â Reset and update passwords of all Local Users
- Critical: Yes
- Impact:Â Force all local users to set a new strong password
IF Users TOTP (MFA) is enabled:
- THEN:Â Reset TOTP for all users
- Critical: Yes
- Impact:Â Users must re-bind authenticator apps
IF Users with LDAP (and/or RADIUS/TACACS+) Authentication enabled:
- THEN:
- Update the bind account password in LDAP
- Update LDAP server entry in SonicOS
- External Updates:Â LDAP server password
- Critical:Â Yes, if primary auth
- Impact:Â Update LDAP (and/or RADIUS/TACACS+) shared secret on server and SonicOS
GROUP 2: VPN & Remote Access Infrastructure - CRITICAL
Execute after Group 1 completion. Coordinate timing with remote endpoints.
IF IPSec VPN is enabled:
- THEN:
- Update shared secret in all IPSec site-to-site configurations
- Update GroupVPN policies
- External Updates:Â Remote IPSec Gateways/Peer VPN endpoints
- Critical:Â Yes
- Impact:Â Replace all pre-shared keys; coordinate with remote endpoints
IF L2TP/PPPoE/PPTP WAN interfaces enabled:
- THEN:Â Update passwords for any L2TP/PPPoE/PPTP WAN interfaces
- External Updates:Â ISP account passwords
- Critical:Â Yes
- Impact:Â Should be done in coordination with ISP account change
IF SSLVPN is enabled:
- THEN:Â Reset password in all SSLVPN Bookmarks
- Critical:Â No
- Impact: Reset password associated with each SSLVPN Bookmark

GROUP 3: Cloud & External Integrations - HIGH PRIORITY
Can be executed in parallel after Groups 1-2. Coordinate with external vendors.
IF AWSAPI integration enabled:
- THEN:Â Update AWS keys used for Logging and VPN integration
- External Updates:Â AWS Console - Generate new IAM access keys
- Critical:Â Yes
- Impact:Â Update in SonicWall settings
IF DDNS is enabled:
- THEN:
- Reset Dynamic DNS provider account password on provider website
- Update DDNS entry in SonicOS
- External Updates:Â DDNS provider(s)
- Critical:Â No
- Impact:Â Update password at provider website and in firewall
IF Clearpass NAC enabled:
- THEN:Â Reset passwords to Network Access Control (NAC) Clearpass servers
- External Updates:Â NAC server(s)
- Critical:Â No
- Impact:Â Should be done in coordination with NAC server change
IF SNMP monitoring enabled:
- THEN:Â Update password for any SNMPv3 user entries
- External Updates:Â SNMP monitoring host(s)
- Critical:Â No
- Impact:Â Reset credentials to maintain monitoring security
IF WWAN backup enabled:
- THEN:Â Update passwords used for cellular WWAN connections
- External Updates:Â ISP(s) cellular accounts
- Critical:Â No unless primary
- Impact:Â Refresh credentials for backup connections

GROUP 4: Email & Reporting Services - MEDIUM PRIORITY
Independent group - can be executed in parallel with other medium/low priority groups.
IF Email Logs enabled:
- THEN:Â Reset password to email accounts used for Log Automation
- External Updates:Â Email provider
- Critical:Â No
- Impact:Â Update credentials for log/alert forwarding and OTP emails
IF FTP/Web Passwords configured:
- THEN:Â Reset password to any FTP/HTTPS servers used for:
- Log automation
- Packet Monitor
- Settings and TSR scheduled reports
- Dynamic External Address Objects/Groups
- Dynamic Botnet List Server
- External Updates:Â FTP/HTTPS server(s) with listed features of SonicOS
- Critical:Â No
- Impact:Â Reset credentials for automated tasks and reports
IF AppFlow reporting enabled:
- THEN:Â Reset password for SMTP/POP email account used for AppFlow SFR reports
- External Updates:Â Email provider
- Critical:Â No
- Impact:Â Update credentials for SFR email reporting
GROUP 5: Wireless Infrastructure - MEDIUM PRIORITY
All wireless components grouped together. Coordinate timing to minimize wireless outages.
IF Wireless is enabled:
- THEN:Â Update shared keys for Internal Wireless interface, Access Points & Profiles, and Virtual Access Points & Profiles
- External Updates:Â None (but coordinate with wireless clients)
- Critical:Â No
- Impact:Â Rotate WPA/WPA2/WPA3 passphrases and profile keys
IF SonicPoint/SonicWave L3 SSLVPN Management enabled:
- THEN:Â Reset SonicPoint/SonicWave L3 SSLVPN Management password
- External Updates:Â Managing SSLVPN server
- Critical:Â No
- Impact:Â Update password on SonicPoint/SonicWave and coordinating server
IF SonicPoint/SonicWave Administrator password configured:
- THEN:Â Reset SonicPoint/SonicWave Administrator password
- External Updates:Â None
- Critical:Â No
- Impact:Â Update password to access individual SonicPoint/SonicWave access points
IF SonicPoint/SonicWave Internal Wireless RADIUS enabled:
- THEN:Â Reset SonicPoint/SonicWave Internal Wireless RADIUS server shared secrets for Remote MAC Access Control and WPA/WPA2/WPA3/EAP authentication
- External Updates:Â RADIUS server
- Critical:Â No
- Impact:Â Rotate RADIUS secrets for wireless authentication
IF RADIUS wireless Zone objects enabled:
- THEN:Â Reset RADIUS server shared secrets used on wireless-type Zone objects
- External Updates:Â RADIUS clients and LDAP password on LDAP server
- Critical:Â No
- Impact:Â Rotate RADIUS secrets and LDAP Identity password

GROUP 6: User Services & SSO - LOW PRIORITY
Independent group focused on user experience features. Can be done last.
IF Guest Services enabled:
- THEN:Â Reset shared secret used by Guest Services External Guest Authentication feature
- External Updates:Â Web server for Message Authentication
- Critical:Â No
- Impact:Â Rotate secrets for guest authentication services
IF SSO enabled:
- THEN:Â Reset shared secrets used by SSO features:
- SSO Agent
- Terminal Services Agent (TSA)
- SSO RADIUS Accounting clients
- 3rd Party SSO API
- External Updates:Â Each SSO/TSA server, RA client, and 3rd party SSO API client
- Critical:Â No
- Impact:Â Update secrets across all SSO components
IF Accounting enabled:
- THEN:Â Reset RADIUS/TACACS+ shared secrets used for Accounting server entries
- External Updates:Â RADIUS/TACACS+ server(s)
- Critical:Â No
- Impact:Â Update authentication secrets for accounting servers

GROUP 7: Infrastructure & Legacy Systems - LOW PRIORITY
Miscellaneous infrastructure components. Execute last or in parallel with other low-priority groups.
IF NTP custom servers enabled:
- THEN:Â Reset password for any custom NTP servers
- External Updates:Â NTP server(s)
- Critical:Â No
- Impact:Â Update authentication credentials for custom NTP servers
IF Signature Proxy enabled:
- THEN:Â Reset password for proxy server used to download signature updates
- External Updates:Â Proxy server
- Critical:Â No
- Impact:Â Rotate password to download SonicWall signature updates
IF Extended Switches managed:
- THEN:Â Reset password for any Dell/SonicWall-integrated external switches managed by firewall
- External Updates:Â None (direct to switches)
- Critical:Â No
- Impact:Â Update management passwords for integrated switches
IF GMS - Legacy enabled:
- THEN:Â Update GMS management encryption keys
- External Updates:Â GMS
- Critical:Â No
- Impact:Â Only applicable when using "IPSec Management Tunnel" for GMS management
IF Routing protocols enabled:
- THEN:Â Update passwords used for routing protocols such as RIP, OSPFv2, and BGP
- External Updates:Â Associated L3 switches, routers, etc.
- Critical:Â No
- Impact: Update passwords associated with any advanced routing configuration

Reference: Complete External Credential Update List
Critical External Systems (Priority 1)
- AWS Console - Generate new IAM access keys
- LDAP Server - Update bind account password
- RADIUS Servers - Update all shared secrets
- TACACS+ Servers - Update authentication secrets
- ISP Accounts - Update L2TP/PPPoE/PPTP passwords
- DDNS Providers - Update account passwords on provider websites
- NAC Servers (Clearpass)Â - Update server passwords
- Email Providers - Update SMTP/POP account passwords
- FTP/HTTPS Servers - Update server passwords for log automation
- NTP Servers - Update custom NTP server passwords
- Proxy Servers - Update passwords for signature downloads
- GMS Management - Update IPSec Management Tunnel encryption keys
- L3 Switches/Routers - Update passwords on associated routing devices
Non-Critical External Systems (Priority 2)
- SNMP Monitoring Hosts - Update SNMPv3 credentials
- Cellular WWAN Providers - Update backup connection credentials
- SSO Web Servers - Update Message Authentication secrets
- AppFlow SFR Email - Update email reporting credentials
- SSLVPN Bookmarks - Update stored passwords
Example Execution Sequence
Phase 1: Pre-Migration
- Document all current configurations
- Identify all external systems requiring updates
- Schedule maintenance window
- Notify affected users and stakeholders
- Prepare rollback plan
Phase 2: Critical Foundation
Execute GROUP 1: Core Authentication Systems
- Local Users password reset
- TOTP/MFA re-enrollment
- LDAP authentication updates
- RADIUS/TACACS+ authentication updates
Phase 3: Critical Infrastructure
Execute GROUP 2: VPN & Remote Access Infrastructure
- IPSec VPN pre-shared key replacement
- ISP WAN interface credential updates
- SSLVPN bookmark updates
Phase 4: External Systems
Execute GROUP 3: Cloud & External Integrations
- AWS Console IAM key rotation
- DDNS provider account updates
- NAC server password changes
- SNMP monitoring credentials
- WWAN backup credentials
Phase 5: Services & Infrastructure
Execute in parallel:
- GROUP 4:Â Email & Reporting Services
- GROUP 5:Â Wireless Infrastructure
- GROUP 6:Â User Services & SSO
- GROUP 7: Infrastructure & Legacy Systems
Phase 6: Verification & Testing
- Test all authentication flows
- Verify VPN connectivity (both site-to-site and client)
- Confirm monitoring system functionality
- Validate wireless access
- Test guest services
- Verify email alerts and reporting
- Document all changes in secure location
Phase 7: Post-Migration
- Monitor for authentication failures
- Address any user access issues
- Update documentation
- Secure credential storage
- Schedule follow-up review