August 2, 2017

SonicWALL Hidden Features and Configuration Options

SonicWall Hidden Features and Configuration Options

The hidden HTML page can be found on all TZ, NSA, SOHO and various other SonicWALL models.  When you enter this configuration page, the unit displays the following disclaimer:Warning: these settings are not documented and changing settings here could prevent proper operation of the SonicWall. Only make such changes if instructed by SonicWall technical support.

Access this hidden page by logging into your SonicWALL and manually type the following address "https://<your SonicWALL IP>/diag.html"

The hidden HTML page provides a long list of additional configuration options such as:

  • Download Trace Log
  • ARP related options such as: enable/disable ARP bridging, limit ARPS of non-responsive IPs, only allow ARP entries with unicast addresses
  • Routing and Network Settings such as: enable TCP packet option tagging, enable TCP sequence number randomization, perform SYN validation
  • DNS and DNS proxy settings
  • DHCP settings such as: Enable DHCP server network pre-discovery
  • VoIP settings
  • VPN settings
  • Encryption settings
  • Firewall settings
  • Security service settings
  • Threat API settings that enable or disable threat API filtering
  • DPI-SSL settings
  • High availability settings
  • Network failover and load balancing
  • PPPOE settings
  • Management settings
  • User authentication settings
  • Diagnostics settings
  • Watchdog settings
  • Wireless settings
  • Anti-spam service settings
  • Remote assistance switch to allow Dell remote access
  • WAN acceleration settings
  • GeoIP/Location service settings
  • Flow reporting
  • Log settings
  • IPv6 settings
  • ICMP settings

Latest Posts

February 3, 2022

The Rise of SMS Phishing

After what seems like a lifetime of technology exposure, I still become saddened but not surprised when I hear about someone falling victim to a phishing attack. Most medium to large businesses, if not all, have invested heavily in employee awareness training as a means to improve their cybersecurity posture.

Read More
December 17, 2021

iTecs Enters Into A Partnership With Check Point

iTecs enters into a partnership with Check Point, a leader in enterprise and SMB cybersecurity products and solutions, to provide iTecs clients with efficacious cybersecurity protection. The collaboration between the two parties enables iTecs to deliver the various services and products to clients as a managed service.

Read More
September 8, 2021

How To Protect Crypto Exchange Accounts

Mitigate the chances that your crypto exchange accounts get hacked by following the tips below.‍You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.

Read More

You have questions, we have answers

What can we help you with?