SonicWALL PCI Implementation Guide For SonicOS Enhanced
SonicWALL PCI Implementation Guide For SonicOS Enhanced
SonicWALL PCI Implementation Guide For SonicOS Enhanced
1 Implementation Guide
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Firewall menu, and select the Access Rules item.
3. Click the Configure icon that corresponds to the zone to be configured, or check All Rules to see a
list of existing rules for all zones. In this example, we are viewing access rules for traffic from the
WAN to the LAN. The following screen will appear:
4. To edit an existing rule, click on the Configure icon next to that rule or click the Add button to add a
new rule. The following window will appear:
5. Configure rule settings. For example, to block all traffic from the Internet, check Deny and select
Any from the Service drop down menu. Select Source, Destination and Schedule from the drop
down menus as shown below and click the OK button.
6. The new rule will appear in the Access Rules list as seen below.
PCI DSS Requirement 1.1.4
Establish firewall configuration standards that include: Description of groups, roles, and responsibilities for
logical management of network components.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the User menu, and select the Local Users item.
3. Click the Add User button. The following window will appear:
4. Assign a username and password for the new user.
5. Select the User menu, and select the Local Groups item.
6. To add a new group, click the Add Group button. To configure an existing group, click its
Configure icon to the right of that group. The following window will appear:
7. Click the Members tab.
8. Select the members or groups that will belong to this group and click the right arrow button (->).
9. Click the VPN Access tab.
10. Select the networks to which users within this group will be able to access through their VPN client
software and click the right arrow button (->).
11. Click the CFS Policy tab.
12. Select a CFS policy to apply to the group in the Policy drop-down menu.
13. Click the OK button to save settings.
PCI DSS Requirement 1.1.6
Establish firewall configuration standards that include: Justification and documentation for any available
protocols besides hypertext transfer protocol (HTTP), and secure sockets layer (SSL), secure shell (SSH),
and virtual private network (VPN).
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Firewall menu, and select the Access Rules item.
3. Click the Configure icon that corresponds to the zone to be configured, or check All Rules to see a
list of existing rules for all zones. In this example, we are viewing access rules for traffic from the
WAN to the LAN. The following screen will appear:
4. To edit an existing rule, click on the Configure icon next to that rule or click the Add button to add a
new rule. The following window will appear:
5. Select a service to be allowed or denied from the Service drop-down menu. For example, to allow
the BearShare service, select it from the drop down menu. Complete the remaining fields for this
rule such as Source, Destination, and Users Allowed using the drop down menus and click the OK
button. Note that any available protocols besides hypertext transfer protocol (HTTP), and secure
sockets layer (SSL), secure shell (SSH), and virtual private network (VPN) must be justified and
documented.
6. The new rule will appear in the Access Rules list as seen below.
PCI DSS Requirement 1.2
Build a firewall configuration that denies all traffic from “untrusted” networks and hosts, except for protocols
necessary for the cardholder data environment.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Firewall menu, and select the Access Rules item.
3. Click the Configure icon that corresponds to the zone to be configured, or check All Rules to see a
list of existing rules for all zones. In this example, we are viewing access rules for traffic from the
WAN to the LAN. The following screen will appear:
4. To edit an existing rule, click on the Configure icon next to that rule or click the Add button to add a
new rule. The following window will appear:
5. Establish rules which deny all traffic from “untrusted” networks and hosts. For example, to block all
traffic from the Internet, check Deny and select Any from the Service drop down menu. Select
Source, Destination and Schedule from the drop down menus as shown below and click the OK
button.
6. The new rule will appear in the Access Rules list as seen below.
Comments
SonicWALL's default policy on its security devices is to have a "denial-all" policy to everything internal to the
network.
PCI DSS Requirement 1.3.1
Build a firewall configuration that restricts connections between publicly accessible servers and any system
component storing cardholder data, including any connections from wireless networks. This firewall
configuration should include the following: Restricting inbound Internet traffic to Internet protocol (IP)
addresses within the DMZ (ingress filters).
Implementation Procedure
N/A
Comments
The SonicOS Enhanced default configuration restricts inbound Internet traffic to IP addresses within the
DMZ.
Implementation Procedure
N/A
Comments
The SonicOS Enhanced default configuration does not allow internal addresses to pass from the Internet
into the DMZ.
Implementation Procedure
N/A
Comments
This is default behavior of the SonicWALL Stateful Packet Inspection (SPI) engine.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice. Installing SonicWALL the GMS
Database on the trusted side of the network apart from the DMZ is mandatory as part of a comprehensive
managed PCI solution. Refer to the configuration outlines of SonicWALL GMS on how to establish single-
server or distributed server deployments alongside a GMS Database.
PCI DSS Requirement 1.3.5
Build a firewall configuration that restricts connections between publicly accessible servers and any system
component storing cardholder data, including any connections from wireless networks. This firewall
configuration should include the following: Restricting inbound and outbound traffic to that which is
necessary for the cardholder data environment.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Firewall menu, and select the Access Rules item.
3. Click the Configure icon that corresponds to the zone to be configured, or check All Rules to see a
list of existing rules for all zones. In this example, we are viewing access rules for traffic from the
LAN to the WAN. The following screen will appear:
4. To edit an existing rule, click on the Configure icon next to that rule or click the Add button to add a
new rule. The following window will appear. In this example, all traffic between the LAN and WAN
is denied by default.
5. Establish rules which restrict inbound and outbound traffic to that which is necessary for the
cardholder data environment. First, you must disable the default “ANY” rule as shown below by
unselecting the Enable checkbox.
For example, to allow outbound HTTPS traffic, check Allow and select HTTPS from the Services
drop down menu. Select the Source, Destination, Users Allowed, and Schedule from the drop
down menus as shown below and click the OK button.
6. The new rule will appear in the Access Rules list as seen below.
PCI DSS Requirement 1.3.6
Build a firewall configuration that restricts connections between publicly accessible servers and any system
component storing cardholder data, including any connections from wireless networks. This firewall
configuration should include the following: Securing and synchronizing router configuration files. For
example, running configuration files (for normal functioning of the routers), and start-up configuration files
(when machines are re-booted) should have the same secure configuration.
Implementation Procedure
N/A
Comments
SonicWALL units only keep a single previous configuration file on the native device. Authenticated access
is required for viewing, manipulation or exportation.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Firewall menu, and select the Access Rules item.
3. Click the Configure icon that corresponds to the zone to be configured, or check All Rules to see a
list of existing rules for all zones. In this example, we are viewing access rules for traffic from the
WAN to the LAN. The following screen will appear showing the “default deny” rule setting for
network traffic between the WAN and the LAN. You must add specific rules for any network traffic
to traverse from the WAN to the LAN network segment.
PCI DSS Requirement 1.3.8
Build a firewall configuration that restricts connections between publicly accessible servers and any system
component storing cardholder data, including any connections from wireless networks. This firewall
configuration should include the following: Installing perimeter firewalls between any wireless networks and
the cardholder data environment, and configuring these firewalls to deny any traffic from the wireless
environment or controlling any traffic (if such traffic is necessary for business purposes).
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Firewall menu, and select the Access Rules item. For this example we have created a
DMZ Zone network, under the OPT network name, where our e-commerce web servers would
typically be located.
3. Click the Configure icon that corresponds to the zone to be configured, or check All Rules to see a
list of existing rules for all zones. In this example, we are viewing access rules for traffic from the
DMZ to the LAN. The following screen will appear:
4. To edit an existing rule, click on the Configure icon next to that rule or click the Add button to add a
new rule. The following window will appear:
5. The default rule denies any traffic from the DMZ network to the LAN network. Rules that will control
network traffic between the DMZ and LAN can be added (if such network traffic is necessary for
business purposes such as remote management). For example, to allow only SSH traffic into the
cardholder data environment (LAN) from the DMZ network, check Allow and specify allowable
services from the Services drop down menu. Also select the Source, Destination, Users Allowed,
and Schedule from the drop down menus as shown below and click the OK button.
6. The new rule will appear in the Access Rules list as seen below showing that only SSH traffic from
the web server in the DMZ to a specified IP address is permitted. All other traffic is blocked by the
firewall.
Comments
SonicWALL Administrator Guide should include this as a Best Practice. SonicWALL’s TZ 170W, TZ 180W
and TZ 190W appliances all support the Deep Packet Inspection engine as part of their feature sets. This
allows for the same perimeter and internal-based security technology to be invoked so as to protect both
LAN and WiFi users.
PCI DSS Requirement 1.4
Prohibit direct public access between external networks and any system component that stores cardholder
data (for example, databases, logs, trace files).
Implementation Procedure
N/A
Comments
SonicWALL firewalls, properly configured, can prohibit direct public access between external networks and
any system component that stores cardholder data (for example, databases, logs, trace files).
Implementation Procedure
N/A
Comments
The SonicOS Enhanced default configuration has a "denial-all" rule from the WAN interface to everything
internal to the network.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Firewall menu, and select the Access Rules item.
3. Click the Configure icon that corresponds to the zone to be configured, or check All Rules to see a
list of existing rules for all zones. In this example, we are viewing access rules for traffic from the
LAN to the DMZ. The following screen will appear:
4. To edit the existing rule, click on the Configure icon next to that rule or click the Add button to add
a new rule. The following window will appear:
5. Establish rules which restrict outbound traffic from payment card applications to IP addresses
within the DMZ. For example, to deny all outbound traffic to addresses within the DMZ, check
Deny and click the OK button. Use the Add button to setup specific rules between hosts on the
LAN and hosts in the DMZ.
6. The new “default deny” rule will appear in the Access Rules list as seen below.
PCI DSS Requirement 1.5
Implement IP masquerading to prevent internal addresses from being translated and revealed on the
Internet. Use technologies that implement RFC 1918 address space, such as port address translation (PAT)
or network address translation (NAT).
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Network menu, and select the NAT Policies item. By default, SonicOS provides the
following NAT policies.
3. To edit an existing policy, click its Configure icon. To add a new policy, click Add NAT Policy.
The following window will appear:
4. Configure the NAT policy and check Enable NAT Policy.
5. Click the OK button.
PCI DSS Requirement 2.1
Always change vendor-supplied defaults before installing a system on the network (for example, include
passwords, simple network management protocol (SNMP) community strings, and elimination of
unnecessary accounts).
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the System menu, and select the Administration item.
3. In the Administrator Name & Password section, assign a password that conforms to PCI DSS
password standards.
6. Enter SNMP settings and click the OK button. Note that the Community Name should not be
defaults like Public or Private.
7. Once back at the System > Administration screen, click the Apply button.
8. Select the Users menu, and select the Guest Accounts item.
9. Ensure that the Enable box was not inadvertently checked by another administrator and click the
Apply button.
PCI DSS Requirement 2.1.1
For wireless environments, change wireless vendor defaults, including but not limited to, wired equivalent
privacy (WEP) keys, default service set identifier (SSID), passwords, and SNMP community strings. Disable
SSID broadcasts. Enable WiFi protected access (WPA and WPA2) technology for encryption and
authentication when WPA-capable.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
Implementation Procedure
SonicWALL firewalls must be configured to meet PCI Data Security Standards.
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
PCI DSS Requirement 2.3
Encrypt all non-console administrative access. Use technologies such as SSH, VPN, or SSL/TLS (transport
layer security) for web-based management and other non-console administrative access.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Network menu, and select the Interfaces item.
3. Select the Configure item for each network interface to see the screen below.
4. Select only HTTPS, and SSH as shown below and click the OK.
PCI DSS Requirement 4.1
Use strong cryptography and security protocols such as secure sockets layer (SSL)/transport layer security
(TLS) and internet protocol security (IPSEC) to safeguard sensitive cardholder data during transmission over
open, public networks. Examples of open, public networks that are in scope of the PCI DSS are the
Internet, WiFi (IEEE 802.11x), global system for mobile communications (GSM) and general packet radio
services (GPRS).
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
PCI DSS Requirement 5.1
Deploy anti-virus software on all systems commonly affected by viruses (particularly personal
computers and servers).
Implementation Procedure
1. Select the Security Services menu, and select the Gateway Anti-Virus item.
Comments
Additional controls for AV protection can be implemented through the use of the Client AV Enforcement
features as well. Please refer to the SonicWALL Administrator Guide for information on using this feature as
it is beyond the scope of the guide.
PCI DSS Requirement 5.1.1
Ensure that anti-virus programs are capable of detecting, removing, and protecting against other
forms of malicious software, including spyware and adware.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice. Working in conjunction with your
SonicWALL network security appliance, the Enforced Client guarantees that all endpoints have the latest
versions of anti-virus and anti-spyware software installed and active. Along with SonicWALL's gateway and
server protection, SonicWALL endpoint security keeps your network free from dangerous viruses and
spyware.
SonicWALL, in partnership with McAfee, the leader in business anti-virus solutions, brings you two anti-virus
services to protect every endpoint in your company against the most sophisticated virus threats, dangerous
spyware, and productivity-draining adware.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
Implementation Procedure
Periodically check MySonicWALL.com for security advisories and new firmware availability.
Comments
SonicWALL Administrator Guide should include this as a Best Practice. As a multi-service platform,
SonicWALL’s line of firewall/VPN appliances incorporates the broadest level of protection available through
Unified Threat Management (UTM). UTM combines multiple security features into a single platform,
protecting against attacks, viruses, Trojans, spyware and other malicious threats. Incorporating deep packet
inspection and gateway protection, allows SonicWALL’s UTM appliances to deliver superior performance at
a reasonable price. Unified Threat Management brings you the best of both worlds—reducing complexity
and simplifying management, while delivering multiple layers of protection under a single management
console.
Implementation Procedure
Provided via SonicAlert. SonicWALL security services automatically pushes down updates to security
devices.
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
PCI DSS Requirement 8.1
Identify all users with a unique user name before allowing them to access system components or cardholder
data
.Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the User menu, and select the Local Users item.
3. Click the Add User button. The following window will appear:
4. Assign a username and password for the new user.
5. Click the Groups tab. The following window will appear:
6. Select a user group to which this user will be a member and click the right arrow button (->).
Repeat this step for each group to add.
7. Click the VPN Access tab. The following window will appear:
8. Select a network to which this user will be able to access through the VPN client software and click
the right arrow button (->). Repeat this step for each network to add.
9. Click the OK button.
PCI DSS Requirement 8.2
In addition to assigning a unique ID, employ at least one of the following methods to authenticate all users:
• Password
• Token devices (e.g., SecureID, certificates, or public key)
• Biometrics.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the User menu, and select the Local Users item.
3. Click the Add User button or, for existing users click the Configure icon. The following window will
appear:
4. Assign a username and password for the user and click the OK button.
5. Select the System menu, and select the Certificates item.
6. To import a certificate, click the Import tab. The following window will appear:
7. Complete the Import Certificate form and click the Import button.
8. To obtain a new certificate, click the New Signing Request button. The following window will
appear:
9. Complete the required fields on the Certificate Signing Request and click the Generate button.
10. Click Export. You are prompted to save the file. It will be saved in the PKCS 10 format.
11. Obtain a certificate from one of the approved certificate authorities using the PKCS 10 file. After
you receive the certificate file, locate and import the file by clicking Browse in the Import
Certificate With Private Key section. Then click Import. The certificate will appear in the Current
Local Certificates section.
PCI DSS Requirement 8.4
Encrypt all passwords during transmission and storage on all system components.
Implementation Procedure
N/A
Comments
All passwords will need to be encrypted by SSL/TLS (for management access), the configuration is stored
and encoded on the device and requires administrative authentication for view and export.
Implementation Procedure
N/A
Comments
SonicWALL products do not enforce a user to specify a unique password after the first login. Beginning with
GMS 4.1 and SonicOS 4.0 Enhanced, this feature will be supported.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
PCI DSS Requirement 8.5.8
Do not use group, shared, or generic accounts and passwords.
Implementation Procedure
N/A
Comments
Although this is a best practice, SonicWALL products do not support this feature. If products are used with
GMS 4.1 management only, other SoincWALL products under management would not need to have this
support.
Implementation Procedure
N/A
Comments
Although this is a best practice, SonicWALL products do not support this feature. If products are used with
GMS 4.1 management only, other SonicWALL products under management would not need to have this
support.
Implementation Procedure
N/A
Comments
Although this is a best practice, SonicWALL products do not support this feature. If products are used with
GMS 4.1 management only, other SoincWALL products under management would not need to have this
support.
Implementation Procedure
N/A
Comments
Although this is a best practice, SonicWALL products do not support this feature. If products are used with
GMS 4.1 management only, other SoincWALL products under management would not need to have this
support.
Implementation Procedure
N/A
Comments
Although this is a best practice, SonicWALL products do not support this feature. If products are used with
GMS 4.1 management only, other SoincWALL products under management would not need to have this
support.
PCI DSS Requirement 8.5.13
Limit repeated access attempts by locking out the user ID after not more than six attempts.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the System menu, and select the Administration item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the System menu, and select the Administration item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the System menu, and select the Administration item.
3. Enter a value of ‘15’ or less for Log out Administrator after inactivity of (minutes).
4. Click the Apply button.
5. Select the Users menu, and select the Settings item.
6. Enter a value of ‘15’ or less for Inactivity timeout (minutes).
7. Click the Apply button.
Comments
This control applies only to Administrator accounts.
PCI DSS Requirement 10.1
Establish a process for linking all access to system components (especially access done with administrative
privileges such as root) to each individual user.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the User menu, and select the Local Users item.
3. Click the Add User button. The following window will appear:
4. Assign a username and password for the new user.
5. Click the Groups tab. The following window will appear:
6. Select a user group to which this user will be a member and click the right arrow button (->).
Repeat this step for each group to add.
7. Click the VPN Access tab. The following window will appear:
8. Select a network to which this user will be able to access through the VPN client software and click
the right arrow button (->). Repeat this step for each network to add.
9. Click the OK button.
PCI DSS Requirement 10.2.1
Implement automated audit trails for all system components to reconstruct the following events: All
individual user accesses to cardholder data.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Categories item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Categories item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Categories item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Categories item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Categories item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Categories item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Categories item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Syslog item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Syslog item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Syslog item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Syslog item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Syslog item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Syslog item.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the System menu, and select the Time item.
5. Enter the NTP Server IP(Internet Protocol) address and click OK.
6. Click the Apply button.
PCI DSS Requirement 10.5.1
Secure audit trails so they cannot be altered, including the following: Limit viewing of audit trails to those
with a job-related need.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
Implementation Procedure
N/A
Comments:
This is not a specific feature of SonicOS, but a compensating control is limiting access to the audit trails by
limiting access to the firewall to only specific users and from specific network locations.
PCI DSS Requirement 10.5.3
Secure audit trails so they cannot be altered, including the following: Promptly back-up audit trail files to a
centralized log server or media that is difficult to alter.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Syslog item.
3. Click the Add button in the Server Name section at the bottom of the page. The following window
will appear:
4. Enter the Name or IP Address and Port for the Syslog server.
5. Click the Apply button.
PCI DSS Requirement 10.5.4
Copy logs for wireless networks onto a log server on the internal LAN.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Syslog item.
3. Click the Add button in the Server Name section at the bottom of the page. The following window
will appear:
4. Enter the Name or IP Address and Port for the Syslog server.
5. Click the Apply button.
PCI DSS Requirement 10.5.5
Use file integrity monitoring and change detection software on logs to ensure that existing log data cannot
be changed without generating alerts (although new data being added should not cause an alert).
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
PCI DSS Requirement 10.7
Retain audit trail history for at least one year, with a minimum of three months online availability.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Syslog item.
3. Click the Add button in the Server Name section at the bottom of the page. The following window
will appear:
4. Enter the Name or IP Address and Port for the Syslog server.
5. Click the Apply button.
Comments
SonicWALL firewalls support transferring of all log files to a configured syslog server. Ensure that the syslog
server has enough hard disk size to store GMS server logs for atleast three months online.
PCI DSS Requirement 11.4
Use network intrusion detection systems, host-based intrusion detection systems, and intrusion prevention
systems to monitor all network traffic and alert personnel to suspected compromises. Keep all intrusion
detection and prevention engines up-to-date.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Security Services menu, and select the Intrusion Prevention item.
Comments
Enforce a policy of updating signatures on a regular basis.
PCI DSS Requirement 11.5
Deploy file integrity monitoring software to alert personnel to unauthorized modification of critical system or
content files; and configure the software to perform critical file comparisons at least weekly.
Implementation Procedure
N/A
Comments
SonicWALL Administrator Guide should include this as a Best Practice.
PCI DSS Requirement 12.5.2
Monitor and analyze security alerts and information, and distribute to appropriate personnel.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Automation item.
3. Enter the email address that will be receiving alerts in the Send Alerts to E-mail Address field.
Also enter the IP address and email address of the mail server in the Mail Server Settings section.
4. Click the Apply button.
PCI DSS Requirement 12.5.5
Monitor and control all access to data.
Implementation Procedure
1. Login to the SonicWALL firewall.
2. Select the Log menu, and select the Categories item.
4. Scroll up to the top of the screen and click the Apply button.