To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".
its possible. Follow the below steps.
Assume SITE A to SITE B VPN tunnel is UP.
SITE A Firewall Configuration: Create Firewall Access Rule as same as below. ( Create a service group and add the CCTV ports of the Site B NVR)
Once you done the above step, Create NAT Rule as same as below;
I hope above configuration will solve your problem.
No, but good to know. Have you tried using the MSI file rather than the EXE? What firmware version are you running?
As per Sonicwall this is a known bug & Most probably they will not release any patch for the current version since they planned to release the new version Analytics 3.0.
That normally depends on what OS you want to use to host your syslog server. Most *nix OS have either syslog-ng or rsyslog installed. Both can do the job of receiving that syslog feed. HTH
This is possible. I've done it with Gen6, but its been a while. No need to go into the shell, I believe you just have to redistribute static routes using the 'standard' ABR.
Some background here is how SSL VPN client addresses get added to the Sonicwalls routing table (static routes, not in the ARS table). This is different than other vendors (Cisco). Getting OSPF to share SSL VPN client routes between Sonicwalls and Ciscos was a fun time.
I have set this up. You need Azure VPN Gateway and an IPsec tunnel to Azure from on-prem, but other than that it works just like any other AD/LDAP connection. No add-ons needed if you just do basic authentication.
As said above, with SMA you can use SAML and the AADDS & VPN combo shouldn't be needed.
Have you read the thread here: https://community.sonicwall.com/technology-and-support/discussion/696/ssl-vpn-using-ldap-and-azure-ad
and here: https://community.sonicwall.com/technology-and-support/discussion/835/clarifications-on-azure-ad-service-integration-with-sonicwall-firewall
SAML is only supported on SMA devices. LDAP is supported to Azure AD but requires the directory services add-on.
The compatibility table lists modules for which support is dropped - that really is a no-go!
Supporting SFP with 2.5Gb and 5GB only is a deal-braker as basically no fiber modules officially support hat speed.
I have tried many SFP-T modules, inculding the as compatible listed 02-SSC-1874 but so far no luck - NO LINK !!!! I have tried a manifold of different SFP and SFP-T modules costing me 500€+ for the TZ570 and my switches - total waste of my time and money
Why was SFP 10G dropped???????? - for the sake of product segmentation just support 10G Link Speed for SFP and SFP-T and then software limit the throughput to 5G for differentiation from TZ670 - THIS CANNOT BE SO HARD!!!!
Hello Community, have you any experience in how much performance degraded if the Enhanced Security option is enabled?
The above setting is the default value: can this may be dope the performance?
I believe this function is available from with NSM management,