Ajishlal Community Legend ✭✭✭✭✭
Reactions
Comments
-
@Simon_Weel Exclude those URL/FQDN address object from GAV.
-
@Sujith You can check the product lifecycle from below link;
-
@kennymathews2003 If your all location have fail-over WAN, Go ahead with SD WAN. If all paths are qualified, it will load balance the traffic & when the paths become disqualified die to any drops/glitches, those paths get removed from the pool and it will take right path. SonicOS SD-WAN offers these features:…
-
@headrush, It can be happen if the LPT port is changed. If its same try below steps in the scripts. net use LPT1 /Delete net use LPT1 \\DESTROYER\HP718FC4 /persistent:yes
-
@nqkhoi I hope below KB will help you to resolve.
-
@sachin Follow the below KB for configuring the VPN fail-over.
-
@JSchultz Check your backend ISP router will support 2.5GbE or not. Most probably that router interface is 1GbE thats why SOnicwall WAN interface showing only 1Gig. As well as check the SFP module which you installed in Sonicwall will support 2.5GbE or not.
-
@headrush Glad to hear that it help you to solve the problem. Please mark as answer so it will help other community members.
-
@Drew_Schwedland Yes you can. But you would have Azure VPN Gateway service & IPSec VPN tunnel in-between Azure to your on-prem.
-
@headrush try below. make sure the HP printer is hosted & shared on destroyer (pc name) net use LPT1 \\DESTROYER\HP718FC4 /persistent:yes NB: if netbios name is not resolved use that PC IP.
-
@TeassWarren, Check if you block the CFS profile object "Not Rated".
-
@isaiasants, Follow the below KB for understanding the mentioned error logs;
-
@isaiasants, In order to establish the Ipsec VPN tunnel through 4G modem, You would have to open the following ports from 4G modem to Sonicwall Wan interface; ( Once you open below ports, follow the above KB shared by Mitatonge) 1) IKE (UDP 500): This is the port used for the initial negotiation of the IPsec connection. 2)…
-
@Geraint For resolving the ping issue with secondary unit, Create a static ARP entry for the secondary unit. Navigate to Network-->ARP-->Add-->Static ARP entries. NB: Interface should be your LAN interface. ( You will be get the secondary unit MAC from ARP Cache.)
-
@rupen1505 , For understanding the Sonicwall ZONE, Follow the below KB; I hope this KB will clear your doubts/problems about the zones