Ajishlal Community Legend ✭✭✭✭✭
Reactions
Comments
-
@kegg What is the drp code Module ID? KB For the L2B: https://help.sonicwall.com/help/sw/eng/6010/26/2/3/content/Network_Interfaces.030.14.htm#:~:text=L2%20Bridged%20Mode%20is%20ostensibly,it%20is%20functionally%20more%20versatile.
-
@FFour Follow the below video tutorial for the Firewall factory reset.
-
@janvic123 As per your network drawing, All internal LAN switching handling by Firewall & it will make more load in your Firewall when it comes to more clients/subnet/vlans. So I recommend below solution for your scenario. Since you have a L3 Switch from cisco, you can utilize that switch for handling the all internal VLAN…
-
@Jeong Since sonicwall doesn't have PRF feature in 1st or 2nd phase, you must have to configure the Integrity algorithm and the PRF algorithm should be same in cisco ASA, since in IKEv2 (cisco), the hash algorithm is separated into two options, one for the integrity algorithm, and one for the pseudo-random function (PRF).
-
@Jeong Share with us the CISCO configuration and the sonicwall configuration.
-
@sdeyoung , You would have to tag the VLAN ID in the Avaya interface or Avaya connected the Switch interface.
-
@Mr_Brightside You can create additional Trusted zone (LAN2) and assign on of the free interface, Follow the below KB. NB: To allow communication within Zones by creating automatically Access Rules that allow traffic to flow between the interfaces of a Zone instance, select Allow Interface Trust. Otherwise, deselect…
-
@Robert_K1 First you would have to create your schedule then create ACL for blocking the internet service and choose the schedule which you created and apply. For creating the schedule, navigate to System-->Schedule. For creating the ACL, Navigate to Firewall--> Access Rule.
-
@nicolepabon For above mentioned scenario you can do with IP based access not user based, First you would have to assign static IP from wifi segment for the desktops. Then add those desktop IP's into the corresponding VPN user access role for accessing the RDP from outside the office. Either from GVC / SSL VPN you can…
-
@fre Your WiFi device gatway should be 20.0.0.1. For creating the Rule, recommended to create to new zone for the wifi and assign that zone into the X4 interface so easily you can create the NAT & ACL.
-
@ServiceLine @BWC Through SonicWALL API you can enable/Disable the Security service based on ZONE. Follow the below SonicOS 6.5.4 API Reference Guide - SonicWall https://www.sonicwall.com/techdocs/pdf/sonicos-6-5-4-api-reference-guide.pdf
-
@79schultz Follow the below steps to accomplish your goal; Step1: Create address object (IP/MAC) for the computers which you need to block the internet traffic. Step2: Create address object group (For Example: Block-Internet) and add those IP/MAC of the computers. Step3: Create ACL Rule as same as below; NB: Keep this rule…
-
@Ron_DDC Hi, If you want allow PING to DMZ to LAN, You would have to create access rule for allow PING service in between those zone as well as the created rules should be above of the Deny ANY ANY rule.
-
@MostafaAhmed Try to track the APP through the App Flow monitor & if you find, create the appropriate rule. Or create CFS rule as per the domain / URL level.