MarkD Cybersecurity Overlord ✭✭✭
Reactions
Comments
-
management access rule LAN interface at 10.1.1.200 enable ping under the interface properties creates the rule
-
review you zones "But from what I can tell, there is nothing that stops the X2 port from accessing… or the X0 port from accessing the X2 port" there is zone rules X2 WAN-LAN X0 and LAN X0 to WAN X2
-
What are the best practices for wireless mesh network? | SonicWall
-
If the event is benign you can disable sending this event to the syslog. Device Log Settings Expand VPN/VPN IPSEC/ESP Drop the event ID 533 is populated, turn off the SYSLOG, it will still be logged in the GUI
-
I think you have the use of Zones wrong You talk about X1 and X2 as WAN Zones? and one is connected for wireless ?? X2(or the subnet on it the 192.168.200.0 subnet.. WAN zones connect to the internet i.e it routes all traffic that is no pre-defined by routing rules or interface connectivity. How do zones work in SonicOS? |…
-
IKE UDP 500 is to start a connection, if during P1 negotiation the remote endpoint is behind a NAT device, this will move to UDP 4500. Is the remote endpoint behind a NAT device? Also your logs are from an external syslog collector and may not contain all the information.
-
UDP port 500 is for Internet Key Exchange (IKE) UDP port 4500 is for IPSec NAT-Traversal (NAT-T) ie the endpoint is behind a device performing NAT on the source address
-
No the internal gui under Device/Diagnostic/GEO and Botnet gives less information
-
You wont see the make model of the SFP - it maybe buried somewhere in a techsupport dump but I've never been able to find a reference
-
You can use the botnet lookup to confirm if sonicwall has it in their database A check on the first 146.19.125.15 shows it is. The address is also listed on Abuse IP 146.19.125.15 | TECHNOX INTERNET TEKNOLOJILERI | AbuseIPDB And bl.mailspike.net Mailspike Blacklist Listed sbl.spamhaus.org Spamhaus SBL Listed…
-
double check the Compatility of the module - you could be looking at a failing SFP especially being 10 years old Supported SonicWall and 3rd party SFP and SFP+ modules that can be used with SonicWall NSA series | SonicWall
-
Review your logs
-
If you dont need to see the event in the SIEM disable log inform level events to your for ID 1153 Or restrict access to the SSL vpn end point with geoip blocking you are probably logging attacks.
-
There wont be any ARP or MAC address, but as Arkwright says, can you poll the upstream router via the diagnostic ping and specify the interface
-
I could be wrong, but I would have thought it would be pppoe per vlan not on the physical interface