MarkD Cybersecurity Overlord ✭✭✭
Reactions
Comments
-
neither your machine will be on the untagged vlan X0 not X0:10 or X0:20
-
possibly that device cannot talk to the SW license manager . The device was End of Support 2020 and registration is academic
-
1 ) create an address object for your Laptop 2) edit the default LAN-LAN access rule Any All X0 Management IP HTTPS Management Allow change the source to that of your laptops address object To add multiple devices ( group the addresses ) and specify the source as the group
-
There is a migration tool within the my SonicWALL portal which can convert an imported configuration from your TZ400, the caveat I've found is getting the FW version on the Gen 7 correct.
-
Only one suggestion seeing a similar problem one with Azure , choose a different renegotiation timeout for P1 and P2 so they don't collide.
-
Integration would be as any other device being placed behind a firewall
-
HTTPS UI management Manage/Appliance/Web management Settings HTTPS Port. here its set 9443 It will then populate the service HTTPS management for you to use as a rule 1.What is 5001 port uses on management port? no Idea are you asking? if this can be used as HTTPS management? 2.Where I can see the details of source,…
-
A Site to Site VPN is the solution
-
Is the traffic actually passing through the firewall from one interface to another or is this on the same subnet.
-
You cannot purchase a certificate for resigning through any CA. You have the option of either the inbuilt 1024 or 2048 Bit SonicWALL signed cert or generating one from your own internal CA and deploying to the clients. I believe the SonicWALL Issued CA is the Same on all devices -
-
enable spanning tree on the switches!
-
session times for what exactly
-
Depending on its use if you assign it the same LAN zone the default zone rules apply. If you assign this as a DMZ you have DMZ-WAN and LAN-DMZ but no DMZ to LAN without specific rules. you can create zones based on Trusted or Public and name them as you require. here's the KB article
-
I deploy with Internal NPS RADIUS server with Azure Extensions for MFA into the tenancy
-
Maybe changing the SQL dynamic port range to a static port? TCP Dynamic Port. Note the port number However unless you have set VPN-LAN rules set - there are none by default setting up a VPN implies trust