MitatOnge All-Knowing Sage ✭✭✭✭
Reactions
Comments
-
can you give more details? what do you ask? This Wireshark syntax is giving reset packet on the wireshark window.
-
@ASIRWA This scneario has a little bit a problem for vpn phase 1. behind the sonciwall1 X1 interface gets local IKE id from FW site ISP router interface ip not SonicWall FW2 interface ip. therefore you have to change manually. please check logs. for X1 vpn logs. My advance for redudancy : you should create tunnel…
-
@DesertSweeper you can do. you should assign second interface as second ip and your ISP route ip from their switch to SonicWall second interface. after designation, you can create bw rules for second interface. KB:…
-
What is your printer protocols? Netbios, WDS, etc... ? if you are trying to connect via netbios. you have to enable netbios service on sslvpn settings. could you check printer properties like below.
-
Layer 2 or layer 3 doesn’t matter, Vlan is an interface that’s way in the scheme first step is the your answer..
-
Hi, You are welcome. last thing; did you check app control enabled under the zone tab?
-
Hi @HSPC_IT Sonicwall will be handle the packets like below diagram. check this out.
-
Hi @jtuckerchug did you check below settings on the firewall: DMZ to WAN Access rules logging checkbox enabled? Check below exclusion list without DMZ interfaces and ip segments. "Firewall / App control / Configure App Control Settings / Enable Application Control Exclusion List"
-
Hi @rpetz82 what is your server OS version? and did you enable netbios on the sslvpn like below screen shot?
-
Hello @Alberto AFAIK; tNetobjMgr is responsible some of the network elements such as "Dynamic Address objects, Safe search actions, etc..." if you can download techsupport report you will see the tnetobjmgr details like below. ---------------------------------- 2021-10-28 13:19:28] -------Google Force Safe Search-------…
-
Hi @itdatabasemgmt Please check below settings. Sslvpn client route tab on the sslvpn client settings and it should be 10.0.0.0/16 networks in the route section. SSLVPN-VPN AND VPN-SSLVPN Access rule should be allowed each other. last thing and most important detail: If client site network ip is : 10.0.0.0 (A class) you…
-
Hi @SWSelf you should disbale auto rule creation. check below link.
-
I agree some of your sentences but management acl should be under one menu. they should put submenu under the Administrative menu and we able to select which interface accessible for management and which ip can access the management interfaces. that is it. think about it; we have hundreds of access rules sometimes…
-
you are welcome. do you use dns security service on the firewall? and what is your firewall firmware version?
-
Hi @bridges You should do double nat configurations. you can find out below link