MustafaA SonicWall Employee
Reactions
Comments
-
Hello @Twizz728 . One option I can think of is to create a custom Zone and assigned it a physical or virtual interface, where you can disable the security services on that zone itself. You can have that client on that zone, which essentially the traffic will not go through security inspection. I have to remind that this…
-
Can you test it with the following end points? Those work on a Gen7 firewall. I believe you have typing errors. /reporting/failover-lb/statistics /reporting/failover-lb/status/groups
-
Good question, and I am not sure about the answer. Even when there are pending commits as a result of the API calls, all of them will be purged when another user with admin privilege logs in in config mode.
-
Glad to read that the transition was smooth, @Asif_Iqbal
-
These are the options available on Gen7 firewalls.
-
Hi @Slappeee , I've shared this, which I personally think is a good idea, with our Product Management team, and they will review/evaluate. Thanks for bringing up great ideas and feedback.
-
When the firewall is used in Unified Policy Mode, there is no Access Rule anymore, there is Security Policy.
-
Packets are being forwarded correctly on X2 interface, but we are not receiving any response. You need to do a similar capture on Firewall-B and trace the packet flow.
-
Can you ping from from a host behind Company-A and do packet capture on Company-A's firewall. Filter the traffic based on ICMP and Printer IP.
-
In your Access Rule, use the Zone instead of the X2 as the Destination.
-
Hello @khseo . To have a little better insight, can you please answer the following questions? Have you made any changes on your firewall configuration, prior to this? What firmware is running on the firewall? What is the Logging Level?
-
Why do you have to create a new URL list every year? Do you have duplicates in your list or is it a clean list with ~11k records?
-
My understanding from the comments is that both WAN interfaces are configured as Load Balancing with the Ration option. You are referring to Basic Failover which the priority of the interfaces plays the role.
-
Hi @BOSullivan You can use Packet Monitor tool which can capture packets coming in (ingress) and going out (egress) of the firewall. Let's assume the SSLVPN Server port on the firewall is configured as 4433 and you can set the Destination Port and observe if there is any ingress traffic coming to the firewall. How can I…
-
Hello @jtuckerchug . Please ensure that App Control is enabled on your wireless zone.