Comments
-
Hi @ferlessleedr If you have a site to site VPN, only networks in the Local/remote networks in the Networks tab will be allowed to communicate. If you have users connecting to the SonicWALL firewall via SSLVPN and need to reach resources across a site to site VPN, their network (SSLVPN IP Range) needs to be included on the…
-
You can check the source and destination IP addresses to get an idea of the traffic flow and start with access rules. Match the zones to those Ip's and check if you have any deny rules. Policy drop usually is access rules. Destination address looks like an internet address, so that should be WAN zone and the source looks…
-
Hi @ferlessleedr You mention a net extender connection - do you have this set up in a hub and spoke way? NX -> Sonicwall Firewall -> Azure So you in the site to site VPN policy with Azure, in the local networks do you have the Net Extender SSLVPN IP Scope address object there as well? and on the remote networks side on…
-
Hi @Johnnyc For these types of issue you would need to contact Sonicwall Support as it seems this is a backend issue potentially. You can contact support at: Contact Support - SonicWall
-
It is set to inform so that's good. The best path here is to test attack thresholds values and find a balance. Unfortunately there is no exception list feature with TCP floods so the only way I can see forward is finding an attack threshold value that would allow that traffic fine. It is odd that its only one client that's…
-
Whats the logging level set in the event logs? If not on inform, change it to inform as it should give more info
-
Hi @JCK If you expand the dropped packet, it should give a drop reason - do you still have the capture to check this?
-
Hi @Marin Are you looking to create a new user to manage and view data/firewalls in analytics?
-
Hi @CEAdmin , When the flood happens from the SaaS platform, you should be able to see in the event logs items specific to the TCP Syn flood - it should give information based on the flood. From there you can adjust the Attack threshold. I can see from the screenshot the firewall suggested value is 10641 - this a rounded…
-
Hi all, If you are experiencing these issues with the latest version of NetExtender , please create a ticket with support and we will collect some information and look into it.
-
Hi @colporteur , As @BWC mentioned, the process is very similar to our current units. Following his comments should help you get the device into safemode (keep on eye on the wrench light to continually blink to know its in safemode) then when you are on the safemode page, you can boot with factory settings. If the above…
-
Hi @Storch That's great to hear. If it happens again even with the latest firmware version, give support a call and we can look into it. I'm glad its working now!
-
@Storch That is odd forsure. Check the statistics to see if the rule is being hit. There should be an auto created rule when you enabled that https over this SA option enabled - can you check if its also there? If it still doesnt work, please create a ticket with support and we will take a deeper look into it. Once…
-
Thanks @BWC We don't have any other reports at this time, but if it does happen again, DM me here or create a new ticket and ask on the ticket to assign it to me (Anthony Arecchi) and we will take a look. Thanks again for bringing this to our attention.
-
Hi @BWC Thank you for notifying us. I am checking with our internal teams and will get back to you. For now, is it only that one case or other cases as well?