djhurt1

Newbie ✭
Default Avatar

Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

djhurt1 Newbie ✭

About

Username
djhurt1
Joined
Visits
322
Last Active
Roles
Member
Points
32
Badges
6

Badges (6)

2 Year Anniversary5 Likes1 Year Anniversary10 CommentsName DropperFirst Comment

Comments

  • @BWC The option "Auto-generate Access Rules to allow traffic between zones of the same trust level" is the type of thing I'm trying to look out for. I assume that this will create rules that allow traffic to other zones with the same security type?
  • @BWC Thank you. I was just curious why the rule was created since, to myself anyway, it appears to have no obvious purpose.
  • @MitatOnge Yes this is quite common with other "brands" of wireless gear. Additionally, our Sonicwall NSA5600 can show this information.
  • @MitatOnge On station status sub-menu, it gives the quality and signal strength as a percentage. Not actual numbers. It would be a much more clear picture with actual numbers/strength.
  • @MitatOnge I contacted support on this. Turns out this is a potential bug and they are looking into this currently.
  • They both say "regardless" of each other. So which one takes precedence? We shouldn't be trying to put a MAC in both but when that list starts to get large enough, I could see that happening. Is the most restrictive wins situation?
  • Doh! In my ignorance I ignored the fact that the APs(sonicwaves) are acting as the authenticator and not the firewall. Adding the NAT rule obviously allows me to configure a single IP address rather than 20 in my case.
  • A second question regarding this. Since I'm applying the bandwidth object to the access rule Guest>WAN. First applying a rule to limit download seems wrong here as quest>WAN implies upload. However applying the BW object to ingress does appear to limite download and applying to egress limits upload. Can someone break down…
  • @TKWITS Thanks for the link. I do have a specific question that might help me understand. I switched to advanced BWM. I set the up/down limits on the WAN interface. Created a BW object with low priority. Applied the object to guest>WAN rule. Since I don't have any other bandwidth objects applied, what am I prioritizing…
  • The previous question was regarding an NSA5600 but when I looked up for a TZ I found the following article which was much more helpful than the 6.5 guide I had. https://www.sonicwall.com/support/knowledge-base/how-can-i-configure-bandwidth-management/170521130013462/
  • @Saravanan This is old I realize but I'm working on a similar project that relates to this question. Fictional scenario is WAN interface of firewall assigned 192.168.0.1. Host network object created that is not assigned to interface 192.168.0.2. ISP gateway ARPs who has 192.168.0.2. The firewall will in fact respond that…
  • @TKWITS Interesting that you said that. In the end I did in fact end up setting a blanket exception for the server. Been trouble free for a couple days now. I guess the word dropped wasn't the best to use. I was hoping the packet monitor would somehow indicate that something was flagged with the packet since it does hit an…
  • Unfortunately after having several eyes look at these it appears these switches just don't do what we were told they could do by the vendor very easily. Management has chosen to keep with the simplicity of Dell managed switches and return the sonicwalls.
    in 12-8 POE Comment by djhurt1 August 2021
  • Unfortunately after having several eyes look at these it appears these switches just don't do what we were told they could do by the vendor very easily. Management has chosen to keep with the simplicity of Dell managed switches and return the sonicwalls.
  • Unfortunately after having several eyes look at these it appears these switches just don't do what we were told they could do by the vendor very easily. Management has chosen to keep with the simplicity of Dell managed switches and return the sonicwalls.