fmadia

Moderator
Avatar

Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

fmadia Moderator

Badges (12)

25 Likes5 Helpfuls3 Year Anniversary5 Answers2 Year Anniversary1 Year AnniversaryFirst Answer5 Likes10 CommentsName DropperFirst CommentPhotogenic

Comments

  • Hi @Doctor_Wizard, Welcome in our community. What you're trying to achieve can be done but I think you may be confusing things there 😊 SonicOS will allow you to configure a DHCP entry with a default GW that is in the same subnet as the IP assigned. In order to allow communications across multiple levels/subnet, you can…
  • @Darshil Best option (and quickest) would be to go to the LDAP server and check if there's an account with the same name as the built-in admin account. In case there is, please delete it.
  • @Darshil based on the above, it looks like LDAP may be enabled and there is an admin account there causing confusion as @shiprasahu93 mentioned. Did you recently enabled LDAP or edited the users there?
  • @Darshil have you also tried the built-in admin via SSH? You should not get access denied with the built-in admin. It's quite weird it redirects, I've seen such issues but usually are related to browser issues. If you tried multiple browsers and it did not resolve it, best way would be to get access via SSH if possible.
  • Hi @Darshil , based on what I see it looks like you're trying to login with a non-admin user. The fact that via SSH it denies the connection and via GUI it will show that message it means that you're using a normal user with non-administration capabilities. Have you modified the users settings by any chance? Do you have…
  • @Darshil Have you tried multiple browsers/laptops? What happens after you type user and password and click Login? What is the firmware version of your firewall (if you remember)? Can you check whether you have access to the CLI via SSH?
  • Hi @pmelchiori, 6.5.4.6 resolves quite a few issues found on 6.5.4.4 and 6.5.4.5. I don't know what issues you faced but my recommendation would be to upgrade to 6.5.4.6 and if the issues persists you can contact our Support to get assistanfe. Just see above about Dell Switches: if you use them, please just wait some day…
  • Hi @Darshil , You should be able to but you have to make sure you disable also the cause that created the rule in the first place. Once you "Enable the ability to remove and fully edit auto-added access rule" and delete the default rule you should check why this was created (for example if it's a VPN rule, the checkbox…
  • @ABarriga I wanted to update this thread to inform you about an issue that seems to be happening with the latest firmware (which introduces support for SonicWall switches) and Dell Switches. If you have Dell Switches, I'd recommend you to hold on to the upgrade.
  • @ABarriga I usually recommend customers with critical environments to wait a few days before upgrading to a new release just so we know more about trending issues but this firmware addresses a lot of other issues so the upgrade should just do good.
  • Hi @ABarriga, the new firmware is supposed to fix quite a few issues found on 6.5.4.5. There are some known issues as you can see from the release notes (http://software.sonicwall.com/Firmware/Documentation/232-005208-00_RevA_SonicOS_6.5.4.6_ReleaseNotes.pdf) So far based on multiple tests, issues regarding DPI-SSL and…
  • @shiprasahu93 I agree, this is an amazing work, well done!
  • @Den, unfortunately we should take a look at the configuration to confirm whether the firewall setup is correct or not and if you need additional features. Best way at this point would be to contact support for a deep investigation.
  • @Den If the traffic was going from DC to LAN, it should have been blocked anyway because before leaving the firewall to go into VLAN 124, the Security Services should inspect it anyway. There could be many reasons unfortunately, we can't confirm. But with Capture ATP enabled and security services enabled on each zone you…
  • Hi @Den , I see. Based on the above the traffic goes from X3:V99 to X3:V124 (DC -> LAN) and it should be inspected by the firewall (of course the first host that got infected either downloaded something from internet or the virus was on that machine somehow). First thing I'd check is that you have the Security Services…