Ajishlal Community Legend ✭✭✭✭✭
Reactions
Comments
-
@Saravanan @shiprasahu93 dears do you have any updates regarding the subjected issue ?
-
@TKWITS @csukosd Dears for testing purpose I excluded the client from the Capture ATP but the result is same. Executable files are keep failing while downloading. From Client DPI-SSL configuration if we disable the GAV, download will work perfectly.
-
@awolvesf Did you reboot your unit and did the test? I was also faced the same issue and support told me to reboot and check & after the reboot it's worked fine.
-
@csukosd You are right & I tested with some other downloads as well and noticed that DPI-SSL enabled clients cannot able to download any executable files and it's been blocking by DPI-SSL GAV. Tried to download Adobe reader from DPI-SSL enabled client and it got blocked. NB: Tested Unit NSa9250 - SonicOS Enhanced…
-
@nflnetwork291 No you cannot do Internet speed test from GMS.
-
@VictorManzanares Instead giving the entire LAN Subnet access to the client VPN user, create a address object for the particular Server and provide the VPN client access to that Server; For example, Navigate to the Local users & groups-->Select the user-->Edit-->VPN access, add the created server address object.
-
@CValencia Try the below configuration. This i was prepared for another person so may be it will help you. Step-1 Create a Address object Group and add your LAN Subnets & the SSLVPN IP POOL/NW (See the below screen shot) Step-2 Add a Route Policy as same as below example: After apply the above Route Policy the Access rules…
-
@vhduran Follow the below steps and try to configure both end; Sonicwall Configuration: Navigate to the VPN--> Policy--> Edit-->Network; In the local Networks create a address object Group and add the Sonicwall side multiple subnets (if you need to connect those with fortinet. if it's only one subnet, select the Lan…
-
@MikeBMiller Seems its blocking by the either ISP or their modem. Try to login their modem and enable the IPSEC & VPN related ports. If it's not found, do the port forwarding in the modem; open the below listed ports; Port 50 (UDP/ESP) Port 500 (TCP) Port 4500 (TCP)
-
@skunkworks Enable HTTPS Content Filtering & try.. Make sure you enabled the CFS policy for LAN -->WAN
-
@TKWITS Already there is a default rule for HTTPS management & we can prevent the unauthorized access through adding only trusted sources instead of "Source: ANY". @All_Mighty_Ruler " I want to setup DDNS addresses that are the only addresses allowed to connect to my SSLVPN port 4433. Port 4433 should not be open to the…
-
@All_Mighty_Ruler Edit the default WAN-WAN default rule for the SSL VPN and change the SSLVPN port to HTTPS Management. Then create a new WAN-WAN rule for the SSLVPN and select your dyndns enabled wan interface. For example follow as same as below;
-
@TKWITS
-
@Treken Go through the below KB;
-
@tommls Upgrade your Sonic OS to latest general release and observe the cpu usage.