Arkwright Community Legend ✭✭✭✭✭
Reactions
Comments
-
If you are pinging continuously something across a tunnel and the Out counters are not incrementing, then the problem is at your end.
-
I just noticed the NAT column is valued in your packet capture. Are you intentionally NATing across this tunnel?
-
SA counters are on Active Tunnels tab, then you have to click on the rectangle-with-horizontal-lines icon to get the stats. This is only any use as a diagnostic if there is no other on the tunnel than the traffic you're interested in, which can be tricky to achieve!
-
You need to get them to do the same as you - do they see your packets in a packet capture at their end? Do the byte counters increment on the SA when you're pinging?
-
Yes. If you enable further advanced options in the capture I think you will be able to see the post-encrypted packets.
-
ICMP is it's own IP Type, it will not be matched by TCP or UDP.
-
IME pinging from the firewall itself is not always reliable. I suggest you start a continuous ping from a client device and look out for that in the capture. You can also check the Connection Monitor for a flow for the same,
-
Packet capture. Do the ping packets arrive at the other side?
-
If there is an HRSP "community" that represents 172.16.10.6 then why do you think you need to use four Sonicwall interfaces for this one network? Forget about X13. Set gateway to 172.16.10.6 on X12. Whichever of FW-A or FW-B is active will route traffic to it. Whichever of 200M router or 10G router is active will handle…
-
Maybe someone else knows better, but like I said, I don't think it's possible. You will probably find it easier to change the interface IP of the firewall than to work around this.
-
NSM [or GMS which I think is EOL now] are the Sonicwall tools for mass-management of firewalls.
-
You don't mention the IKE ID, this defaults to the IP of the interface it's on. Try manually setting it? But I suspect that what you're asking for isn't possible. If you explain why you're trying to do this, we might be able to suggest a better approach.
-
I think I need to add tunnels from each building to every other building. I was just asking if this is the best way to achieve what I am looking for OR if I should be able to get to every building through the main building (right now I can't do this). If you mesh everything together [tunnel from every site to every site]…
-
I wish to connect to one location and have access to all locations for management If you mean managing remote firewalls, the VPN policy will need to have management enabled on it as well.
-
Well.....it would have taken me a long time to find that because it seems like it would be completely unrelated. But on the other hand I don't work for Sonicwall support!

















