BWC Cybersecurity Overlord ✭✭✭
Reactions
Comments
-
@ECP_Pokerhitman this looks broken, indeed. You might raise a ticket for this, first check with a different browser (Firefox preferred) to rule that out. I tested on my TZ 670 running -5119, and it got shown properly LAN Trusted X0, X0:V2, X0:V125 Do you have VLAN 55 assigned anywhere? --Michael@BWC
-
@Enzino78 IMHO they closed by end of 2022. --Michael@BWC
-
@ECP_Pokerhitman what Appliance and Firmware you're running? I checked on a TZ 570 and NSa 2650 and the interfaces were shown properly in the Zones list: LAN. Trusted. X0, X6:V33 About the ping, please check LAN-LAN Access Rules if there is a Ping Management Rule which allows the traffic. I tested the ping on a NSa 2650…
-
@User4456 are you running the latest Firmware? I've seen something like this on <6.5.4.10 if I remember correctly. The Access Rules were still shown and should have allowed the traffic, but it got dropped. Restart fixed it for a while but it was addressed in a later SonicOS release. --Michael@BWC
-
@Arkwright I don't have information how to do proper profiling for SD WAN, but according to the TSR there should be plenty of space left :) SDWAN Max Groups : 2000 (2000) current: 0 SDWAN Max Total Interfaces : 4000 (4000) current: 0 --Michael@BWC
-
@OwaisA when you create a static assignment in the range of a dynamic pool you're greeted with something like this: Error: [10.55.1.226 - 10.55.1.226] overlaps with entry [10.55.1.224 - 10.1.... Same goes for Gen7, you cannot create a static assignment inside a dynamic pool. @jacksreb you might get in touch with your SNWL…
-
@pendek244 sorry for the misleading answer, I totally ignored the artificial limitation (for no reason) to upgrade a NSA 2600 to TZ 670, which is IMHO a great upgrade path. --Michael@BWC
-
@pendek244 it's always a pleasure to see when a titlle of a thread is longer than the message body. You might update the NSA 2600 to 6.5.4.13 first, can't say for sure if it's necessary, but it can't hurt either. --Michael@BWC
-
You have to create the Rules for the VPN Zone, like LAN to VPN or VPN to LAN, VPN to VPN (for Inter-VPN traffic). All Tunnel Interfaces are members of the VPN Zone. --Michael@BWC
-
@Pischta you can go Hub&Spoke or Fully Meshed, all possible with your models. Tunnel Interfaces give you a ton of flexibility. --Michael@BWC
-
@MichaelB the answer could be probably answered only by a SNWL engineer who did some performance tests. But in my logic, Network should be faster than Range, because Network needs only simple AND, OR (or XOR) operations, while Range needs to do some more math (hopefully it's not implemented in string compares ;-)). E.g.…
-
@Simon @tabbit the future is now (2 years later) and NetExtender still does not support TLS 1.3, feels embarrassing and isn't funny anymore. I would like to have my SMAs running in TLS 1.3 mode only, which is OK for MobileConnect but not for NetExtender. Even if I select Wireguard as protocol in NetExtender, some chit chat…
-
@Disconnected only 3 years later the latest Gen6 Firmware 6.5.4.13 got the option "Disable Virtual Office on Non-LAN Interfaces" which is what you asked for. Gen7 (SonicOS 7.x) does not provide this option at the moment but my guess is that'll follow "shortly". --Michael@BWC
-
@Wallpaper Firmware SonicOS 6.5.4.13 is available now which should fix your issue. --Michael@BWC
-
It is related to this debacle, Mobile Connect got pulled for now. --Michael@BWC


























