BWC Cybersecurity Overlord ✭✭✭
Reactions
Comments
-
Hi guys, I'am confused, -5080 Release Notes listed this as Resolved Issue GEN7-31660 An UDP session was being enabled for RDP sessions connected through NetExtender, causing severe packets loss and, eventually, disconnection. For what reason should it be disabled in NetExtender, it's a Tunnel after all. I would understand…
-
@Asif_Iqbal I'am stupid sometimes, it has to be checked not unchecked ... I was not really into this with my head, busy day, sorry for the confusion. We need to Suppress the automatic creaton, therefore it needs to be checked. --Michael@BWC
-
You did not unchecked "Suppress automatic Access Rules creation for VPN Policy" as I suggested, this is the resulting Default Access Rule for your VPN Tunnel. If the Rule fits your need you're good to, but if you change later on the Local or Remote Networks in your Tunnel it might have unwanted side effects. Therefore I…
-
@Asif_Iqbal do you mind sharing a Screenshot of your Access Rules from VPN to LAN? Maybe there is a conflicting Default Rule, you can check the origin of the rule by hovering over the little bubble. --Michael@BWC
-
Good Point @MitatOnge, maybe the OP does not want Guest Services after all and is using a 3rd party Captive Portal, not much information all speculation at this point. --Michael@BWC
-
@Asif_Iqbal is the other party running a SonicWall as well? The Access Rules are straight forward if you have your Tunnel up and running. Remote Side: Local Net -> Your Server / Service - Allow Local Side: (VPN to LAN) Remote Net -> Your Server / Service - Allow Just check the mentioned Advanced Setting, this will avoid…
-
@Asif_Iqbal do you know how to create a VPN Tunnel? If not check the following KB-Article. To allow only the needed access, you have to uncheck " Suppress automatic Access Rules creation for VPN Policy" on the Advanced Tab of your VPN Policy. This denies any traffic per default and you have to create an Access Rule from…
-
@dbruyere you might need to provide some more information about your configuration. But to cover the basics, you followed this KB-article? If this does not help, please tell us the following: What Zone is assigned to X8? Did you enabled Guest Services for that Zone? --Michael@BWC
-
@Hypnotoad you're sarcastic, right? It's been over a week since this vague Statement, there should be more Information available by now. --Michael@BWC
-
@CPS_IT if you're running a SMA 100 Series you could use Firmware 10.2.1.6 which includes WireGuard Support, it works pretty good but broke at least at one Deployment Application Offloading for Exchange. In that scenario a simple Port Forward is enough. --Michael@BWC
-
@SClaude no worries, your english is getting the job done and I'am the last one to judge, considering my gibberish most of the time :) --Michael@BWC
-
@SClaude that's a debatable argument :) But if your RSSI (what does it stands for?) insists, here is your .pac File 😎 function FindProxyForURL(url, host) { return "DIRECT"; } --Michael@BWC
-
@DanBuzzo you might check with SNWL Support, because when your WAN RemoteAccess Networks Object is missing, the related Access Rules are missing as well and need to be created. Double check with these KB-Articles and if you did everything whats suggested it's out of your hands. A very odd situation, never occured to me in…
-
@SClaude nope, SNWL Appliances do not provide a dedicated proxy. Why do you want to have a Proxy instead of the flow approach? --Michael@BWC
-
@DanBuzzo is there a possibility that GroupVPN on your WAN Zone is not activated? Manage -> System Setup -> Network -> Zones. In my configuration it's selected per default and cannot be disabled. This KB-Article got me thinking, because all of the WAN RemoteAccess related Access Rules are created because of GroupVPN, maybe…


























