BWC Cybersecurity Overlord ✭✭✭
Reactions
Comments
-
@Kip_Cool just in case, because this Firmware is ancient, did you tried with an older browser or at least Firefox, which handles this kind of stuff better? Last resort might be a backup via SSH, which IMHO can export to an FTP/SCP server. --Michael@BWC
-
@millia it might be not just the broken certificate chain (they don't deliver the intermediate) it's probably more related to the DH key exchange and the ciphers offered. SNWL has to do the work here. --Michael@BWC
-
@millia did you got any update around March 10th? It seems that the SSL related components are not happy when connecting to clientmanager.global.sonicwall.com. This might have changed around the date you mentioned. Qualys SSL labs gives that server a straight F, not very compelling for a security company, but boundless…
-
@BartMan the circuity is here to stay, Gen7 UI is highly debatable in general. --Michael@BWC
-
@nflnetwork291 no, it's the configuration in export format. The "show current-config" is the equivalent if you wanna see the config in plaintext (but it's importable), but I don't know if this is executable from the GMS or only via SSH on the firewall itself. It's part of the TSR as well if you just have HTTPS Management…
-
Because it seems really urgent, is that what you're looking for? --Michael@BWC
-
@aizuevolution correct, just go for the 6.5.4.9, no intermediate steps necessary. --Michael@BWC
-
@Larry no I did not found the time for another time consuming rodeo. IMHO this should be answered by product management and not via a time consuming fishing expedition with probably senseless remote sessions, TSR requests etc. --Michael@BWC
-
@aizuevolution 6.5.4..7 is not the latest, but some consider it as a really stable release. The latest is 6.5.4.9-93n which is available in your MySonicWall Account. Prior to upgrading you should always have a look at the Release Notes. Most of my installations are running 6.5.4.9 just fine. --Michael@BWC
-
@TKWITS I dunno, something is up, but as long I'am the only one I have to live with it. I had to disable Flood Protection anyways, because I wanna make sure that Vodafone fixes my connection first and I don't want to look at the wrong end. --Michael@BWC
-
@AvacadoToastK12 the DNS on the WAN Interface makes sense if we're talking dynamic assignment, like through DHCP or PPPoE. With a single WAN Interface this might be fine and the Firewall is getting the DNS information from the provider. But the problem arises if your X1 is connected to German Telekom and X2 is connected to…
-
@AvacadoToastK12 they should usually match with the DNS settings from your first WAN interface, which is usually X1. This might cause trouble if you're having multiple WAN connections from different providers and the firewall is using a provider specific DNS resolver which is not accessible from other networks and the…
-
@TKWITS I dissected all stored messages and there was a few times a peak of around 300 messages per second over the day, but the maximum length was not higher than 394, no fragmentation needed. No matter what I do, I do not come even close the the 1.2M packets the Flood protection is reporting. --Michael@BWC
-
@Michael_Bischof thanks for the reply, but my Phone is probably not capable to generate 1.2M syslog events in two seconds, any other possible explanation? The syslog from my phone holds approx 130 K events for the whole day, how could Flood protection complain about 1.2M packets in a 2 second window? --Michael@BWC
-
@edtrumbull did you followed the steps I pointed out above already? Douglas did not had any luck on this in the past, but after reviewing it I couldn't why it shouldn't work. It was pretty straight forward, but priority of the Access Rules is key here if you wanna restrict single users/groups to specific resources.…


























