MarkD Cybersecurity Overlord ✭✭✭
Reactions
Comments
-
I've not seen this error, possibly its due to the SSL cert (self signed) that is being presented - I'm sure there was some update in 119 . try Firefox
-
This might provide some guidance using monitor probes Configuring VPN Failover using Static Routes and Network Monitor Probes | SonicWall The tunnel interface you are probably using doesn't give the option for a secondary endpoint but azure will (the last time I set this up), so this idea uses multiple tunnels and route…
-
Look at the Logs - set the log settings to Firewall action - import the template and then you can filter on the source. Are you trying to access the WAN management from internally by chance?
-
I have provisioned the same using a old HP 1910 , bandwidth management worked flawlessly.
-
just a thought, why not back off the authentication to RADIUS?
-
Is the GW on your static clients the same or some other router? run a packet capture
-
are you overcomplicating this? use DNS
-
As Mustafaa said create an address object for this external IP address, add this to the client VPN routes Adding Client Routes (sonicwall.com)
-
Thanks Xray yes only 1 SSL license I'm afraid, but you could switch using the Netextender when working remotely
-
Glad its now sorted
-
Check your DHCP scopes bound to each interface on the FW (Manage/Interfaces/DHCP) the scope can either be Inherited from SonicWALL's DNS settings (Network/Manage/DNS ) or Specified Manually in the scope. ie
-
The management access rule (WAN-WAN) All X1 IP management address is enabled by when you enable management under the interface (HTTPS/SSH/Ping) on the Interface. if you have changed the management port from the default 443 under Device/Administration/Management specify the port when accessing the appliance…
-
Going back to basics Is the X2 IP address the default GW for the 192.168.4.x subnet and is the X4 the default GW for the 192.168.1x subnet?
-
Not directly on the NSA Setup Windows Server NPS, configure NPS azure extensions ,configure your FW for RADIUS auth
-
HTTPS management is useful IF you want to manage the appliance over the VPN, External IP to WAN management should be disabled or min whitelisted from a fixed IP address via the WAN-WAN management rule - or as above secured via a VPN. Your shared key is just that Shared between the client and the sever - symmetrical…