MitatOnge All-Knowing Sage ✭✭✭✭
Reactions
Comments
-
@amamsama If I dont misunderstood. your wan ip is virtual and adva interface is local interface ip. is it right? for example: internet ip : 66.66.66.6 adva sw sfp interface ip: 192.168.1.1/29 Sonicwall X8 ip: 192.168.1.2/29 can you give more detail?
-
Where is the malicious ip at the internal network or external network? if It is wan site, your rule is wrong. All malicious ip should be wan zone. Access Rule should be below. Lan to Wan zone Access rule. Action: DENY From : LAN Toe: WAN Source : any Destination : malicious ip group Users : All Exclude : None
-
No need clearpass. you sould add Network policy for domainUPNSuffixes each domains. A domain user wants to login to domain, RAdius server catch the request and check the domainUPNSuffixes if user is A domain user radius assign to Domain A vlan. if not Raidus assign to Domain B vlan.
-
@Larry did you try list vpn policies via CLI? maybe the gui is not showing the vpn settings.
-
@Blacksuit You should use "Dynamic port access auth via RADIUS" on Aruba 2540.
-
@YewChee You can find out below link.
-
Hi @Blacksuit What is your switch brand and models?
-
@tejasshenai could you uncheck GAV TCP stream scan
-
When you enable the syslog, does sonicwall send the snmp traps?
-
@BWC this is standart SMA sizing advice. don't misunderstood. But what do you think; For 20 users, is it possible to run SonicOS Linux configuration with less than 2 cores 4gb ram? I dont think so. Linux kernel is heavy nowadays. Based on my experience 1 core cpu and less than 4 gb ram will be problem. normaly SMA500v…
-
Hi @Enzino78 You can find out on page 7
-
@julian1 best practice is divide network for all trusted users between untrusted users. There are a few type of automatic isolate each other. 1) Multiple SSID on WLAN. 2) 801.x on WLAN and switch 3) as @BWC said, DHCP but if you have a lots of untrusted users it will difficult.
-
@Tg1986 you should enable main interface after that vlan interfaces.
-
Yes debug option in PRTG. you can check below documents. You should collect traps logs on prtg and anlyz it
-
Hi @Akromat did you add the trap community both side? and assign the correct oid numbers to prtg trap sensor? could you enable debug options to "store results" sensor settings