Comments
-
Hi @LARRY, It looks like the case is being investigated still. I believe that the engineer is investigating this with the backend team. Please hold on for now, I dont know about the status of the issue. I'll have the engineer communicate you with appropriate status via the support case.
-
Hi @SITWIFI, Thank you for visiting SonicWall Community. Yes, your request can be attained using NSv 800. For various other specifications about NSv 800 and other NSv models, kindly refer below the datasheet web-link.
-
Hi @ADAMSYMQUEST, Unfortunately No. The reason is, with latest SonicOS firmware for Gen 6, 6.5 (6.5.x.x) and 7 (7.x.x.x) devices we can jump directly from any lower firmware version to higher firmware version. I gave you an upgrade path for Gen 5 (5.9.x.x) device based on my experience. Hope this clarifies.
-
Hi @Rinconmike & @BWC, I'll check this with corresponding resource and update the thread here. Please standby.
-
Hi @Rinconmike, It was my bad. Wrong window. My firewall also runs on version SonicOS 7.0.1-R1262. Apologies once again. The datasheet needs to be corrected I guess, let me have this checked and update this post here. Thanks for your patience.
-
Hi @CRANIUM, Thank you for visiting SonicWall Community. Yes, we can achieve allowing VPN access for the wireless users using Global VPN Client. Please follow the steps as per below KB article. A small change in the prescribed article, you will be following the instructions on the WLAN GroupVPN policy instead WAN GroupVPN…
-
Hi @RINCONMIKE, Thank you for visiting SonicWall Community. I tested this scenario on one of my TZ 670's and found that the max DPI-SSL connections are 30000. The same is confirmed from the TSR of my firewall. My firewall runs on 6.5.4.7 latest firmware version. What about yours?
-
Hi @KEVIN_YELLICK, Thank you for visiting SonicWall Community. Are both the user's PC and printer are communicated via the same wireless network? Is the VPN getting connected via the wireless network too? Please let me know.
-
Hi @ADAMSYMQUEST, Thank you for visiting SonicWall Community. I would suggest you to follow the below upgrade path, 5.9.0.0 to 5.9.1.7 to 5.9.1.13 to 5.9.2.7.
-
Hi @DAVE_THE_IT_PLEB, Thanks for the confirmation. I tested this inhouse with a TZ 250 running on 6.5.4.7 firmware version. The TOTP binding for SSLVPN worked flawlessly even after a power outage and power cycle of the firewall appliance. Please make sure your firewall is on the latest firmware build. Also, test this…
-
Hi @AREVALO, Thank you for visiting SonicWall Community. As per the packet drop, it is obvious that CFS intervenes in this specific website access. You may need to use the CFS URI list object and enter the domain name along with the custom port number (www.example.com:5100) in the Keyword List section as shown below.…
-
Hi @AronS, Do you have the default WAN to LAN Deny rule in place or have you allowed any Terminal Service ports from WAN to LAN in the SonicWall?
-
You are most welcome @OLIVER. It was a pleasure helping you. Have a good day!!!
-
You are most welcome @GRAHAMBARNES. It was a pleasure helping you. Have a good day!!!
-
Hi @OLIVER, Thank you for visiting SonicWall Community. The UNKNOWN users stand for the user's that are not authenticated to the SonicWall via ULA (Web) login or SSO/TSA login. Remaining IP's stand for traffic from any IP addresses that are doesn't belong to Standard type (IPv6, Multicast, Broadcast, etc.,.). The message…