Comments
-
Hi @NIKMA, Thank you for visiting SonicWall Community. Could you please explain for what type of traffic (SMTP, HTTP(S), etc,.,) you wanna add google IPs as trusted? If you can explain me the scenario, I can suggest better ways.
-
Hi @JST3751, Thank you for visiting SonicWall Community. Here is the difference. Default Syslog Format - This is the default SonicWall Syslog format. This format is required for GMS or Reporting software. Enhanced Syslog Format - With this format selected, the configure icon becomes active. Clicking on the configure icon…
-
Hi @MIKE_CLEMENT, Thank you for reaching out to SonicWall Community. We'll definitely help you with possible solution to your question. The access rule that you are referring to belongs to firewall's web management access. Any access rules meant for firewall management is auto-created and we don't recommend creating them…
-
Hi @GMP, Thank you for visiting SonicWall Community. Your first NAT policy for outgoing looks right. The second one for incoming access needs modification. I have provided the modified policy below, Source: Any Translated Source: Original Destination: 2001:aaaa:bbbb::/48 Translated Destination: 2001:cccc:dddd::/48…
-
Hi @ANTONIOPROINFO, Thank you for visiting SonicWall Community. I would recommend you to enable Keep alive on only one of the firewalls. This will create a situation where firewall one of the firewall acts as initiator and the other as responder. When keep alive is enabled on both the firewalls, both would start initiating…
-
Hi @JJORGENSON, Thanks for the screenshot. The inbound NAT and WAN to LAN access rule should look as referenced below. NAT policy: Source: Any Translated Source: Original Destination: X1 IP Translated Destination: 192.168.0.173 Service: Minecraft TCP Translated Service: Original Inbound Interface: X1 Outbound Interface:…
-
Hi @SEBASTIAN, Please ensure the communication between NSv in Azure and Azure AD using LDAP happens. If the communication happens vice-versa, then the Authentication setup works.
-
Hi @FIRNAS87, Thank you for visiting SonicWall Community. You should be able to get the device registered under your name. Please contact our Customer Service team w.r.t this query and they are the right resource to help you on this matter. Hope this helps.
-
Hi @JJORGENSON, As requested on previous comment, please share your private IP of the local server and public IP address assigned to the local server access from outside. Also, share the screenshot of your firewall's Network Interfaces page. I'll provide you the inbound NAT and WAN to LAN access rule look alike.
-
@JJORGENSON - Destination should contain the public IP used externally by your local server. Lets say, X1 WAN IP or any other WAN interface IP. Please share your private IP of the local server and public IP address assigned to the local server access from outside.
-
Hi @JJORGENSON, Thank you for visiting SonicWall Community. The Source and Destination on the access rule should be Any and Public IP that you used to access the Minecraft server. Please change these and you could access the server from outside. Kindly make sure the NAT policy is also changed with these info for server…
-
Hi @DisaRicks, What @BWC suggested would be the best way to replay the kind of flow that you are trying to.
-
Hi @AJISHLAL, I can understand. As this is an expected behavior with current SonicWall models, this cannot be reported to our back-end. Hence, I would recommend you to file a RFE by contacting our SonicWall Sales team.
-
Hi @AJISHLAL, Thank you for visiting SonicWall Community. It is reported to be still the same as per below KB article. I tested this on a NSa 9250 running 6.5.4.7 firmware. If you are looking the same info for any Gen 7 appliances, please share the device model and its firmware.
-
Hi @ARKWRIGHT, I see there is no direct option to get to know about the Cloud ID details that you were looking. I would suggest you to call and check with our support team to seek more info to your request. Please find below web-link for support contact.