TKWITS Community Legend ✭✭✭✭✭
Reactions
Comments
-
You do not use a NetExtender profile that uses the WLAN interface address. The default rule is not sufficient.
-
Not sure what you are trying to accomplish, can you rephrase your question?
-
This can be called 'hairpin SSLVPN' and comes down to a few things. What does 'remote.domainname.com' resolve to when internal? It should resolve to the correct WAN public IP. Do you have SSLVPN enabled on the WLAN zone? It should be. Finally ensure there is a rule allowing traffic from the WLAN zone to the WAN zone…
-
Don't use the switch as a router and let the Sonicwall do the work. AKA have all your vlans as subinterfaces of X0 and use a single port on the switch as a trunk to uplink to X0.
-
I wonder if these reboots have anything to do with the notice Sonicwall just put out.
-
I would contact support for clarification.
-
Im not here to argue, but the subject of the post is 'Dynamic Port Assignment ...' which implies Passive FTP. You mention "Passive FTP" multiple times in your original post. Pardon my believing this was about passive ftp...
-
IIRC Filezilla changed the way they handle Passive FTP a few years ago and mucked up a bunch of stuff. Maybe your server application did a similar thing. BTW the first KB article I posted answered your question.
-
I am not familiar enough with Sonicwall Switches to have any direct guidance, but is there not a way to set the LAG to tag instead of the individual ports?
-
Run a packet capture on the sonicwall watching the exact traffic. If there is a drop after the LIST command is executed than investigate the cause of the drop...
-
Not sure, havent had the time to investigate myself.
-
What do your firewall rules between LAN and LAN2 look like? Have you run a packet capture to see why the drop is occurring? Read up on Zone-based firewall concepts.
-
I do not have experience setting up a VPN tunnel using a BGP address. Have you tried seeing what options are available for configuring the tunnels 'bound-to' settings in the CLI? Contact support and let us know what you come up with.
-
I guess it would depend if your OSPF instance is for private or public traffic. If its private traffic, static routes should be enough. If is public traffic youll have to consider NAT, firewall rules, and routes. Anytime I've had to break OSPF it was private traffic. No NATs were ever setup between networks so I never had…
-
Try creating the VLANs AFTER you create the LAG.