TKWITS Community Legend ✭✭✭✭✭
Reactions
Comments
-
I have customers use RDP over SSLVPN in a Gen7 7.0.1.-5080 setup, BUT I always set the RDP connection 'Experience' parameters. I NEVER let it 'autodetect connection quality'. I only enable 'Visual Styles' and 'Font Smoothing'. I'm not saying that will change for your instance, but I haven't received any complaints. But…
-
For future reference: NAT over a route-based VPN does function to AWS. You'll have to NAT using an IP address not set on any interface on the Sonicwall.
-
If you are trying to remove those IPs from Sonicwalls Spam list than you have to submit the appropriate info via the page you linked. It has a form when following the link: "To submit requests for status to be reviewed, please click here."
-
Search Engines and Wikipedia are your friend.
-
Let me search for you. Search Engines are your friend.
-
You can try switching to SPI. That being said a TZ215 is no longer supported and Im guessing you aren't licensed for any security services. Using an unsupported and unlicensed Sonicwall is pretty much the same as using a 'home router'. It will only offer you limited protection.
-
Throw mini switch between the Sonicwall and ISP device, and see if it still happens. A similar issue was reported on newer Gen7s.
-
Kinda glad Larry brought this up again as I didn't think about it before. Microsoft's suggestions for 365 include exempting traffic to/from them from any security services. Which I ALWAYS do in my setups. This is why I've never run into this even with >5 year old 365 accounts with fully loaded Sonicwalls.
-
You've changed the way the user connects so have you considered the underlying technology? I'm guessing they are connecting via Wifi to the 'hotspot'. Is your new 'hotspot' all the way up to date on firmware? Are you running the latest drivers for the wireless NIC on the users device? Have you researched any wifi…
-
Does this occur after a factory reset on R5080? You'll likely have to open a ticket.
-
Have you read?
-
You have to request hotfixes from support.
-
Most (>90%) sites use HTTPS these days and without DPI-SSL CFS is hardly effective. That said you should have at least some blocks being effective. I'd suggest creating zone-specific CFS Polices (LAN to WAN, GUEST to WAN, etc.) and working with those. I don't believe the Default CFS Policy is supposed to be ALLZONE to…
-
Suggested reading.
-
Sonicwalls are very object-oriented, so you have to create things in order to use them.