TKWITS Community Legend ✭✭✭✭✭
Reactions
Comments
-
What firmware version are you running?
-
Your guess is pretty accurate. Source: Any Destination: (an address object for your VLAN100 subnet) Route type: Standard route Interface: (Assuming LAN interface e.g. X0 but you didnt provide this info) Gateway: (an address object for your switches VLAN10 IP address) Metric: 5 Thats just your basic routing.
-
According to previous posts by Sonicwall staff you have to open a ticket with support to get more info on the Sonicwall internal issue IDs. Sonicwall hiding fixed problems in release notes is bad practice. Admit problems, own up to the fact they exist, and celebrate you fixed them... I too would like a true fixed issue…
-
Where are you getting your 'real' numbers from? Actual tunnels built, or what the GUI reports?
-
Please provide more information about your configuration and what you are trying to accomplish. If you added a virtual interface to the Sonicwall you do not need to 'add a route back to your vlan'.
-
Did you disable SSLVPN on the WAN? Did you try browsing directly to the SSLVPN page on the specified port (e.g. https://71.62.53.44:4433)?
-
Feel free to mark as an answer. You're welcome.
-
If someone asks for a firmware version please just give the version numbers. So you're using softphones? Are they tagging their traffic with anything (ToS, DSCP)? Did anything else change network wise (new switch)?
-
Have you seen this KB?
-
What firmware version? Did you import/migrate the config from an earlier model? Anytime I've had audio cutouts like you're describing it was flood protection related. AppControl also completely destroys VoIP.
-
My last comment in the linked discussion hints at what you are experiencing. Sonicwalls expect to have a public IP address on their WAN interface(s). Without it the device doesn't know how to route to the public IP address you are NATing. "When i configure SSLVPN on the WAN interface on TCP 4433, the automatically created…
-
Yes that is correct. I just couldn't find the KB.
-
Make a dedicated account a member of Distributed COM Users, Performance Monitor Users, and Event Log Readers groups. Give the account logon as a service privileges on the servers. Give the account 'Execute Methods', 'Enable Account', 'Remote Enabled' and 'Read Security' privileges in WMI for the Root namespace and…
-
It sounds like youre doing what was discussed here
-
Have you considered adding a blanket exception to GAV for the on prem server rather than individual signatures? To answer the question, the firewall may not be 'dropping' the packets. The packet monitor doesn't tell you what security services are doing, strictly what traffic is passing an interface.