Comments
-
@riow, What firmware are you on? I am testing this on a 6.5.4.7-83n TZ 300W and do not see this problem. Also, I have seen this only on Chrome and not on all browsers. Thanks!
-
@dibthree, If it is a larger deployment, and the firewall is on a routed network, I would suggest using wireless cloud management. Please take a look at the KB below. Thanks!
-
@riow, You can add a local user and choose to use TOTP for two-factor authentication. The same is shown in the screenshot below. If you don't mind, could you please share some screenshots to explain the issue you are facing? Thanks!
-
Sure, keep us posted!
-
@Karl, The messages that you are seeing in the logs show that the link is going down. For testing, could you try with a different cable? Thanks!
-
@SynergyTech, Actually, NSv 270 is used for firmware SonicOSX 7.0.0. The SonicOSX is different in behavior from SonicOS 7.0. So, it is not just a change in UI but the functionality itself. Kindly refer to this KB for details: If you wish to use the Gen 6.5 OS (NSv 200), then the suggested KB from support is the right one.…
-
@WNRG_NathanOrlina , I do not see any such reported issues. I will do some testing on my end and will let you know. So, basically the X1 default gateway IP is something else but when you hover over it, it shows an incorrect IP right? Thanks!
-
@WNRG_NathanOrlina , Any local user added is by default added to the user groups Everyone and Trusted Users. Could you please share the screenshots of the problem to understand this better? I tried this on a TZ 470W and that seems to look okay. Thanks!
-
@WNRG_NathanOrlina, We did have a similar issue that used to show up this error for the access rule page which is addressed on an HF firmware (Issue ID - GEN7-18230). I cannot see this for the logs page, but it would be best to involve support on this. Thanks!
-
@samaj, The UDP flood protection is actually not turned ON by default. If you do not wish to turn it OFF, you can try increasing the threshold to a higher number like 5000 or 10000. Unfortunately, we do not have the option to exclude Skype from UDP flood protection. Please refer to this KB below. Thanks!
-
@dibthree , For auto provisioning, SonicWall uses SDP which is an L2 broadcast. We need the SonicWall and the APs to be on the same VLAN preferably native VLAN for this to work. Thanks!
-
@AGSonicWall , Was there an error message for the bind fail on the SonicWall? Also while you test the LDAP connectivity from the firewall and it fails, can you please check the event logs on the server? Thanks!
-
Hello @GrahamBarnes, I had seen something similar on very older versions like R395, and shouldn't happen on the latest version. I would suggest exporting the settings, resetting the firewall, booting with current firmware with factory default settings, and then importing the settings back. If that does not solve the…
-
Thanks @Arkafigs. Have a good one!
-
No, it does not. You can add it as a type range too. It should work with that. Thanks!