Comments
-
@dojjan, Not all issue IDs are listed on the release notes. The issue ID is 189173, and it was reported on 6.2 versions. Thanks!
-
@WCG_Admin, I am seeing this is as a reported issue on an older firmware 6.2.x and should be addressed on the latest release 6.5.4.7. What firmware do you have on the firewall? Thanks!
-
@banyuputih, I apologize for the delayed response. We do support NAT64, NAT 444, DS-lite NAT. Our VRRP variation is SVRRP. But, unfortunately, BFD and IS-IS routing is not supported. Thanks!
-
@Faye, The version that you see for the primary firewall looks like the firmware for GMS/Analyzer and not a firewall. Yes, if they are set up in HA, they should share the same firmware and settings. Kindly check the status of HA from MONITOR | High Availability | Status section. Also, I hope you are using the SonicWall…
-
@SurfingOnARocket, Welcome to the SonicWall community. Basically, that error points to the VPN access provided to the user with which the connection is made. Please make sure that X0 subnet or whichever network you want to provide access to is added to the client routes under SSLVPN as well as to the VPN access of that…
-
@Naga, TZ 300 will give between 100-150 Mbps in Full DPI mode (all security services enabled). To receive close to 450 Mbps, you would need a higher-end TZ like TZ 600 or Gen 7 appliances. Unfortunately, that is a limitation with the hardware itself. Please take a look at the Gen 7 datasheet for comparison. I hope this…
-
Thanks for sharing! @Thomas_Buergis
-
@Naga, Which firewall model are you testing with? If it is a Gen 6 TZ, I do not think 1 Gbps will be possible through the firewall. Please go through the datasheet below. Thanks!
-
@samaj, If you have created the zone VLAN1 as trusted, then the access rule should be automatically added from VLAN1 to WAN that allows all traffic. I would also suggest using a different VLAN than 1 as that is the native VLAN. There are a few VLANs reserved internally for firewall usage. It would be best to use 50 or…
-
@samaj, Correct. If you have configured the VLAN sub-interface on the firewall, SonicWall will handle the inter-VLAN routing. You need not have any L3 decisions done on the CISCO switch. Please have the same VLAN added on the switch. Make the port connecting to the SonicWall X0 as trunk and the port connecting to the PC as…
-
@samaj, What VLAN have you used for that virtual interface? Have you created the same VLAN on the LAN switch and is the computer you are testing from connected to a port of the switch that is the access port for that particular VLAN. Are you able to get an IP address? Also, can you test by pinging 8.8.8.8 and see if that…
-
@ROLWALA, Glad to hear that it is all fixed. Feel free to update us if any need any further help! @BWC - Couldn't agree more. That's my first go-to response for almost all of my cases. Packet monitor to the rescue. 😁
-
@ROLWALA, Please try by setting a higher NCP retrans time value like 200ms as per the screenshot below. Otherwise, it would be best to collect the packet capture and logs as mentioned by @BWC and reaching out to Support for further help. Thank you!
-
Sorry, @Davide. I couldn't find any reported issues like this.
-
@TomChou, I cannot find any reported issues already for this. Kindly reach out to our support team so that we can have this reported and make progress. Thank you