Comments
-
Hello @Ajishlal, I am checking on this with the IPS/GAV team. I will keep you posted!
-
@Wes, One thing that I know if you are using a SonicWall switch is that you would need a dedicated uplink for X2 where the SonicWaves are connected. Also, the provisioning should take place on untagged traffic and not on a specific VLAN. Please take a look at the KB below. If that is already done, please try to synchronize…
-
Hello @BillB, Welcome to SonicWall community. Are you seeing any error message on the right hand bottom corner when you hit restart? Yes, it would be a good idea to try from another PC. Also, if you can RDP to one of the LAN machines and access it on LAN IP, you can try the restart from there and check if that helps.…
-
@Alberto, On GEN6-1417 it was found that there was reduction in the TCP receiver window & congestion window on DataPlane causing this issue which had been fixed on 6.5.4.7. GEN6-1803 is still being investigated by the engineering team at this moment. Thanks!
-
Hello @Alberto, Both GEN6-1285 and GEN6-1417 are addressed on 6.5.4.7 release. Thank you!
-
Hello @Wes, Please check for the following: 1) Number of SonicPoints limit mentioned on the interface X2. 2) Try connecting using the PoE injector directly instead of the switch 3) The last few IP addresses of X2 subnet is not getting assigned to some other device 4) Firmware on the firewall is the latest. 5) Also, the LAN…
-
Sure. Let us know how it goes.
-
Hello @Lucas, Do you have DPI SSH enabled on the firewall? Also, on the server itself are you seeing any logs that can tell what is the problem with authentication? Also, please make sure that SSH is not turned on for management on the WAN interface. Thanks!
-
Hello @JeffW, Welcome to SonicWall community. The VPN seems to be up and running. You can run a continuous ping to the internal client box behind AWS from your internal LAN and then perform a packet capture to see if the return traffic is even sent to us or if it is coming on the wrong interface. Sometimes, especially with…
-
Hello @BGMRob, Welcome to SonicWall Community. Here are the access rule and NAT policy: Access rule: Action: Allow Source: Any (You can also create FQDN address objects for the URLs manage.office.com, graph.windows.net, graph.microsoft.com, and reportingservice.activedirectory.windowsazure.com and group them and use here)…
-
@Larry, I do know that GMS does not support MFA on the admin account that is used for binding. I am not sure if it is different for CSC/NSM as they use zero touch for acquisition and updates. Anyone else got ideas on this one? Thanks!
-
Hello @HVO, Please navigate to MANAGE | Rules | Access rules. Type MUTLICAST in the search box and it would show all the access rules pointing to MULTICAST zone. Make sure that the action on all access rules from LAN to MULTICAST and WLAN to MULTICAST is set to allow. I hope that helps. Thanks!
-
Hello @ScottV, Welcome to SonicWall community. Were you able to try the suggestions given on this thread? Thanks!
-
Hello @Larry, TOTP is used for HTTPS management or SSLVPN. I don't think we have this for the built-in admin account for web management that is also used for binding with CSC/NSM. It can be applied to local/LDAP users connecting to the firewall using HTTPS web management or SSLVPN. Thanks!
-
Hello @mrshahin, I apologize for the delayed response. I checked a little bit about the port query tool and looks like it is the correct response for UDP traffic. 0 (0x00000000) – the connection has been established successfully and the port is available; 1 (0x00000001) – the specified port is unavailable or filtered;…





















