shiprasahu93

Moderator
Avatar

Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

shiprasahu93 Moderator

Badges (23)

2 Year Anniversary250 Answers250 Likes1 Year Anniversary1,000 Comments100 Answers500 Comments50 Answers25 Answers25 Helpfuls100 Likes100 Comments5 Answers25 LikesWork Out Loud5 Likes5 Helpfuls10 CommentsFirst AnswerName DropperFirst CommentPhotogenic

Comments

  • Hello @pipi_delina, Welcome to SonicWall community. I would suggest trying the steps given in the KB below Otherwise, while the SNMP probes are being ignored, please set up a packet capture on the firewall and see if they are being dropped due to a false alarm as a flood or something similar. I hope that helps! Thanks!
  • Hello @robert_hitech, The initial set up is only done once. The phone/PC is bound to a specific account and if the timeout takes place, the user is asked to enter the OTP valid for the next 30 second interval and is not allowed to set up again so that it can be bound to another device like a potential hacker. It is very…
  • Hello @robert_hitech, Welcome to SonicWall community. First of all, the TOTP is 6-digit number and can have 720 combinations. So, if someone is trying to brute force and the timeout is huge like one day, it is pretty easy to try out all the combinations. The TOTP timeouts are hence extremely short like 10 or 30 seconds and…
  • @Lucas, Glad we could help. Have a good one!
  • Hello @Lucas, You can perform a packet capture on the SonicWall to see why the ping packets are being dropped. Sometimes, Intrusion prevention blocks it if low priority attacks are also enabled for prevention. You can have low priority attacks under IPS in only detection mode and then test. Thanks!
  • @FabrizPell, The SSO agent just informs which user is logged in to a specific machine and does not apply the CFS policy itself. It is done by the CFS engine. If the Terminal server is excluded from SSO, it instructs the firewall to not perform those queries to figure out which user is logged in to the Terminal server. The…
  • Hey @Micah, This looks great. It is extremely helpful while searching on a specific product line. Totally love it!
  • Hello @NetDel, Welcome to SonicWall community. Based on the public IP and subnet mask, you can see the usable IP range and the gateway should be one of them. For example, if the public IP is 1.1.1.1 and subnet mask is 255.255.255.252, then the usable range is 1.1.1.1 - 1.1.1.2. So, the gateway is definitely 1.1.1.2. If the…
  • @mrshahin, Absolutely correct. The firewall is forwarding the packets out. Thanks!
  • @mrshahin, Use the following filter on the packet monitor by clicking on configure on that page. You can mention the other TCP ports as well on the destination port field. Also, please make sure there are no display filters applied. Thanks!
  • Hello @mrshahin, Logs usually show up when something is being blocked. Please look at the packet capture status itself, that should show how the firewall is processing that packet. Can you share a screenshot of the packet capture? Thanks!
  • Hello @mrshahin, The best way to show that would be performing a packet capture on the concerned port number. The status of the packet can be clearly seen on the firewall's packet monitor section. If the status is forwarded, the firewall isn't blocking it.…
  • Hello @Disconnected, Any vulnerabilities on the HTTPS management or the Virtual Office portal are regularly taken care on the firmware releases. But, if you are looking for something specific, please let the Support team know about it so that it can be forwarded to the engineering. Internal network's domain like your local…
  • You're welcome. Have a good one!