shiprasahu93

Moderator
Avatar

Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

shiprasahu93 Moderator

Badges (23)

2 Year Anniversary250 Answers250 Likes1 Year Anniversary1,000 Comments100 Answers500 Comments50 Answers25 Answers25 Helpfuls100 Likes100 Comments5 Answers25 LikesWork Out Loud5 Likes5 Helpfuls10 CommentsFirst AnswerName DropperFirst CommentPhotogenic

Comments

  • @cybron, No problem at all. Glad that it is all working fine now. Have a good day!
  • Hello @justin, I was caught up with some other stuff and finally got a chance to revisit this. I have added the KB article for this topic as below: Thanks!
  • Glad I could assist. Have a good day ahead!
  • Hello @cybron, Welcome to SonicWall community. Yes, it should certainly allow you to assign a /28 subnet mask on the WAN interface. I hope you are entering one of the IP addresses from the pool on the interface with subnet mask as 255.255.255.240. Also, when you say that it is not allowing it, what error message are you…
  • Hello @Dirk, Welcome to SonicWall community. Usually we connect to the WAN interface of the firewall to gain access to the internal resources on LAN. You can connect the TZ 350 and get the same IP scheme that you have at the moment on your network. The problem you would encounter would be that the network that you are…
  • Hello @HIS_Daniel, Welcome to SonicWall Community. Yes, I can see 02-SSC-1874 10GBASE-T SFP+ COPPER MODULE as one of the supported SonicWall SFP/SFP+ Transceiver Modules. So, yes that should work. Here is a list of other supported SonicWall modules: Also, all the supported 3rd party modules. Thanks!
  • @sumisit, SSLVPN is again a one way connection where the client has access to all resources hosted behind the firewall. The same applies when done with a SonicWAVE. Honestly, it still treats the SSLVPN as an internal zone and uses proxy ARP to reach internal networks when you connect using SSLVPN. It will be difficult to…
  • No problem at all @Sheldon. Glad I could help. Have a wonderful day ahead!
  • @Sheldon, Welcome to SonicWall Community. Since you mentioned that the access rule is missing, could you please add one manually as below From zone VPN to LAN Source: VPN DHCP Clients Destination: X0 subnet Service: Any Action: Allow Please leave all other fields on defaults. If that does not help, please follow the KB…
  • Adding @Vijay_Kumar_KV and @Simon for more visibility.
  • Thanks for the update @Dantell. Keep us posted!
  • Hello @Twizz728, Welcome to SonicWall community. I appreciate you being so descriptive and letting us know the exact requirement. Yes, you can certainly place the guest wireless on a DMZ zone and have no connectivity between LAN and DMZ using access rules. Just FYI, you can achieve this for any other zones as well…
  • Hello @Dantell, Welcome to SonicWall community. I see that all three websites belong to Category 26: Health, and Category 15: Business and Economy of CFS, so it is unlikely that CFS service is a problem. When I perform DNS lookups, I see that the main website resolves to 45.33.109.66 but the others are resolving to…
  • @305dc, Yes, the procedure for recovery is as you have mentioned. The reason for doing that is if we allow the VM agent to allow to take snapshots we are opening up a hole and providing access to the underlying OS and that could be a risk. Thanks!
  • Is PIA VPN also an IPSec VPN software? If yes, that can definitely interfere with GVC. Please make sure that it is cleared out of system tray and then test it. Thanks!