shiprasahu93

Moderator
Avatar

Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

shiprasahu93 Moderator

Badges (23)

2 Year Anniversary250 Answers250 Likes1 Year Anniversary1,000 Comments100 Answers500 Comments50 Answers25 Answers25 Helpfuls100 Likes100 Comments5 Answers25 LikesWork Out Loud5 Likes5 Helpfuls10 CommentsFirst AnswerName DropperFirst CommentPhotogenic

Comments

  • Hi @CMSWKnight, Not all issue IDs are added on the release notes based on affected devices, priority etc. As mentioned by @Nevyaditha, the issue ID GEN6-1253 is marked as duplicate for the GEN6-1000. Since you already have a SR open with SonicWall support, feel free to directly ask for confirmation regarding the issue ID…
  • Hello @Joshy, I just got confirmation on this. We will be able to protect against attacks even over IPv6 channels. Thanks!
  • Hello @CMSWKnight, I can see GEN6-1253 also raised for non-wireless interfaces and that issue is also fixed on the 6.5.4.6 release. Thanks!
  • @JDrakes, Jumbo frame support is only available on NSA 3600 and above and on all Gen 6.5 NSa devices. Since this is a TZ 500 device I think you do not have that option available. Thanks!
  • Hello @CMSWKnight, I think you are talking about GEN6-1000 regarding 'DHCP Scope will be lost after modifying any setting in the interface edit page'. Yes, this is fixed on 6.5.4.6 release. Thanks!
  • Hello @jst3751, As explained by @Saravanan1990_V above, the global inclusions and exclusions under DPI SSL use an AND logic. We have enforcement available on zone levels post 6.5.3.x firmware. So, one of the things that you can do to achieve OR capability is keeping the address group on a separate zone and use the User…
  • @Ninad94, I have seen running into issues like this with VoIP and Skype with UDP Flood protection. That is the reason it is not turned ON by default. You can certainly use it but please be mindful of the thresholds. You should not see those restrictions with ICMP though. Thanks!
  • @Ninad94, I am glad that your issue is fixed. UDP Flood protection is not turned ON by default. Also, it should have shown you dropped packets if that was the reason. But, as long as you are up and running, we should be good. Thanks for sharing the results.
  • @Ninad94, The second point meant that the user is not somehow inheriting the VPN access of 'All Interface IP' or 'WAN Interface IP'. If this access is provided to a user group, it gets inherited to all users that are part of it. Once the user is connect you can check the bubble under VPN access to see what permissions that…
  • @Ninad94, You can check the suggestions given by @Saravanan1990_V. If that does not help, I think we would need to generate a set of ping packets like burst of 10 or 20 and perform captures on the firewall and the end client to investigate further. You can contact SonicWall support for real-time troubleshooting. Thanks!
  • @Ninad94 Is GVC being used in split tunnel or route all mode? Also, is this a new set up or existing set up that just broke? Based on the RTO on the client side, since you are not seeing any drops on the firewall as well, either the ping requests are not reaching the firewall, reaching but the internal device is not…
  • Hello @Ninad94, 1) Are you using the same username while testing SSLVPN and GVC? 2) Is there any network IP overlap between your local subnet and the LAN resources that you are trying to access? 3) Is this taking place for all GVC users? 4) What version of GVC client are you using and what is the firmware on the firewall?…
  • Hello All, @Chris, You are learning to play Piano; that's amazing!! Also, I appreciate you taking the time for conducting the moderator training for me. @KaranM It looks really delicious. Thank you again for the advanced author training. @Nevyaditha Wow, looks like your brother has been an amazing photography trainer! 😅…
  • Thanks @Darshil. Have a good one!
  • Perfect! You can use this KB for safe mode access. Thanks!