shiprasahu93

Moderator
Avatar

Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

shiprasahu93 Moderator

Badges (23)

2 Year Anniversary250 Answers250 Likes1 Year Anniversary1,000 Comments100 Answers500 Comments50 Answers25 Answers25 Helpfuls100 Likes100 Comments5 Answers25 LikesWork Out Loud5 Likes5 Helpfuls10 CommentsFirst AnswerName DropperFirst CommentPhotogenic

Comments

  • This was an interesting read. I wasn't sure that the interface has to absolutely be assigned even if it's a dummy address. Thanks @VogelArchitekten
  • Hello Michael@BWC, This issue is being jointly investigated by the SonicWALL and SentinelOne Engineering teams. Note: There is no impact to the protection status of endpoints. All endpoints with the client properly installed prior to the outage will continue to remain protected. We apologize for the inconvenience caused by…
  • Thanks for the update @SuroopMC . Hopefully this will get fixed soon!
  • Hey @Cranium, You can try this. Please create two separate service objects with the same TCP port and directly use those service objects in the translated service field on the NAT policies. That might help! Thanks
  • Hello Michael@BWC , That's really bizarre. Can you please open up a support ticket and share the necessary screenshots? It looks incorrect for sure. Thanks!
  • Hello @dkimball, Are you using GVC in split tunnel or in tunnel all mode? Ideally in split tunnel mode, only the local traffic should come to the firewall and the internet traffic should be routed via the client's local internet connection. Usually in split tunnel mode, if the internet is failing it could be due to the…
  • Hey Michael@BWC, We deeply regret the inconvenience caused and trying our best to improve upon these cloud services. I hope everything is up and running now for you. We were running into the 504: Gateway time-out errors, but it works for me now! I apologize again and we will keep working towards getting this more…
  • Thanks @Chris. 😄
  • Hey @Chris , Here are a few! It's been a few days I drew this one though. And, this is one of my favorite paintings!! It's been busy, I am in the middle of a new one, I will share once it is done!! Thanks :)
  • Adding the recently published KB article for configuring this feature: Thanks everyone!
  • Hello Michael@BWC , I have seen that in the past as well. Looks like it is being added to DNS sinkhole blacklist irrespective of the DNS servers used. This is related to Onedrive and seems to be a false positive. I think you should raise this issue with Support and let them take this forward. Thanks!!
  • Hello @RiRL , So, as of now you have a NAT policy to access the VM from the LAN? When you are on SSLVPN, do you also want to access them over a NATted IP? Once you had the VPN access to the user and client routes, you might need a similar NAT for the SSLVPN pool. I hope that helps! Thank you
  • Hi Michael@BWC , I understand what you mean. For the latest release, it should point out the vulnerabilities after the release dates. It could be misinterpretation of the MITRE database. Do you see any other applications showing something similar? All the ones I tested with were old and seem to look okay on my test device.…
  • Hi @Cranium , Please verify if the translated service object in the NAT policy is a service group and not an individual TCP port as you want. That might give rise to that error. Thanks!
  • Hi @SamB , I agree with Mahmoud. You can start with the well known traffic like DNS(UDP 53), web traffic - HTTP(TCP 80) and HTTPS(TCP 443), Email traffic - SMTP(TCP 25), IMAP(TCP 143 and secure one uses 993), POP3(TCP 110 and secure one uses 995) and SMTPS(TCP 465 and 587). These are usually essential for all networks.…