Solved

Sonicwall SOHO3 DHCP assigning IP address

Posted on 2004-08-14
9
399 Views
Last Modified: 2008-01-16
Hello Everyone,

I'm using Sonicwall SOHO3 w/ firmware 6.5 as my DHCP. I was wondering if there's a way I can prevent any guest users (not company employee) who has their own computer/laptop and is configured to get an IP automatically to a DHCP from accessing the internet?

Thanks!!!
0
Comment
Question by:basti-gwapo
  • 5
  • 3
9 Comments
 
LVL 15

Expert Comment

by:scampgb
ID: 11800886
Hi basti-gwapo,

Just to clarify, you have your guest user picking up an IP address from DHCP in the same way as your normal users?

The answer to your question will depend on how you give people internet access.  If everyone uses your firewall as their default gateway, and it's configured to just allow access to everyone in your IP range, then the answer will be "No".

If you are using some other method of Internet access that requires authentication - such as an MS ISA server or Squid, then you would do this by setting appropriate permissions on your proxy server.

I hope that this helps

0
 

Author Comment

by:basti-gwapo
ID: 11811585
hi scampgb,

can't i just configure my DHCP to give a different gateway (phantom ip) to the guest user so they can't surf the internet but still be able to access the LAN?

Coz i believe in SonicWall SOHO3 you can create multiple IP Range w/ different gateway but i just don't know how to do it.
0
 
LVL 15

Accepted Solution

by:
scampgb earned 200 total points
ID: 11823231
Hi  basti-gwapo

It's a nice idea :-)

To do this, you'd need the DHCP server to allocate different IP details according to the MAC address of the requesting client.
Although that's possible, it's pretty unusual.

I've had a look at the installation manual for the SonicWall SOHO3, and it's DHCP server functionality is pretty limited.
Unfortunately you won't be able to do this with the kit you've got.


Another approach would be to take a baseball bat into the office, and indicate to your guest user that you might consider using it if they accessed your Internet connection.
0
 

Author Comment

by:basti-gwapo
ID: 11824629
HAHAAHAHAH!!!

I migth consider your last suggestion scampgb....

Thanks for your time and enffort...
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 15

Expert Comment

by:scampgb
ID: 11828173
Hi basti-gwapo,

Thanks for accepting my answer.  Can you please let me know why you thought this was a "B" answer rather than an "A" one?

I ask as I take a pride in the answers I give, and I felt that the answer I gave fully answered your question.  I do realise it wasn't the answer you wanted though!

For your information, grading information can be found at http://www.experts-exchange.com/Networking/help.jsp#hi73

Thanks
0
 

Author Comment

by:basti-gwapo
ID: 11835579
I'm sorry... I'm just new in EE and doesn't really know the protocol yet... but I just really want to close my question so I chose your second respose.

Since no one is responding to my question except for you i just decided to accept your recommendation even though I am not sure what is my next step in solving this "guest user" issue. Although I will ask our management to put up an ISA server but it will take time (for sure due to cost of hardware and licensing) for their approval. I still am not sure if they're gonna approve it or not.

So instead of waiting for their approval (that might take long) and keep the question hangging, i just close this issue. What do you I should have done???
0
 
LVL 15

Expert Comment

by:scampgb
ID: 11836043
No worries, I'm pretty new to EE myself.

The guidelines say that you should accept an answer if it correctly answers your question.  This might not be an answer that you were looking for, but is a fair and accurate answer to the question itself.

If you don't understand the answer, then you should ask for clarification before you close the question.  This allows other people to help as well.

Given the question you asked and what you wanted to achieve, I'd say that I provided you with a thorough answer that would ordinarily be an "A" grade.

All that said, I'm still fairly new to this and would be interested in someone else's take on it (for my own understanding as much as anything), so I'm going to ask in Community Support.

Thanks for your help
0
 
LVL 15

Expert Comment

by:scampgb
ID: 11839002
Hi Netminder

Thank you very much for your thoughts.  As I said, I was unsure myself.

I s'pose I've just been lucky in the past and got As for questions and answers like this.  I'm not complaining by any stretch of the imagination, and I asked solely so that I could have a better understanding of the grading scheme.

I was also interested to know if my comments on when a question should be closed are correct.

I don't think the grade needs to be changed - I'm not feeling hard done by :)

Thanks again for your help
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now