Solved

Setup site to site tunnel

Posted on 2008-06-25
3
824 Views
Last Modified: 2011-10-19
The main office is in Colorado with at TZ170. I just bought a TZ180 for the California office. I'm trying to find some documentation or instructions on "step by step" instructions on how to setup a site to site tunnel between the two. Any ideas? Both sites have public IP's.
0
Comment
Question by:cnmgt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 20

Expert Comment

by:Lazarus
ID: 21879198
0
 
LVL 23

Expert Comment

by:TheCleaner
ID: 21879216
Not too familiar with sonicwall anymore but try these:

http://www.sonicwall.com/us/support/2134_3181.html

https://www.mysonicwall.com/Login.asp (need a login, but then you can search the KB)

http://www.sonicwall.com/us/support/5939.html (get the standard admin guide, if you are using the standard OS version and not enhanced)...and start at page 225.

You can also call Sonicwall support and they'll walk you through it.
0
 

Accepted Solution

by:
cnmgt earned 0 total points
ID: 21879545
I found a PDF on how to setup this up plus other senerios. I've upload the PDF.
Site-to-Site-VPN-using-SonicOS-S.pdf
0

Featured Post

Defend Your Organization from The Greatest Threats

Looking to fill the gaps in your security? Bring together information from the network, endpoint and threat intelligence feeds to really see what's happening in your organization. Join the WatchGuardians in their adventures fighting cyber crime!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I recently had the displeasure of buying a new firewall at one of the buildings I play Sys Admin at. I had to get a better firewall than the cheap one that I had there since I was reconnecting the main office to the satellite office via point-to-poi…
We sought a budget ($5,000) firewall solution that would provide all the performance we needed with no single point of failure.  Hosting a SAAS web application in our datacenter, it was critical that we find a way to keep connectivity up and inbound…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question