Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


Need help with SonicWall TZ-190

Posted on 2009-04-26
Medium Priority
Last Modified: 2012-05-06
   I have one big class A network spanning two buildings. The need has arisen to firewall building B from building A so I can start filtering who has access to what at building A. I felt certain I could do this with a TZ-190 but I have hit a mental block. Can anyone point me in the right direction?
Question by:jimbecher
  • 2

Expert Comment

ID: 24238083
How are the buildings connected?  Are they all on the same switched network, or is there a router in between?  The topology of your physical network would help out.  Are the buildings using separate subnets or are they all in the same subnet?  The use of network zones on the Sonicwall might be the way to go depending on how your network is configured.
LVL 11

Author Comment

ID: 24238226
  It is just one big class A network all on the same switched network. No router in between. Same subnet. The buildings are connected via fiber. Zones are what I have been playing with but since they are all on the same subnet it won't let me put IP address's on the two zones because the IP addresses are on the same subnet.

Accepted Solution

amaru21 earned 2000 total points
ID: 24256660
If they're on the same switched network, you'll need to find a solution using the switch.  What kind of switch is it?

I think the ideal solution would be to have separate subnets and using the zones feature of the Sonicwall.

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses
Course of the Month13 days, 13 hours left to enroll

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question