Need help with SonicWall TZ-190

Posted on 2009-04-26
Last Modified: 2012-05-06
   I have one big class A network spanning two buildings. The need has arisen to firewall building B from building A so I can start filtering who has access to what at building A. I felt certain I could do this with a TZ-190 but I have hit a mental block. Can anyone point me in the right direction?
Question by:jimbecher
    LVL 3

    Expert Comment

    How are the buildings connected?  Are they all on the same switched network, or is there a router in between?  The topology of your physical network would help out.  Are the buildings using separate subnets or are they all in the same subnet?  The use of network zones on the Sonicwall might be the way to go depending on how your network is configured.
    LVL 11

    Author Comment

      It is just one big class A network all on the same switched network. No router in between. Same subnet. The buildings are connected via fiber. Zones are what I have been playing with but since they are all on the same subnet it won't let me put IP address's on the two zones because the IP addresses are on the same subnet.
    LVL 3

    Accepted Solution

    If they're on the same switched network, you'll need to find a solution using the switch.  What kind of switch is it?

    I think the ideal solution would be to have separate subnets and using the zones feature of the Sonicwall.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Join & Write a Comment

    The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
    This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    731 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now