Solved

Sonicwall install using a CIDR block part 2

Posted on 2010-08-16
5
879 Views
Last Modified: 2013-11-16
I have everything working now

castellansolutions: is right about adding a network CIDR subnet to the WAN interface but no NAT rule is needed "I was expecting to need a NAT rule"

Now here is a question, of all the CIDR IP's  that went to the proper web servers. No other ip's in the CIDR block worked. Just 1"virtual ip" I know the firewall rules were correct.


(by the way they gave us a wrong CIDR block at the cutover. I made 10 DNS changes. And after COX discovered it was the wrong block a day later, they gave us a new block after my client had some words with them) and I had to change the DNS again, and all my address objects.

I worked quite a while on making sure every thing was right on my end.
So here is the question one of the CIDR ip's worked as it should have, sending mail and OWA to our exchange server. But none of the other in the block worked.

Monday morning 7:30 I call COX after being up all night.They escalate and without me changing anything on my end in 20 min, everything works 5 web sites that were not accessible even via IP now work by DNS, VPN works... everything is good.

What did they do?  Arp issue on a router?  modem?

Any ideas what COX did? They are playing dumb.

0
Comment
Question by:Mike000001
  • 3
  • 2
5 Comments
 
LVL 33

Accepted Solution

by:
digitap earned 500 total points
ID: 33451650
hehe...did you not like our answers in your original question?
0
 

Author Comment

by:Mike000001
ID: 33455142
No its not that digitap, I am just trying to get some insight as to why one ip in the CIDER block worked just fine and the others did not.
0
 
LVL 33

Expert Comment

by:digitap
ID: 33460906
cool
0
 

Author Closing Comment

by:Mike000001
ID: 33629543
Found solution myself
0
 
LVL 33

Expert Comment

by:digitap
ID: 33630209
Thanks for the points.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
MiTM SSH session on a Cisco device talking TACACS+ 1 59
Unblock a website in Cisco ASA 3 72
eBGP policy and ACL in interface 7 46
BGP Code 12 41
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now