Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Sonicwall 4500 X0 to X2 Bridge

Posted on 2010-09-10
2
966 Views
Last Modified: 2012-05-10
I have a sonicwall 4500.  X0 is a lan with 192.168.1.x subent and X2 is configured as a LAN with a 10.0.0.x subnet. What would be the routing rule i'll need to allow X0 to see X2?  I need a server on the X0 LAN to be able to communicate with workstations on the X2 LAN?  Cheers!
0
Comment
Question by:TommyCasanova
  • 2
2 Comments
 
LVL 33

Accepted Solution

by:
digitap earned 500 total points
ID: 33651363
login to the sonicwall and go to firewall > Access Rules.  You can see the rules based on zones.  What zone did you call the X2?  Either way, you want to click the matrix that is X0 > X2 and X2 > X0.  Depending how you had setup the zone originally, it may already be trusted.  Otherwise, it may be set to Deny.  You can leave that and create another rule that's more explicit or modify the existing rule configuring it to allow.  Then, all hosts will access the zone.
0
 
LVL 33

Expert Comment

by:digitap
ID: 34054388
thanks for the points!
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Interface VLAN dependencies 6 56
Local DNS and Home Routers 4 46
SSG50 Firewall Rules 17 28
Setting up static routes to  sonicwll 4 70
The Cisco RV042 router is a popular small network interfacing device that is often used as an internet gateway. Network administrators need to get at the management interface to make settings, change passwords, etc. This access is generally done usi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question