Solved

Sonicwall Question - OPT port

Posted on 2011-02-15
5
1,200 Views
Last Modified: 2012-08-14
I have a user with a TZ190 Enchanced who is wanting to ran a cable across the wall to his neghbor with a TZ180 to connect the networks together.  Both are on different subnets.  Is it as simple as connecting the 2 via the OPT port (not used) and assigning it a 'connection subnet' between the 2?  I guess what I'm t hinking is the Sonicwall will automatically create the routes needed to send the traffic over to the other network.

Example:

192.168.0.x (LAN)->192.168.100.1 (OPT) -> 192.168.100.2 (OPT)->192.168.2.x (LAN)

So Client A's LAN Subnet is 192.168.1.x and he will be running a cable from his OPT port (192.168.100.1) over to his neighbor with the TZ180 configuring its OPT port to 192.168.100.2 and his LAN subnet is 192.168.2.x

So will I manaually need to create a static route on client A's Sonicwall?  like 192.168.2.0 points to 192.168.100.1?
0
Comment
Question by:GDavis193
  • 3
5 Comments
 
LVL 8

Accepted Solution

by:
jimmyray7 earned 500 total points
Comment Utility
You'll need to add the routes and set firewall rules to allow/deny traffic.  Otherwise, your plan looks good.
0
 

Author Comment

by:GDavis193
Comment Utility
Oh and and in reverse - I forgot to add the route needed for Client B as well.  
0
 
LVL 8

Expert Comment

by:jimmyray7
Comment Utility
Right, the other party needs to do the same thing on their sonicwall.
0
 
LVL 9

Expert Comment

by:rawinnlnx9
Comment Utility
On the TZ 190 if you have the enhanced OS you'll need to manage the NAT rules as well.
0
 
LVL 8

Expert Comment

by:jimmyray7
Comment Utility
Using the stated setup, there will be no NAT.  The local LAN addresses will talk to the remote LAN addresses directly.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now