• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 3671
  • Last Modified:

SonicWall TZ210-firewall - configure firewall and block internet access for certain pc's

SonicWall TZ210-firewall - configure firewall and block internet access for certain pc's
0
teju27
Asked:
teju27
2 Solutions
 
teju27Author Commented:
hai i want SonicWall TZ210-firewall - configure firewall and block internet access for certain pc's ?
0
 
digitapCommented:
you can either create a LAN > WAN rule on the sonicwall under firewall > access rules to block by IP or by MAC address.  if you do by IP, then you'll want to set them as static IP or DHCP reservation on your DHCP server.  i'd think it would be easier to do it by MAC.  create an address object under Network > Address Objects for the LAN zone and choose MAC as the type.  then, create the firewall rule choosing the new address object as the source and ANY for destination and service.  if you have more than one, then you should create a address group then an address object for each device.  add the objects to the group and use the group in the firewall rule as the source.
0
Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

 
theonlyallanCommented:
You should first create a Group, and add all the MAC addresses of the PCs to this Group.

You should then create a Group and add all the ports / services you want to block: ie: HTTP Port80, Https, FTP, Telnet, etc..

Then create a firewall rule  LAN > WAN that will block  the groups that you have just created.

If you have an active subscription service, you can enable Application Firewall, which will do the same thing for you.
0
 
digitapCommented:
@theonlyallan :: cool...thanks for confirming my steps.  do you read what other experts post?
0
 
digitapCommented:
the author indicated the solution is not clear. after reviewing, i see that a combination of my solution, http:#a34952994, and theonlyallan's solution, http:#a34953032, provides all the steps necessary to do what the author's is trying to accomplish.

my recommendation is to select those two solutions as the new disposition for this question. otherwise, Deleted.
0
 
Ernie BeekExpertCommented:
I was surprised to get rewarded seeing the other comments. So I go with digitap on this one with one addition: digitap: solution (80%), theonlyallan: assisted (20%)
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Get Certified for a Job in Cybersecurity

Want an exciting career in an emerging field? Earn your MS in Cybersecurity and get certified in ethical hacking or computer forensic investigation. WGU’s MSCSIA degree program was designed to meet the most recent U.S. Department of Homeland Security (DHS) and NSA guidelines.  

Tackle projects and never again get stuck behind a technical roadblock.
Join Now