Solved

SonicWall TZ210-firewall - configure firewall and block internet access for certain pc's

Posted on 2011-02-22
9
3,518 Views
Last Modified: 2012-05-11
SonicWall TZ210-firewall - configure firewall and block internet access for certain pc's
0
Comment
Question by:teju27
9 Comments
 

Author Comment

by:teju27
ID: 34951933
hai i want SonicWall TZ210-firewall - configure firewall and block internet access for certain pc's ?
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 34952233
0
 
LVL 33

Accepted Solution

by:
digitap earned 250 total points
ID: 34952994
you can either create a LAN > WAN rule on the sonicwall under firewall > access rules to block by IP or by MAC address.  if you do by IP, then you'll want to set them as static IP or DHCP reservation on your DHCP server.  i'd think it would be easier to do it by MAC.  create an address object under Network > Address Objects for the LAN zone and choose MAC as the type.  then, create the firewall rule choosing the new address object as the source and ANY for destination and service.  if you have more than one, then you should create a address group then an address object for each device.  add the objects to the group and use the group in the firewall rule as the source.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 6

Assisted Solution

by:theonlyallan
theonlyallan earned 250 total points
ID: 34953032
You should first create a Group, and add all the MAC addresses of the PCs to this Group.

You should then create a Group and add all the ports / services you want to block: ie: HTTP Port80, Https, FTP, Telnet, etc..

Then create a firewall rule  LAN > WAN that will block  the groups that you have just created.

If you have an active subscription service, you can enable Application Firewall, which will do the same thing for you.
0
 
LVL 33

Expert Comment

by:digitap
ID: 34953213
@theonlyallan :: cool...thanks for confirming my steps.  do you read what other experts post?
0
 
LVL 33

Expert Comment

by:digitap
ID: 35214814
the author indicated the solution is not clear. after reviewing, i see that a combination of my solution, http:#a34952994, and theonlyallan's solution, http:#a34953032, provides all the steps necessary to do what the author's is trying to accomplish.

my recommendation is to select those two solutions as the new disposition for this question. otherwise, Deleted.
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 35215021
I was surprised to get rewarded seeing the other comments. So I go with digitap on this one with one addition: digitap: solution (80%), theonlyallan: assisted (20%)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to setup a Voice VLAN on a Cisco Meraki MS220-24 3 89
2960 and a VLAN id of 1237 2 50
RDP on 4321 Router 33 49
Help with an ACL to isolate our wireless newtork 9 19
If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
This article assumes you have at least one Cisco ASA or PIX configured with working internet and a non-dynamic, public, address on the outside interface. If you need instructions on how to enable your device for internet, or basic configuration info…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now