Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Migrate Pix 501 config to Sonicwall TZ 210

Posted on 2011-03-08
4
1,230 Views
Last Modified: 2012-05-11
Is there a documented or efficient way to go about migrating the config from a Cisco Pix 501 over to a Sonicwall TZ 210 firewall?  The Sonicwall is replacing the Pix.

All clients currently have static ip's assigned internally which are NAT'ed to public ip's.

Any documentation or a link to documentation would be helpful.

Also, any special considerations I need to think about?

Thanks
0
Comment
Question by:denali26
  • 2
  • 2
4 Comments
 
LVL 33

Accepted Solution

by:
digitap earned 250 total points
ID: 35071900
there's no easy way. however, to setup the NAT'ed solution you had, you'd run the public server wizard, which i've linked to a KB below.

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=7027

do you have any site to site vpns? what about allowing users to access the network via VPN? this would remove the need for the NAT'ed private IP addresses.
0
 

Author Comment

by:denali26
ID: 35076248
Thanks for the link.  That should be helpful.  

In regards to the site-to-site vpn, I believe the client does have one setup between the two locations in town.  VPN access for users is a good idea; however, it seems that the IT contact onsite wants to keep the config the same without any changes unfortunately.
0
 
LVL 33

Expert Comment

by:digitap
ID: 35079009
to each their own. they'll change their tune when their network gets hacked. there's a reason WAN > LAN is Deny All by default for a reason. anyway, good luck and thanks for the points!
0
 

Author Comment

by:denali26
ID: 35082308
I fully agree.  Thanks for the help, much appreciated.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question