How do I configure access rules to block traffic on certain computers?

Posted on 2011-05-12
Last Modified: 2012-05-11
I've been trying to configure my SonicWall to block web traffic (port 80) on a few computers but without success.  I am trying to tell my firewall to block traffic going to certain MAC address.  So I created the address object using the MAC address of a particular computer .  Then I went to the "access rules" section under "firewall" and created the rule denying HTTP from the WAN side to the LAN side on the address object I created.  No luck.  It seems like I did everything correct.  Is there something that I am missing here?  Thanks.
Question by:RyanRae
    LVL 16

    Expert Comment

    what model of Sonicwall are you using?
    there are many ways to do this, IP base, Mac base and AD base. but first let me know what are you using.
    LVL 27

    Accepted Solution

    well traffic always starts at the client not the server.

    how about block traffic to port 80 from lan (mac address) to wan?
    LVL 16

    Expert Comment

    one more thing i want add is by default all traffic from WAN----> LAN is denied, yuo dont have to enable anything.
    but lets say you want to block one external website ie( for mac. you have to apply rule from lan to wan, not wan to lan.
    LVL 16

    Expert Comment

    if you are using sonicwall with enhance version you can do as follows;

    1) create gouop,
    2) add ip range or host in group
    3) fo to firewall----> access rules---->add

    from zone LAN to WAN------ service Http----- source (mac-clients-group)----destination(any or custom)---add
    LVL 16

    Assisted Solution

    sorry i want to correct my post;

    from zone LAN to WAN------ service Http----- source (clients-group)----destination(any or custom)---add

    Author Closing Comment

    Thanks guys.  Going from LAN to WAN did the trick :D

    Featured Post

    Looking for New Ways to Advertise?

    Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.

    Join & Write a Comment

    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now