Solved

sonicwall TZ210 WLAN to LAN Browsing

Posted on 2011-09-15
5
414 Views
Last Modified: 2012-05-12
I have a client that needs to be able to browse and access files from the WLAN into the LAN. They have a sonicwall TZ210 that is connected to a sonicpoint N, I have tried to create the rule in the firewall, but it keeps telling me that there is an overlapping rule. I know it has to do do with rules in the firewall of the TZ210. Can anyone please point me in the right direction. I am not familiar with soicwalls.
0
Comment
Question by:rlazojr
  • 3
  • 2
5 Comments
 
LVL 8

Accepted Solution

by:
amatson78 earned 300 total points
ID: 36547238
The rules follow a too down order. If there is an existing rule blocking it, it will show in the logs. Shows the rule in the comment (ie. WLAN>LAN 2)

If you want to post the log I can examine it for you.
0
 

Author Comment

by:rlazojr
ID: 36558534
I disabled the rule blocking wlan to lan it said Deny in the firewall rules setting. It still is not working. how can I download and post the log?
0
 
LVL 8

Expert Comment

by:amatson78
ID: 36559609
You can export the log and attach it here. Better yet run a packet capture filtering for ether type: IP and the source address of the WLAN client and post that here as well.
0
 

Author Closing Comment

by:rlazojr
ID: 36584720
Thanks that helped
0
 
LVL 8

Expert Comment

by:amatson78
ID: 36584726
Glad to hear. Good Lucy with your future endevours.
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have had so many issues with my Vodafone 3G card (Novatel Merlin u630, provided by French carrier SFR) on Windows XP laptops that I thought I would create an help page for other users (I solved the issues). First issue, with my IBM/Lenovo lapto…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question