Solved

sonicwall TZ210 WLAN to LAN Browsing

Posted on 2011-09-15
5
415 Views
Last Modified: 2012-05-12
I have a client that needs to be able to browse and access files from the WLAN into the LAN. They have a sonicwall TZ210 that is connected to a sonicpoint N, I have tried to create the rule in the firewall, but it keeps telling me that there is an overlapping rule. I know it has to do do with rules in the firewall of the TZ210. Can anyone please point me in the right direction. I am not familiar with soicwalls.
0
Comment
Question by:rlazojr
  • 3
  • 2
5 Comments
 
LVL 8

Accepted Solution

by:
amatson78 earned 300 total points
ID: 36547238
The rules follow a too down order. If there is an existing rule blocking it, it will show in the logs. Shows the rule in the comment (ie. WLAN>LAN 2)

If you want to post the log I can examine it for you.
0
 

Author Comment

by:rlazojr
ID: 36558534
I disabled the rule blocking wlan to lan it said Deny in the firewall rules setting. It still is not working. how can I download and post the log?
0
 
LVL 8

Expert Comment

by:amatson78
ID: 36559609
You can export the log and attach it here. Better yet run a packet capture filtering for ether type: IP and the source address of the WLAN client and post that here as well.
0
 

Author Closing Comment

by:rlazojr
ID: 36584720
Thanks that helped
0
 
LVL 8

Expert Comment

by:amatson78
ID: 36584726
Glad to hear. Good Lucy with your future endevours.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
In a recent question (https://www.experts-exchange.com/questions/29004105/Run-AutoHotkey-script-directly-from-Notepad.html) here at Experts Exchange, a member asked how to run an AutoHotkey script (.AHK) directly from Notepad++ (aka NPP). This video…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question