Solved

sonicwall TZ210 WLAN to LAN Browsing

Posted on 2011-09-15
5
417 Views
Last Modified: 2012-05-12
I have a client that needs to be able to browse and access files from the WLAN into the LAN. They have a sonicwall TZ210 that is connected to a sonicpoint N, I have tried to create the rule in the firewall, but it keeps telling me that there is an overlapping rule. I know it has to do do with rules in the firewall of the TZ210. Can anyone please point me in the right direction. I am not familiar with soicwalls.
0
Comment
Question by:rlazojr
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 8

Accepted Solution

by:
amatson78 earned 300 total points
ID: 36547238
The rules follow a too down order. If there is an existing rule blocking it, it will show in the logs. Shows the rule in the comment (ie. WLAN>LAN 2)

If you want to post the log I can examine it for you.
0
 

Author Comment

by:rlazojr
ID: 36558534
I disabled the rule blocking wlan to lan it said Deny in the firewall rules setting. It still is not working. how can I download and post the log?
0
 
LVL 8

Expert Comment

by:amatson78
ID: 36559609
You can export the log and attach it here. Better yet run a packet capture filtering for ether type: IP and the source address of the WLAN client and post that here as well.
0
 

Author Closing Comment

by:rlazojr
ID: 36584720
Thanks that helped
0
 
LVL 8

Expert Comment

by:amatson78
ID: 36584726
Glad to hear. Good Lucy with your future endevours.
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is split into background info to start and actual review at bottom: Some time ago I wanted to sell a system with both wired and wireless capability but at minimum expense.  Having visited my trusted online auction I was pleasantly su…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question