[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

sonicwall TZ210 WLAN to LAN Browsing

Posted on 2011-09-15
5
Medium Priority
?
422 Views
Last Modified: 2012-05-12
I have a client that needs to be able to browse and access files from the WLAN into the LAN. They have a sonicwall TZ210 that is connected to a sonicpoint N, I have tried to create the rule in the firewall, but it keeps telling me that there is an overlapping rule. I know it has to do do with rules in the firewall of the TZ210. Can anyone please point me in the right direction. I am not familiar with soicwalls.
0
Comment
Question by:rlazojr
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 8

Accepted Solution

by:
amatson78 earned 600 total points
ID: 36547238
The rules follow a too down order. If there is an existing rule blocking it, it will show in the logs. Shows the rule in the comment (ie. WLAN>LAN 2)

If you want to post the log I can examine it for you.
0
 

Author Comment

by:rlazojr
ID: 36558534
I disabled the rule blocking wlan to lan it said Deny in the firewall rules setting. It still is not working. how can I download and post the log?
0
 
LVL 8

Expert Comment

by:amatson78
ID: 36559609
You can export the log and attach it here. Better yet run a packet capture filtering for ether type: IP and the source address of the WLAN client and post that here as well.
0
 

Author Closing Comment

by:rlazojr
ID: 36584720
Thanks that helped
0
 
LVL 8

Expert Comment

by:amatson78
ID: 36584726
Glad to hear. Good Lucy with your future endevours.
0

Featured Post

Q2 2017 - Latest Malware & Internet Attacks

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out our latest Quarterly Internet Security Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This program is used to assist in finding and resolving common problems with wireless connections.
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question