Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Sonicwall TZ210 config questions

Posted on 2011-09-27
Medium Priority
Last Modified: 2012-06-27
Setup: Sonicwall TZ210 with Fios as main line and T1 as backup.  Both with static IP's assigned.  Aside from our normal network, which includes an exchange server, we have a second self contained server that has it's own wan ip assigned to it.  the problem is that it needs to have traffic router to it on port 25(which is used by our exchange server) but only if directed to that specific wan ip that's assigned to this other server.  How can I accomplish this?

Also, we are migrating off of an ISA server which provides a layer of protection to Outlook Web Access, is there a built in feature of this model sonicwall to provide that extra layer of security for OWA?
Question by:Sean Rhudy
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
LVL 20

Expert Comment

ID: 36715793
Is the WAN ip address range for this "other server" the same as either the FIOS or T1 backup circuit?
That is, does the traffic to this systems now go through the Sonicwall. If not, how is it connected in your network?

Author Comment

by:Sean Rhudy
ID: 36716115
It's a different static IP.  I guess it would have to be on the lan because both of the wan ports on the sonicwall will be taken up.  Can't I do one rule that has the destination of the first server, and a second rule with the same port that has the destination of the second server?
LVL 20

Expert Comment

ID: 36716621
As long as you have Sonic OS enhanced later than 5.5 you can configure an additional WAN interface (Network->Interfaces->Show PortShield Interfaces). Then pick one and configure in WAN zone.Then you can have three different ip ranges. Once you do this you can route that traffice independently of the others.
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!


Author Comment

by:Sean Rhudy
ID: 36716957
Great, thanks! What about the other question?  Does this sonicwall have any extra secuirty for OWA?  I'm sure nothing can protect it like ISA, but is there any extra layer built into the sonicwall?

Author Comment

by:Sean Rhudy
ID: 36717414
We don't have a front end server, only one server that handles everything.  The second link looks like it just shows how to forward port 80 and 443..
LVL 20

Accepted Solution

carlmd earned 2000 total points
ID: 36717658
As far as I know, their is no extra security provided for OWA. Since OWA is browser based, it comes through on either port 80 or 443 as configured. You would also be configuring the Exchange server as a web server on the Sonicwall (in addition to the basic email configuration), which has a wizard for this.

Featured Post

Looking for a new Web Host?

Lunarpages' assortment of hosting products and solutions ensure a perfect fit for anyone looking to get their vision or products to market. Our award winning customer support and 30-day money back guarantee show the pride we take in being the industry's premier MSP.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question