Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Configure Sonic Wall TZ 190 for 2nd WAN connection and fail-overfrom the primary.

Posted on 2012-03-22
3
Medium Priority
?
1,327 Views
Last Modified: 2012-03-27
I would like to configure our Sonic Wall TZ 190  (running SonicOS Enhanced 4.0.3.4-12e) to add a WAN port for a second internet connection, and setup failover with notification and logging that will switch to the backup service when the primary fails, then fall back when the primary is restored.

We currently have 4 of the 8 LAN ports on LAN, and 4 on a PortShield Interface 1.

I need to:
Configure one of the LAN ports as a secondary WAN source;
Setup fail over and fall back so that when the primary fails, traffic is routed to the secondary; and when the primary is restored, traffic is routed to the primary.
Hopefully without interrupting service, but if it is required, I can arrange that.

Thanks, Harold
0
Comment
Question by:hmaupin
  • 2
3 Comments
 
LVL 16

Accepted Solution

by:
Syed_M_Usman earned 2000 total points
ID: 37764456
Dear,

"Configure one of the LAN ports as a secondary WAN source" This is not possible as on Tz-190 you will have optional port, please use that port as WAN

"Setup fail over and fall back so that when the primary fails, traffic is routed to the secondary; and when the primary is restored, traffic is routed to the primary"

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=7588

"Hopefully without interrupting service, but if it is required, I can arrange that" No restart required.
0
 

Author Comment

by:hmaupin
ID: 37765804
Thanks, will pursue!
0
 

Author Closing Comment

by:hmaupin
ID: 37772411
Sorry for the delay, your reference was very informative and I was able to configure the OPT port as the secondary WAN interface.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question