Solved

Configure Sonic Wall TZ 190 for 2nd WAN connection and fail-overfrom the primary.

Posted on 2012-03-22
3
1,261 Views
Last Modified: 2012-03-27
I would like to configure our Sonic Wall TZ 190  (running SonicOS Enhanced 4.0.3.4-12e) to add a WAN port for a second internet connection, and setup failover with notification and logging that will switch to the backup service when the primary fails, then fall back when the primary is restored.

We currently have 4 of the 8 LAN ports on LAN, and 4 on a PortShield Interface 1.

I need to:
Configure one of the LAN ports as a secondary WAN source;
Setup fail over and fall back so that when the primary fails, traffic is routed to the secondary; and when the primary is restored, traffic is routed to the primary.
Hopefully without interrupting service, but if it is required, I can arrange that.

Thanks, Harold
0
Comment
Question by:hmaupin
  • 2
3 Comments
 
LVL 16

Accepted Solution

by:
Syed_M_Usman earned 500 total points
ID: 37764456
Dear,

"Configure one of the LAN ports as a secondary WAN source" This is not possible as on Tz-190 you will have optional port, please use that port as WAN

"Setup fail over and fall back so that when the primary fails, traffic is routed to the secondary; and when the primary is restored, traffic is routed to the primary"

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=7588

"Hopefully without interrupting service, but if it is required, I can arrange that" No restart required.
0
 

Author Comment

by:hmaupin
ID: 37765804
Thanks, will pursue!
0
 

Author Closing Comment

by:hmaupin
ID: 37772411
Sorry for the delay, your reference was very informative and I was able to configure the OPT port as the secondary WAN interface.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

A few customers have recently asked my thoughts on Password Managers.  As Security is a big part of our industry I was initially very hesitant and sceptical about giving a program all of my secret passwords.  But as I was getting asked about them mo…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now