Solved

Configure Sonic Wall TZ 190 for 2nd WAN connection and fail-overfrom the primary.

Posted on 2012-03-22
3
1,268 Views
Last Modified: 2012-03-27
I would like to configure our Sonic Wall TZ 190  (running SonicOS Enhanced 4.0.3.4-12e) to add a WAN port for a second internet connection, and setup failover with notification and logging that will switch to the backup service when the primary fails, then fall back when the primary is restored.

We currently have 4 of the 8 LAN ports on LAN, and 4 on a PortShield Interface 1.

I need to:
Configure one of the LAN ports as a secondary WAN source;
Setup fail over and fall back so that when the primary fails, traffic is routed to the secondary; and when the primary is restored, traffic is routed to the primary.
Hopefully without interrupting service, but if it is required, I can arrange that.

Thanks, Harold
0
Comment
Question by:hmaupin
  • 2
3 Comments
 
LVL 16

Accepted Solution

by:
Syed_M_Usman earned 500 total points
ID: 37764456
Dear,

"Configure one of the LAN ports as a secondary WAN source" This is not possible as on Tz-190 you will have optional port, please use that port as WAN

"Setup fail over and fall back so that when the primary fails, traffic is routed to the secondary; and when the primary is restored, traffic is routed to the primary"

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=7588

"Hopefully without interrupting service, but if it is required, I can arrange that" No restart required.
0
 

Author Comment

by:hmaupin
ID: 37765804
Thanks, will pursue!
0
 

Author Closing Comment

by:hmaupin
ID: 37772411
Sorry for the delay, your reference was very informative and I was able to configure the OPT port as the secondary WAN interface.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Botnet detection help me please 21 111
RNC Hacking Question 6 40
Cisco ASA LDAP Authentication for VPN and Management 8 34
Sonicwall SHA issue 4 25
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now