Solved

Sonicwall Firewall Remove Configured IP and Network interface from Zone

Posted on 2012-03-28
2
809 Views
Last Modified: 2012-09-24
How to Remove Configured static IP and Network interface from Zone Sonicwall NSA
( WAN Zone)
0
Comment
Question by:mash1978
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Author Comment

by:mash1978
ID: 37778089
1] Existing three number of ISP configured on three different sonicwall NSA network interface and added in WAN Zone.

2] want to remove one of ISP NEtwork interface cable ,remove interface from WAN Zone and also  IP from Interface.

3] Provide steps if possible if from Sonicwall GUI or Commands line parameters to remove IP from interface.
0
 
LVL 3

Accepted Solution

by:
Konsultant earned 100 total points
ID: 37778178
This is simple. Go to:
1. Network
2. Interfaces
3. Select interface that you want to remove from the zone
4. It is most likely set to static IP. From the drop down box select Unassigned instead of WAN

This should be enough. th interface will be removed from the Zone WAN and LB group.

Sonicwall should stop advertising this IP. Keep in mind that the external router may still have an ARP entry for this IP so you may need to wait or reboot it. (Cisco may keep the entry for 18min!)

Good luck!
0

Featured Post

What, When and Where - Security Threats from Q1

Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question