Solved

Exported Sonicwall configuration file is corrupt.

Posted on 2012-12-24
3
1,514 Views
Last Modified: 2012-12-29
I'm upgrading from a 2040 PRO to a NSA 2400. The configuration file is cross compatible between these two. However, every time I try to upload the exported configuration file from the 2040 PRO into the NSA 2400, it tells me after a few moments that the configuration file is corrupt and cannot be uploaded.

The 2040 PRO is running and still in use without any issues, am I doing something wrong, or is there anything I can do to get a good configuration file from the 2040 PRO?
0
Comment
Question by:tjwo94
  • 2
3 Comments
 
LVL 25

Assisted Solution

by:Tony Giangreco
Tony Giangreco earned 250 total points
ID: 38718774
I'd try upgrading both to their latest firmware and retrying the export and import process.
0
 

Accepted Solution

by:
tjwo94 earned 0 total points
ID: 38718919
Found the answer, and you are also correct, but there is a specific way to migrate the configuration.

The PRO 2040 firmware is the old standard version, and the current firmware versions being used today are "enhanced."

Anyone needing to migrate there configuration to a compatible, newer device, must upgrade the exported configuration file to the new version.

To do this, you must first export the configuration from the old SonicWall, in my case the PRO 2040.

Then visit, http://convert.global.sonicwall.com
Login with your credentials
Upload the exported configuration file.

This next part is important, so don't glaze over this.

The Tool will ask you to select the target product. DO NOT select the product you're migrating the configuration to. Your must select the same device the exported configuration came from. So again, in my case I select the PRO 2040.

The tool will then convert your existing configuration file from the standard format to the enhanced format and allow you to download the updated configuration file.

Import the newly generated file into your SonicWall, and you're now ready to plug and play your new device with all the settings still intact.

Peace.
0
 

Author Closing Comment

by:tjwo94
ID: 38728928
Asked, and answered.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now