Improve company productivity with a Business Account.Sign Up

x
?
Solved

Sonicwall 3060 Firewall Access Rule

Posted on 2013-05-15
7
Medium Priority
?
393 Views
Last Modified: 2013-06-09
Hi,

I have the standard sonic OS  on my SonicWall 3060 and need to write a rule that says to allow all traffic from an external ip range to an internal destination ip range.  I don't want to reference any services but just ip addresses.

Thanks
0
Comment
Question by:wpmcj
  • 3
  • 2
6 Comments
 
LVL 9

Accepted Solution

by:
BigPapaGotti earned 1400 total points
ID: 39168831
On the left hand side click on Network
Click on Address Objects
Scroll down to Address Objects and click on the "Add..." button
In the popup window give an appropriate name
Assign the Zone to the appropriate name
In the Type drop down select "Range"
Fill Out the Starting IP & Ending IP
Click Add
Repeat the above steps for the other range either internal or external based on what you did the first time.

Click on Firewall
Click on Access Rules
Select the Drop-down Boxes view style
Select WAN for the "From Zone:" and LAN for the "To Zone"
Click OK
Click on the Add button
Select "Any" Service
For Source select the External group you created above
for Destination select the Internal group you create above
Click on "Add"

Now test to ensure it works.

You may need to create a NAT policy to properly forward the ports in question to your internal computers.

Let me know if this worked for you.
0
 

Author Comment

by:wpmcj
ID: 39168919
Unfortunately, Address Objects is not available in the standard version of SonicOS.  I could update but looks like I'd have to start from scratch with the Enhanced version.
0
 
LVL 9

Expert Comment

by:BigPapaGotti
ID: 39168986
I see. What happens when you go to the next part of the Firewall Access Rule does it allow you to specify the access rule or is it useless without the Address Objects?

How much configuration would be involved with moving to the enhanced version. Although it is not supported you should be able to upload the Enhanced OS boot off of it and then import the configuration from your Standard OS. You may run into issues or you may be lucky and not having any. You can always revert back to the Standard OS if necessary. I'm not sure what your maintenance window looks like
0
Simple Misconfiguration =Network Vulnerability

In this technical webinar, AlgoSec will present several examples of common misconfigurations; including a basic device change, business application connectivity changes, and data center migrations. Learn best practices to protect your business from attack.

 

Author Comment

by:wpmcj
ID: 39169071
Basically, I have to specify a service or use "any"  but tried and didn't work for my purpose.  Others maintain it would work if I had a rule based in IPs and not services.

Looking for more info on the upgrade to Enhanced but I think you're correct in that it may or not import the old settings.  Our maintenance time would probably be a weekend.
0
 
LVL 9

Expert Comment

by:BigPapaGotti
ID: 39169446
I think it would be worth your while about going from a Standard to Enhanced firmware and then trying to import the same configuration. I've completed once successfully in the past without any issues.

Let me know how it goes should you attempt this on the weekend or after hours one night
0
 
LVL 72

Expert Comment

by:Qlemo
ID: 39232897
I've requested that this question be closed as follows:

Accepted answer: 350 points for BigPapaGotti's comment #a39168831
Assisted answer: 0 points for wpmcj's comment #a39169071

for the following reason:

This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Hi, this video explains a free download that you can incorporate into your Access databases, or use stand-alone for contact management. Contacts -- Names, Addresses, Phone Numbers, eMail Addresses, Websites, Lists, Projects, Notes, Attachments…

608 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question