?
Solved

Sonicwall 3060 Firewall Access Rule

Posted on 2013-05-15
7
Medium Priority
?
393 Views
Last Modified: 2013-06-09
Hi,

I have the standard sonic OS  on my SonicWall 3060 and need to write a rule that says to allow all traffic from an external ip range to an internal destination ip range.  I don't want to reference any services but just ip addresses.

Thanks
0
Comment
Question by:wpmcj
  • 3
  • 2
6 Comments
 
LVL 9

Accepted Solution

by:
BigPapaGotti earned 1400 total points
ID: 39168831
On the left hand side click on Network
Click on Address Objects
Scroll down to Address Objects and click on the "Add..." button
In the popup window give an appropriate name
Assign the Zone to the appropriate name
In the Type drop down select "Range"
Fill Out the Starting IP & Ending IP
Click Add
Repeat the above steps for the other range either internal or external based on what you did the first time.

Click on Firewall
Click on Access Rules
Select the Drop-down Boxes view style
Select WAN for the "From Zone:" and LAN for the "To Zone"
Click OK
Click on the Add button
Select "Any" Service
For Source select the External group you created above
for Destination select the Internal group you create above
Click on "Add"

Now test to ensure it works.

You may need to create a NAT policy to properly forward the ports in question to your internal computers.

Let me know if this worked for you.
0
 

Author Comment

by:wpmcj
ID: 39168919
Unfortunately, Address Objects is not available in the standard version of SonicOS.  I could update but looks like I'd have to start from scratch with the Enhanced version.
0
 
LVL 9

Expert Comment

by:BigPapaGotti
ID: 39168986
I see. What happens when you go to the next part of the Firewall Access Rule does it allow you to specify the access rule or is it useless without the Address Objects?

How much configuration would be involved with moving to the enhanced version. Although it is not supported you should be able to upload the Enhanced OS boot off of it and then import the configuration from your Standard OS. You may run into issues or you may be lucky and not having any. You can always revert back to the Standard OS if necessary. I'm not sure what your maintenance window looks like
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 

Author Comment

by:wpmcj
ID: 39169071
Basically, I have to specify a service or use "any"  but tried and didn't work for my purpose.  Others maintain it would work if I had a rule based in IPs and not services.

Looking for more info on the upgrade to Enhanced but I think you're correct in that it may or not import the old settings.  Our maintenance time would probably be a weekend.
0
 
LVL 9

Expert Comment

by:BigPapaGotti
ID: 39169446
I think it would be worth your while about going from a Standard to Enhanced firmware and then trying to import the same configuration. I've completed once successfully in the past without any issues.

Let me know how it goes should you attempt this on the weekend or after hours one night
0
 
LVL 72

Expert Comment

by:Qlemo
ID: 39232897
I've requested that this question be closed as follows:

Accepted answer: 350 points for BigPapaGotti's comment #a39168831
Assisted answer: 0 points for wpmcj's comment #a39169071

for the following reason:

This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Take Control of Web Hosting For Your Clients

As a web developer or IT admin, successfully managing multiple client accounts can be challenging. In this webinar we will look at the tools provided by Media Temple and Plesk to make managing your clients’ hosting easier.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
If you are looking for an automated solution for backup single or multiple Office 365 user mailboxes to Outlook data file, then you can use Kernel Office 365 Backup & Restore tool. Go through the video to check out the steps to backup single or mult…
Suggested Courses

601 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question