Solved

how to allow google earth traffic

Posted on 2013-05-20
8
1,768 Views
Last Modified: 2013-06-27
Hi,

   How do I allow google earth traffic on sonicwall?

TIA

Moitz
0
Comment
Question by:moitz
  • 3
  • 3
8 Comments
 
LVL 20

Expert Comment

by:carlmd
ID: 39180556
You need to permit all traffic for

maps.google.com
geoauth.google.com
0
 

Author Comment

by:moitz
ID: 39181001
were using Sonicwall NSA 3500, under the App Control Advance there's a Google Earth how do I use this?

with regards to

maps.google.com
geoauth.google.com

where do I set this on content filtering?

sorry I'm quite new to firewall setups.
0
 
LVL 20

Expert Comment

by:carlmd
ID: 39181027
Do you have App Control turned on for the LAN zone? Go to Network -> Zones then click on configure for LAN and look at the check box for "Enable App Control", is it checked?

If not, then turning it on will required that you go through and insure the configuration is set for all the things you want, otherwise you might be creating other problems.

If it is on, then by default it is not blocking it, so someone would have had to set this if that is the case.
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 

Author Comment

by:moitz
ID: 39181517
on the Network -> Zone > Enable App Control Server (enable) already but still the same

on the Google Earth

Direction: Outgoing to Server
BlocK: Disable
Included Users/Group: Use App Settings(All)
Excluded Users/Group: Use App Settings(None)
Included IP Address Range: Use App Settings(All)
Excluded IP Address Range: Use App Settings(None)
0
 
LVL 20

Accepted Solution

by:
carlmd earned 500 total points
ID: 39183864
I don't believe your problem has to do with app control. Just to be sure, turn it off and try accessing Google Earth. Does it work or not?
0
 
LVL 68

Expert Comment

by:Qlemo
ID: 39283460
I've requested that this question be deleted for the following reason:

Not enough information to confirm an answer.
0
 

Author Closing Comment

by:moitz
ID: 39283461
thanks for the idea
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This video discusses moving either the default database or any database to a new volume.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now