Solved

Sonicwall Tz200 has latest firmware

Posted on 2013-06-19
4
514 Views
Last Modified: 2013-07-08
Hello All,
I have noticed many of my pcs gettings port scans. How are the scans getting passed an industry grade sonciwall which has the correct rules and firewall in place. Does anyone know a good sonicwall free guide? I am pretty good at it but see so many scans bypassing the sonicwall. Has anyone put a smoothwall in between a sonicwall and the rest of the network?
PCs log port scans, I am using Symantec Endpoint Protection 12.1.3. Thanks,
J
0
Comment
Question by:dronethought
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
AbhishekJha earned 500 total points
ID: 39258849
Enable Stealth Mode in sonicwall firewall.
0
 
LVL 12

Expert Comment

by:ryan80
ID: 39260249
where are the port scans coming from? Are you sure it is not an internal issue? If nating is enabled then i dont see how the port scans would be coming from the outside.
0
 
LVL 2

Author Comment

by:dronethought
ID: 39260580
Hello. The sonicwall is on stealth mode. And has the latest firmware. The port scans seem to be coming from websites that the person goes to...are the websites scanning their users? Nat is enabled. The sites that are port scanning are major sites like Forbes and the like. I looked to see if the scans are internal and they might be and I will do more research. Right now, I shut everything down and the only sites connected are Symantec and Microsoft which is correct. Is there a good network utility out there that will monitor my entire network in real time? Thank you.
0
 
LVL 12

Expert Comment

by:ryan80
ID: 39260598
What does the alert say from SEP?
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question