?
Solved

Sonicwall TZ205 - Question about Connection Monitor - How to Identify Access Rules

Posted on 2013-10-27
3
Medium Priority
?
739 Views
Last Modified: 2013-12-02
Hi Peeps,
Ive started supporting a TZ205 running SonicOS Enhanced 5.8.1.8-37o

This FW has lots of custom Access Rules and I need to clean them up.  

Is there any way to see which connections map to which Firewall Access Rule?

(apart from comparing 'connection monitor' results with each zone to zone access rules manually)

Many thanks
Tom
0
Comment
Question by:TreadStone_IT
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 25

Assisted Solution

by:Blue Street Tech
Blue Street Tech earned 2000 total points
ID: 39604594
Hi Tom,

If you hover over the Access Rules on the far right icon (Statistics) it will show you how many connections and by that you can determine if they are active or not.
0
 

Author Comment

by:TreadStone_IT
ID: 39604678
Thanks for the reply and info diverseit.    

I did find that feature has been really useful up to now.  In the case of lots of rules though, I was looking for, hoping there may be something more concrete in the diagnostics\packet capture area of the FW.

Cheers
Tom
0
 
LVL 25

Accepted Solution

by:
Blue Street Tech earned 2000 total points
ID: 39604759
Are these Access Rules WAN > LAN or LAN > WAN?

Try Systems > Diagnostics then select the Connections Monitor. From there you can filter the connections you want to look at and also view all the current connections under the Active Connections Monitor.

Also, Systems > Packet Monitor if you need an actual packet monitor.

You probably already know this but I'd recommend disabling the Access Rules instead of just deleting them. I'd give it some time to see if any issues pop up.
Let me know how it goes!

P.S. is Threadstone in homage to the Bourne series by chance?
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses
Course of the Month9 days, 18 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question