Solved

Sonicwall TZ205 - Question about Connection Monitor - How to Identify Access Rules

Posted on 2013-10-27
3
704 Views
Last Modified: 2013-12-02
Hi Peeps,
Ive started supporting a TZ205 running SonicOS Enhanced 5.8.1.8-37o

This FW has lots of custom Access Rules and I need to clean them up.  

Is there any way to see which connections map to which Firewall Access Rule?

(apart from comparing 'connection monitor' results with each zone to zone access rules manually)

Many thanks
Tom
0
Comment
Question by:TreadStone_IT
  • 2
3 Comments
 
LVL 24

Assisted Solution

by:diverseit
diverseit earned 500 total points
ID: 39604594
Hi Tom,

If you hover over the Access Rules on the far right icon (Statistics) it will show you how many connections and by that you can determine if they are active or not.
0
 

Author Comment

by:TreadStone_IT
ID: 39604678
Thanks for the reply and info diverseit.    

I did find that feature has been really useful up to now.  In the case of lots of rules though, I was looking for, hoping there may be something more concrete in the diagnostics\packet capture area of the FW.

Cheers
Tom
0
 
LVL 24

Accepted Solution

by:
diverseit earned 500 total points
ID: 39604759
Are these Access Rules WAN > LAN or LAN > WAN?

Try Systems > Diagnostics then select the Connections Monitor. From there you can filter the connections you want to look at and also view all the current connections under the Active Connections Monitor.

Also, Systems > Packet Monitor if you need an actual packet monitor.

You probably already know this but I'd recommend disabling the Access Rules instead of just deleting them. I'd give it some time to see if any issues pop up.
Let me know how it goes!

P.S. is Threadstone in homage to the Bourne series by chance?
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Is your computer hacked? learn how to detect and delete malware in your PC
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now