?
Solved

Sonicwall TZ205 - Question about Connection Monitor - How to Identify Access Rules

Posted on 2013-10-27
3
Medium Priority
?
746 Views
Last Modified: 2013-12-02
Hi Peeps,
Ive started supporting a TZ205 running SonicOS Enhanced 5.8.1.8-37o

This FW has lots of custom Access Rules and I need to clean them up.  

Is there any way to see which connections map to which Firewall Access Rule?

(apart from comparing 'connection monitor' results with each zone to zone access rules manually)

Many thanks
Tom
0
Comment
Question by:TreadStone_IT
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 26

Assisted Solution

by:Blue Street Tech
Blue Street Tech earned 2000 total points
ID: 39604594
Hi Tom,

If you hover over the Access Rules on the far right icon (Statistics) it will show you how many connections and by that you can determine if they are active or not.
0
 

Author Comment

by:TreadStone_IT
ID: 39604678
Thanks for the reply and info diverseit.    

I did find that feature has been really useful up to now.  In the case of lots of rules though, I was looking for, hoping there may be something more concrete in the diagnostics\packet capture area of the FW.

Cheers
Tom
0
 
LVL 26

Accepted Solution

by:
Blue Street Tech earned 2000 total points
ID: 39604759
Are these Access Rules WAN > LAN or LAN > WAN?

Try Systems > Diagnostics then select the Connections Monitor. From there you can filter the connections you want to look at and also view all the current connections under the Active Connections Monitor.

Also, Systems > Packet Monitor if you need an actual packet monitor.

You probably already know this but I'd recommend disabling the Access Rules instead of just deleting them. I'd give it some time to see if any issues pop up.
Let me know how it goes!

P.S. is Threadstone in homage to the Bourne series by chance?
0

Featured Post

Enroll in October's Free Course of the Month

Do you work with and analyze data? Enroll in October's Course of the Month for 7+ hours of SQL training, allowing you to quickly and efficiently store or retrieve data. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we’ll look at how to deploy ProxySQL.
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question