?
Solved

Sonicwall TZ205 - Question about Connection Monitor - How to Identify Access Rules

Posted on 2013-10-27
3
Medium Priority
?
752 Views
Last Modified: 2013-12-02
Hi Peeps,
Ive started supporting a TZ205 running SonicOS Enhanced 5.8.1.8-37o

This FW has lots of custom Access Rules and I need to clean them up.  

Is there any way to see which connections map to which Firewall Access Rule?

(apart from comparing 'connection monitor' results with each zone to zone access rules manually)

Many thanks
Tom
0
Comment
Question by:TreadStone_IT
  • 2
3 Comments
 
LVL 27

Assisted Solution

by:Blue Street Tech
Blue Street Tech earned 2000 total points
ID: 39604594
Hi Tom,

If you hover over the Access Rules on the far right icon (Statistics) it will show you how many connections and by that you can determine if they are active or not.
0
 

Author Comment

by:TreadStone_IT
ID: 39604678
Thanks for the reply and info diverseit.    

I did find that feature has been really useful up to now.  In the case of lots of rules though, I was looking for, hoping there may be something more concrete in the diagnostics\packet capture area of the FW.

Cheers
Tom
0
 
LVL 27

Accepted Solution

by:
Blue Street Tech earned 2000 total points
ID: 39604759
Are these Access Rules WAN > LAN or LAN > WAN?

Try Systems > Diagnostics then select the Connections Monitor. From there you can filter the connections you want to look at and also view all the current connections under the Active Connections Monitor.

Also, Systems > Packet Monitor if you need an actual packet monitor.

You probably already know this but I'd recommend disabling the Access Rules instead of just deleting them. I'd give it some time to see if any issues pop up.
Let me know how it goes!

P.S. is Threadstone in homage to the Bourne series by chance?
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
How does someone stay on the right and legal side of the hacking world?
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question