Solved

Access Rule in Sonicwall

Posted on 2013-10-30
4
756 Views
Last Modified: 2013-10-30
Under Access rule in Sonicwall Pro 4060, an access rule has been created flowing from WAN to LAN zone and the destination is defined as WAN IP address.

As the flow is from WAN, I suppose the source IP should be WAN IP address. Why is appeared like this ?

Tks
Test.png
0
Comment
Question by:AXISHK
  • 2
4 Comments
 
LVL 24

Assisted Solution

by:diverseit
diverseit earned 250 total points
ID: 39610889
Hi AXISHK,

Yes, your rule in the attachment should be set to the WAN Primary IP or WAN IP rather than the numerical value of your IP, if possible (the Pro 4060 is an older model so it may only allow for the numerical IP value).

The WAN > LAN deny rule is what makes your firewall a firewall. You should have those in any Zone you want by default blocked (typically the WAN > {firewalled subnet, e.g. LAN, DMZ, WLAN, etc.}). The Destination should actually be Any because it will block all WAN IPs that way.

Your default deny Access Rule should read as follows:

From: WAN
To: LAN
Priority: <lowest, if you have 3 Access Rules here it should be last or in this case #3>
Source: Any
Destination: Any
Service: Any
Action: Deny or Discard
Users Incl.: All
Users Excl.: None
Comment: <whatever you want to document this rule>

Let me know if you have any questions!
0
 
LVL 16

Accepted Solution

by:
Shaik M. Sajid earned 250 total points
ID: 39610897
it means external traffice coming from the WAN traffic from the IP (Destination=113.2.x.x) allow to lan on specific service... (could be RDP)

guided article :
http://support.microsoft.com/kb/304304

all the best
0
 

Author Closing Comment

by:AXISHK
ID: 39611110
Tks
0
 
LVL 24

Expert Comment

by:diverseit
ID: 39612761
Glad I could help...thanks for the points!
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now