Solved

Access Rule in Sonicwall

Posted on 2013-10-30
4
770 Views
Last Modified: 2013-10-30
Under Access rule in Sonicwall Pro 4060, an access rule has been created flowing from WAN to LAN zone and the destination is defined as WAN IP address.

As the flow is from WAN, I suppose the source IP should be WAN IP address. Why is appeared like this ?

Tks
Test.png
0
Comment
Question by:AXISHK
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 25

Assisted Solution

by:Blue Street Tech
Blue Street Tech earned 250 total points
ID: 39610889
Hi AXISHK,

Yes, your rule in the attachment should be set to the WAN Primary IP or WAN IP rather than the numerical value of your IP, if possible (the Pro 4060 is an older model so it may only allow for the numerical IP value).

The WAN > LAN deny rule is what makes your firewall a firewall. You should have those in any Zone you want by default blocked (typically the WAN > {firewalled subnet, e.g. LAN, DMZ, WLAN, etc.}). The Destination should actually be Any because it will block all WAN IPs that way.

Your default deny Access Rule should read as follows:

From: WAN
To: LAN
Priority: <lowest, if you have 3 Access Rules here it should be last or in this case #3>
Source: Any
Destination: Any
Service: Any
Action: Deny or Discard
Users Incl.: All
Users Excl.: None
Comment: <whatever you want to document this rule>

Let me know if you have any questions!
0
 
LVL 16

Accepted Solution

by:
Shaik M. Sajid earned 250 total points
ID: 39610897
it means external traffice coming from the WAN traffic from the IP (Destination=113.2.x.x) allow to lan on specific service... (could be RDP)

guided article :
http://support.microsoft.com/kb/304304

all the best
0
 

Author Closing Comment

by:AXISHK
ID: 39611110
Tks
0
 
LVL 25

Expert Comment

by:Blue Street Tech
ID: 39612761
Glad I could help...thanks for the points!
0

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question