Solved

Dell SonicWall - How do I immediately terminate a connection

Posted on 2013-11-06
17
2,732 Views
Last Modified: 2016-11-23
I have a device using a lot of bandwidth. I don't know how to identify the person since I only have an IP address, and I don't know how to get the device name from the wireless device. How I can force them off our connection immediately? Thank you!
0
Comment
Question by:Kris5454
  • 8
  • 6
  • 3
17 Comments
 
LVL 37

Expert Comment

by:Bing CISM / CISSP
ID: 39628152
which version of SonicOS are you running on the given device? what's the model name?
0
 

Author Comment

by:Kris5454
ID: 39628157
Dell SonicWall NSA 3600
0
 
LVL 37

Expert Comment

by:Bing CISM / CISSP
ID: 39628223
what's the version of SonicOS?
0
 

Author Comment

by:Kris5454
ID: 39628233
Can you please tell me where to find that information?
0
 
LVL 37

Expert Comment

by:Bing CISM / CISSP
ID: 39628264
log on the web console of your SonicWALL device, commonly the System Information is under System > Status under in the left pane.
0
 

Author Comment

by:Kris5454
ID: 39628390
SonicOS Enhanced 6.1.1.1-9n
SonicROM 5.4.0.13
0
 
LVL 24

Expert Comment

by:diverseit
ID: 39628495
Hi  Kris5454,

To block a wireless device, simply go to Wireless > Status, then click the Block icon, which will automatically add an Address Object for the device's MAC address and add it to the Default ACL Deny Group.

Then all you have to do is enabled/setup MAC Filter List (Wireless > MAC Filter List, then put a checkmark next to Enable MAC Filter List). By default the Deny List: will already have selected the Default ACL Deny Group. Now you have two options under the Allow List: , either:
a) select Allow All MAC Addresses, which will do just that except for any MAC addresses found in the block list or
b) Create an Allow List Group , select it and explicitly add each MAC address you want to access the WLAN.
Let me know if you have any questions!
0
 

Author Comment

by:Kris5454
ID: 39628514
How do I get to the "Wireless" area? I don't see it as an option on the left side of the menu for the SonicWall.
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 
LVL 24

Expert Comment

by:diverseit
ID: 39628519
You provided the SonicOS version but what model is it (should be located in the same place as the SonicOS)?

Can you provide a screenshot of your left pane once logged into the SonicWALL?

Depending on your model you may not have built-in Wireless. If that is the case, get the MAC address from the DHCP Server Current Lease or ARP Cache sections and create an Access Rule to deny the MAC Address from its Zone to the WAN.
0
 

Author Comment

by:Kris5454
ID: 39628528
NSA 3600

DellSonic Menu
0
 
LVL 24

Expert Comment

by:diverseit
ID: 39628534
Ok, the NSA 3600 doesn't have built-in wireless as a feature...that feature stops in models after NSA 250M.

So in this case, get the MAC address from the DHCP Server Current Lease or ARP Cache sections and create an Access Rule to deny the MAC Address from its Zone to the WAN.
0
 

Author Comment

by:Kris5454
ID: 39628588
I'm almost there, but how do you specify which MAC address to deny? There isn't a field to enter that data. I can pick a group of users, but not an individual address.
0
 
LVL 24

Accepted Solution

by:
diverseit earned 500 total points
ID: 39628599
To block a host from accessing the Internet you need to create an Address Object for the specific device. Setup the Address Object as follows:
Name: <any name you desire to identify it>
Zone Assignment: WLAN or whatever zone the workstation is currently connected to.
Type: MAC
MAC Address: <input the MAC address from the suspicious workstation >
Now go to Access Rules and setup a new Rules as follows:
Action: Deny or Discard (if applicable)
From: WLAN
To: WAN
Service: HTTP or whatever services you wish to block
Source: <select the Address Object we just create above.>
Destination: Any
Users: All
Schedule: Always on
Comment: whatever you want to document this rule
Logging: Checked
Allow Fragmented Packets: Checked
It is important to block this workstation by MAC address rather than IP since all they have to do is either manually change the IP or get issued a new one by the DHCP server in order to circumvent an IP Address block.

Let me know if you have any questions!
1
 

Author Comment

by:Kris5454
ID: 39628613
Thank you very much!
0
 
LVL 24

Expert Comment

by:diverseit
ID: 39628617
My pleasure!
0
 

Author Closing Comment

by:Kris5454
ID: 39628618
I really appreciate the detailed step by step instructions.
0
 
LVL 24

Expert Comment

by:diverseit
ID: 39628629
No problem...that is what we're here for! I'm glad I could help and thanks for the points.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Need WiFi? Often, there are perfectly good networks that don't have WiFi capability - and there's a need to add it.  - Perhaps you have an Ethernet port into a network but no WiFi nearby. - Perhaps you have a powerline extender and no WiFi at the…
This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now