[Webinar] Streamline your web hosting managementRegister Today

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1301
  • Last Modified:

Configure secondary block of public IPs on Sonicwall NSA 3500

I have a Sonicwall NSA 3500 firewall. I have a primary block of public IP addresses that are working fine but I need to utilize a second block of IPs that are routing over the primary from the telco side. Does anyone know how to configure this on a sonic wall? I am not finding much info on it. I have done the NATing and firewall rules etc but I don't see a place to configure the gateway on the firewall for the 2nd block of IPs.
0
DaveKall42
Asked:
DaveKall42
  • 3
  • 3
1 Solution
 
Sam SawalhiIT ConsultantCommented:
Hi,

Is this for a second internet connection? can you please provide more information?
what are you trying to accomplish.

Thank you
Sam
0
 
DaveKall42Author Commented:
No this is on the primary connection.  There is a secondary set up IP addresses that have been provided by the telco provider that route over the first set.
0
 
Sam SawalhiIT ConsultantCommented:
To help me better assist you with your question.
Here what I'm gathering from your question. You have a SonicWall NSA 3500 (which is currently up and running with one public IP address that was provided to you from your ISP. Correct?
but you were also provided with additional IP addresses that you would like to configure in your SonicWall.

The additional IP addresses are/will they be pointing to any network devices, Servers or any device with an IP address? if your answer is no then there is nothing you will need to configure, but if do have IP devices behind the SonicWall then this is relatively straightforward. There are essentially two parts required. First, a NAT rule providing address translation, and a firewall access rule, permitting traffic to cross zones.

For the NAT piece, create a rule that keeps the originating IP intact, but translates from your external static IP, to your internal DMZ, and does so for whatever specific service (TCP/IP port) you wish to translate. I would also recommend making a second rule for ICMP traffic, so you can ping the server from the outside world.

    Original Source: Any
    Translated Source: Original
    Original Service:
    Translated Service: Original.
    Original Destination: External IP address object
    Translated Destination: Internal DMZ IP address

Next, you need to enable that service in the firewall. You'll also want a second rule for ICMP traffic, so those pings work. These two rules will be created the From WAN to DMZ. (Or whatever zone you have your server in)

    Source: Any
    Destination: External IP address object.
    Service:
    Action: Allow
0
The eGuide to Automating Firewall Change Control

Today‚Äôs IT environment is constantly changing, which affects security policies and firewall rules. Discover tips to help you embrace this change through process improvement & identify areas where automation & actionable intelligence can enhance both security and business agility.

 
DaveKall42Author Commented:
No, actually the first set of IP addresses is working fine.  We have a 2nd set of IPs in a different subnet that are routing over the primary set of IPs.  I actually just fixed the issue as I had to add a static arp entry and a routing entry for the 2nd set of IPs and that fixed the issue.  Thanks for your assistance though.  :)
0
 
Sam SawalhiIT ConsultantCommented:
I'm glad you did...Cheers!

Thank you,
Sam
0
 
DaveKall42Author Commented:
I was able to find a solution to the issue and it was what I put in the comment field.
0

Featured Post

Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now