Solved

Configure secondary block of public IPs on Sonicwall NSA 3500

Posted on 2014-04-28
6
1,230 Views
Last Modified: 2014-05-03
I have a Sonicwall NSA 3500 firewall. I have a primary block of public IP addresses that are working fine but I need to utilize a second block of IPs that are routing over the primary from the telco side. Does anyone know how to configure this on a sonic wall? I am not finding much info on it. I have done the NATing and firewall rules etc but I don't see a place to configure the gateway on the firewall for the 2nd block of IPs.
0
Comment
Question by:DaveKall42
  • 3
  • 3
6 Comments
 
LVL 4

Expert Comment

by:wsawalhi
Comment Utility
Hi,

Is this for a second internet connection? can you please provide more information?
what are you trying to accomplish.

Thank you
Sam
0
 

Author Comment

by:DaveKall42
Comment Utility
No this is on the primary connection.  There is a secondary set up IP addresses that have been provided by the telco provider that route over the first set.
0
 
LVL 4

Expert Comment

by:wsawalhi
Comment Utility
To help me better assist you with your question.
Here what I'm gathering from your question. You have a SonicWall NSA 3500 (which is currently up and running with one public IP address that was provided to you from your ISP. Correct?
but you were also provided with additional IP addresses that you would like to configure in your SonicWall.

The additional IP addresses are/will they be pointing to any network devices, Servers or any device with an IP address? if your answer is no then there is nothing you will need to configure, but if do have IP devices behind the SonicWall then this is relatively straightforward. There are essentially two parts required. First, a NAT rule providing address translation, and a firewall access rule, permitting traffic to cross zones.

For the NAT piece, create a rule that keeps the originating IP intact, but translates from your external static IP, to your internal DMZ, and does so for whatever specific service (TCP/IP port) you wish to translate. I would also recommend making a second rule for ICMP traffic, so you can ping the server from the outside world.

    Original Source: Any
    Translated Source: Original
    Original Service:
    Translated Service: Original.
    Original Destination: External IP address object
    Translated Destination: Internal DMZ IP address

Next, you need to enable that service in the firewall. You'll also want a second rule for ICMP traffic, so those pings work. These two rules will be created the From WAN to DMZ. (Or whatever zone you have your server in)

    Source: Any
    Destination: External IP address object.
    Service:
    Action: Allow
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 

Accepted Solution

by:
DaveKall42 earned 0 total points
Comment Utility
No, actually the first set of IP addresses is working fine.  We have a 2nd set of IPs in a different subnet that are routing over the primary set of IPs.  I actually just fixed the issue as I had to add a static arp entry and a routing entry for the 2nd set of IPs and that fixed the issue.  Thanks for your assistance though.  :)
0
 
LVL 4

Expert Comment

by:wsawalhi
Comment Utility
I'm glad you did...Cheers!

Thank you,
Sam
0
 

Author Closing Comment

by:DaveKall42
Comment Utility
I was able to find a solution to the issue and it was what I put in the comment field.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now