Solved

Configure secondary block of public IPs on Sonicwall NSA 3500

Posted on 2014-04-28
6
1,249 Views
Last Modified: 2014-05-03
I have a Sonicwall NSA 3500 firewall. I have a primary block of public IP addresses that are working fine but I need to utilize a second block of IPs that are routing over the primary from the telco side. Does anyone know how to configure this on a sonic wall? I am not finding much info on it. I have done the NATing and firewall rules etc but I don't see a place to configure the gateway on the firewall for the 2nd block of IPs.
0
Comment
Question by:DaveKall42
  • 3
  • 3
6 Comments
 
LVL 4

Expert Comment

by:wsawalhi
ID: 40028106
Hi,

Is this for a second internet connection? can you please provide more information?
what are you trying to accomplish.

Thank you
Sam
0
 

Author Comment

by:DaveKall42
ID: 40028115
No this is on the primary connection.  There is a secondary set up IP addresses that have been provided by the telco provider that route over the first set.
0
 
LVL 4

Expert Comment

by:wsawalhi
ID: 40028202
To help me better assist you with your question.
Here what I'm gathering from your question. You have a SonicWall NSA 3500 (which is currently up and running with one public IP address that was provided to you from your ISP. Correct?
but you were also provided with additional IP addresses that you would like to configure in your SonicWall.

The additional IP addresses are/will they be pointing to any network devices, Servers or any device with an IP address? if your answer is no then there is nothing you will need to configure, but if do have IP devices behind the SonicWall then this is relatively straightforward. There are essentially two parts required. First, a NAT rule providing address translation, and a firewall access rule, permitting traffic to cross zones.

For the NAT piece, create a rule that keeps the originating IP intact, but translates from your external static IP, to your internal DMZ, and does so for whatever specific service (TCP/IP port) you wish to translate. I would also recommend making a second rule for ICMP traffic, so you can ping the server from the outside world.

    Original Source: Any
    Translated Source: Original
    Original Service:
    Translated Service: Original.
    Original Destination: External IP address object
    Translated Destination: Internal DMZ IP address

Next, you need to enable that service in the firewall. You'll also want a second rule for ICMP traffic, so those pings work. These two rules will be created the From WAN to DMZ. (Or whatever zone you have your server in)

    Source: Any
    Destination: External IP address object.
    Service:
    Action: Allow
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 

Accepted Solution

by:
DaveKall42 earned 0 total points
ID: 40028212
No, actually the first set of IP addresses is working fine.  We have a 2nd set of IPs in a different subnet that are routing over the primary set of IPs.  I actually just fixed the issue as I had to add a static arp entry and a routing entry for the 2nd set of IPs and that fixed the issue.  Thanks for your assistance though.  :)
0
 
LVL 4

Expert Comment

by:wsawalhi
ID: 40028220
I'm glad you did...Cheers!

Thank you,
Sam
0
 

Author Closing Comment

by:DaveKall42
ID: 40039048
I was able to find a solution to the issue and it was what I put in the comment field.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question