Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Sonicwall Pro2400 Port Forwarding question

Posted on 2014-09-30
3
Medium Priority
?
395 Views
Last Modified: 2014-10-01
We have only one Public IP address to use and need to forward port 80 to seperate devices behind the firewall.  Now I'm aware that in most cases you would need a seperate public IP address for each device if it is using the same port.

My question is with the Sonicwall is there a way to direct traffic maybe based on the source IP to access the correct device on port 80?   Both vendors will be connecting FROM the same IP or range of IP's.

Thanks.
0
Comment
Question by:Webcc
  • 2
3 Comments
 
LVL 18

Expert Comment

by:Don S.
ID: 40352825
Sonicwall does not have that capability.  What you are looking for is a reverse proxy or utilize HTTP headers to route to the proper website.
0
 

Author Comment

by:Webcc
ID: 40353169
That's what I thought.  How involved would it be to setup a reverse proxy and would Squid be an obvious choice?
0
 
LVL 18

Accepted Solution

by:
Don S. earned 2000 total points
ID: 40354190
There is some complexity, but not too bad.  Actually, you can do it with apache web server if you want.  Not much visibility there but it can work.  Squid will work.  Both work best on a linux base though.  I've had permissions issues when trying to get squid to work in windows server.  The easiest was microsoft's ISA server, but they don't offer that any more.
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question