Solved

Sonicwall: How to open inbound/outbound traffic on Port 8080

Posted on 2015-02-03
3
3,653 Views
Last Modified: 2015-02-09
I would like some instruction on opening port 8080 for a Muzak device inside our network.  

The only instructions I was give is as follows:  Ports 80, 443. and 8080 must be open for all inbound/outbound traffic.  The device will get a dhcp address by default.

I have attempted to open the ports, however when testing the open ports at http://www.canyouseeme.org/, 80 is open, however 443 and 8080 are not.

Model:      TZ 100
Firmware Version:      SonicOS Enhanced 5.8.1.14-68o
Safemode Version:      SafeMode 5.0.2.2
ROM Version:      SonicROM 5.0.3.2

Step by step, if possible.
Thank you,
muG
0
Comment
Question by:Kris Montgomery
3 Comments
 
LVL 20

Accepted Solution

by:
carlmd earned 167 total points
ID: 40588430
The following will provide you with the instructions you need.

https://support.software.dell.com/sonicwall-tz-series/kb/sw4535
0
 
LVL 63

Assisted Solution

by:btan
btan earned 167 total points
ID: 40588588
To add on, this is another handy step by step short article on how to allow DVR traffic thru SonicWALL. You can go port specific like in this use case https://support.software.dell.com/kb/sw12189, port range forwarding is another consideration if you wanted specific port traffic to route to certain server etc http://everydaylife.globalpost.com/port-forward-sonicwall-25703.html

Besides the use different port for management as shared by expert, also the basic of having any deny rule should always be the lowest in queue (hence lowest priority) by default of your inbound zones for WAN>LAN and WAN><All other zones created ...>.
0
 
LVL 39

Assisted Solution

by:Aaron Tomosky
Aaron Tomosky earned 166 total points
ID: 40588857
Use the public server wizard, then add the 8080 service to the group that gets created.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question