Solved

Sonicwall: How to open inbound/outbound traffic on Port 8080

Posted on 2015-02-03
3
3,055 Views
Last Modified: 2015-02-09
I would like some instruction on opening port 8080 for a Muzak device inside our network.  

The only instructions I was give is as follows:  Ports 80, 443. and 8080 must be open for all inbound/outbound traffic.  The device will get a dhcp address by default.

I have attempted to open the ports, however when testing the open ports at http://www.canyouseeme.org/, 80 is open, however 443 and 8080 are not.

Model:      TZ 100
Firmware Version:      SonicOS Enhanced 5.8.1.14-68o
Safemode Version:      SafeMode 5.0.2.2
ROM Version:      SonicROM 5.0.3.2

Step by step, if possible.
Thank you,
muG
0
Comment
Question by:Kris Montgomery
3 Comments
 
LVL 20

Accepted Solution

by:
carlmd earned 167 total points
ID: 40588430
The following will provide you with the instructions you need.

https://support.software.dell.com/sonicwall-tz-series/kb/sw4535
0
 
LVL 62

Assisted Solution

by:btan
btan earned 167 total points
ID: 40588588
To add on, this is another handy step by step short article on how to allow DVR traffic thru SonicWALL. You can go port specific like in this use case https://support.software.dell.com/kb/sw12189, port range forwarding is another consideration if you wanted specific port traffic to route to certain server etc http://everydaylife.globalpost.com/port-forward-sonicwall-25703.html

Besides the use different port for management as shared by expert, also the basic of having any deny rule should always be the lowest in queue (hence lowest priority) by default of your inbound zones for WAN>LAN and WAN><All other zones created ...>.
0
 
LVL 38

Assisted Solution

by:Aaron Tomosky
Aaron Tomosky earned 166 total points
ID: 40588857
Use the public server wizard, then add the 8080 service to the group that gets created.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now