Solved

Sonicwall Wireless Subinterface not working

Posted on 2016-08-31
2
78 Views
Last Modified: 2016-09-01
I have a Sonicwall NSA240 with 8 SonicPoints.

The WLAN works fine with with just one WLAN zone and one Sonicwall Provisoning Profile applied to the Sonicpoints.
 
I have created another wireless Zone called Corporate, a Subinterface for Corporate, a VAP for Corporate and VAP Group with just Corporate in it.

I have assigned one of my Sonicpoints to use the VAP Group, it broadcasts the SSID and clients connect and authenticate with no problems.

Unfortunately, no traffic flows. The client does not get an IP address for that  subinterface and even when I give it a manual IP address still nothing flows.

I have allowed all traffic in Firewall Access Rules.

What am I missing?

Any help wouldbe greatly appreicated.
0
Comment
Question by:matedwards
2 Comments
 
LVL 8

Accepted Solution

by:
J Spoor earned 500 total points
ID: 41778166
Is it directly connected? Or via a switch?

VAPs use VLAN IDs, so if you use a switch you need to set up VLAN trunking.

There's an Active config on the TZ600 with VAPs and an X-Series switch on LiveDemo.


View example configurations and the SonicWALL webui and features on http://livedemo.sonicwall.com or http://ngfw-demo.com

Multiply the effectiveness of your APT Sandbox, stop unknown and zero-day attacks at the gateway. See a demo on http://apt-demo.com or http://atp.demo.com

You can also view the Next-Generation Firewalls via
http://next-generation-firewall.com or http://next-generation-firewall-demo.com
0
 

Author Closing Comment

by:matedwards
ID: 41779892
Absolutely right. i believed it was an umanaged layer 2 switch but I tested a Sonicpoint connected straight to the Sonicwall and it all worked.

many thanks JSpoor
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question