Solved

How to Use two internet line's for two different subnet or network separately. Sonicwall  TZ 210

Posted on 2016-09-22
4
62 Views
Last Modified: 2016-09-22
How to Use two internet line's for two different subnet or network separately in same Sonicwall  TZ 210.

1. 192.168.1.1   Network 1    ( 1st  internet line )
2. 120.188.0.1   Network 2    ( 2nd internet line)
0
Comment
Question by:Pravin M
  • 2
  • 2
4 Comments
 
LVL 7

Expert Comment

by:J Spoor
ID: 41810675
https://www.youtube.com/watch?v=3wn9Q_v6MVU

https://www.youtube.com/watch?v=R6HCfugJ0Oo



View example configurations and the SonicWALL webui and features on http://livedemo.sonicwall.com or http://ngfw-demo.com

Multiply the effectiveness of your APT Sandbox, stop unknown and zero-day attacks at the gateway. See a demo on http://apt-demo.com or http://atp.demo.com

You can also view the Next-Generation Firewalls via
http://next-generation-firewall.com or http://next-generation-firewall-demo.com
0
 

Author Comment

by:Pravin M
ID: 41810741
Untitled1.png
0
 
LVL 7

Accepted Solution

by:
J Spoor earned 500 total points
ID: 41810783
use a policy based route with source lan 2, destination any, gw X4 def gw, int X4
0
 

Author Closing Comment

by:Pravin M
ID: 41810884
Thanks  JSpoor
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now