Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Sonicwall Scheduling

Posted on 2016-10-06
4
Medium Priority
?
46 Views
Last Modified: 2016-10-06
I have a client that has User Authentication on for internet traffic. We need our remote agent to pass thru but it uses https protocol not http so we cannot use the bypass authentication URL feature. The customer does not want to modify his config via SSO. I was thinking of scheduling but I'm afraid with the user authentication still in place, it will still not allow our agent to bypass. Is there a way to use the bypass authentication for https URLs in the Sonicwall?
0
Comment
Question by:LightWire
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 9

Expert Comment

by:J Spoor
ID: 41831929
enable and configure DPI-SSL
0
 
LVL 9

Expert Comment

by:J Spoor
ID: 41831931
see example configs on http://livedemo.sonicwall.com
0
 

Author Comment

by:LightWire
ID: 41832378
I don't see the DPI-SSL section.  They have a TZ 205
Capture.PNG
0
 
LVL 9

Accepted Solution

by:
J Spoor earned 2000 total points
ID: 41832422
I suggest secure upgrade to a TZ300.
205 is very old and limited in what it can do

alternative is to make a firewall rule using fqdn objects with a higher priority and without authentication.
0

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I had an issue with InstallShield not being able to use Computer Browser service on Windows Server 2012. Here is the solution I found.
This article will show how Aten was able to supply easy management and control for Artear's video walls and wide range display configurations of their newsroom.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question