Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Sonicwall Scheduling

Posted on 2016-10-06
4
Medium Priority
?
49 Views
Last Modified: 2016-10-06
I have a client that has User Authentication on for internet traffic. We need our remote agent to pass thru but it uses https protocol not http so we cannot use the bypass authentication URL feature. The customer does not want to modify his config via SSO. I was thinking of scheduling but I'm afraid with the user authentication still in place, it will still not allow our agent to bypass. Is there a way to use the bypass authentication for https URLs in the Sonicwall?
0
Comment
Question by:LightWire
  • 3
4 Comments
 
LVL 10

Expert Comment

by:J Spoor
ID: 41831929
enable and configure DPI-SSL
0
 
LVL 10

Expert Comment

by:J Spoor
ID: 41831931
see example configs on http://livedemo.sonicwall.com
0
 

Author Comment

by:LightWire
ID: 41832378
I don't see the DPI-SSL section.  They have a TZ 205
Capture.PNG
0
 
LVL 10

Accepted Solution

by:
J Spoor earned 2000 total points
ID: 41832422
I suggest secure upgrade to a TZ300.
205 is very old and limited in what it can do

alternative is to make a firewall rule using fqdn objects with a higher priority and without authentication.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question