Solved

Sonicwall Scheduling

Posted on 2016-10-06
4
41 Views
Last Modified: 2016-10-06
I have a client that has User Authentication on for internet traffic. We need our remote agent to pass thru but it uses https protocol not http so we cannot use the bypass authentication URL feature. The customer does not want to modify his config via SSO. I was thinking of scheduling but I'm afraid with the user authentication still in place, it will still not allow our agent to bypass. Is there a way to use the bypass authentication for https URLs in the Sonicwall?
0
Comment
Question by:lightwireinc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 8

Expert Comment

by:J Spoor
ID: 41831929
enable and configure DPI-SSL
0
 
LVL 8

Expert Comment

by:J Spoor
ID: 41831931
see example configs on http://livedemo.sonicwall.com
0
 

Author Comment

by:lightwireinc
ID: 41832378
I don't see the DPI-SSL section.  They have a TZ 205
Capture.PNG
0
 
LVL 8

Accepted Solution

by:
J Spoor earned 500 total points
ID: 41832422
I suggest secure upgrade to a TZ300.
205 is very old and limited in what it can do

alternative is to make a firewall rule using fqdn objects with a higher priority and without authentication.
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question