🚩🚩 from hardening perspective and Cyber Security perspective the first rule on a Firewall should be DENY ALL !!!!!!! 🚫🚫 and not allow all. But It's a nice video, no doubt 💪
@vikpa121111 күн бұрын
no free trials option - version:26.6.0 Am i doing something wrong?
@Юра-в6й1ь21 күн бұрын
У мене 2 whatchguard firebox m470. На одному є вкладка VPN, а на іншому не має хоча повинна бути. Ви знаєте як можна активувати вкладку VPN в адмін панелі
@RoopsVideoYoutuber21 күн бұрын
How to sonicwal firewall setting up down 2 internet connection sir please video link
@Techi_Pedia_iffu26 күн бұрын
hi, please help me to how to RMA transfer the device.
@TheThaneshPrabaghan28 күн бұрын
Simple explanation
@douglasc886Ай бұрын
3:51 getting start
@MountainStateAnglerАй бұрын
Thank you for the great video. There is also nothing wrong with the background music, makes the video even more exciting to watch. :)
@Subzero9ozgАй бұрын
This is super helpful. What if you have several public ip addresses defined on the wan interface and you want to use one of the secondary ips, not the primary one for this tunnel?
@MrRadar237Ай бұрын
My clients are pulling ips but no internet… isp issue?
@davepete9537Ай бұрын
Thanks
@franklyalive23072 ай бұрын
Thank you, helped me out.
@jeffkezerian41692 ай бұрын
This is such an excellent training video! It is so clear and easy to follow. I own a small business and this just saved us $400 in IT fees! Since I am not IT trained I do have questions based on wanting to learn more, however it worked perfectly first time out! Thank you.
@TheGwill10102 ай бұрын
Thanks very much!
@shainpeter37802 ай бұрын
Johana has the sweetest and the greatest voice of the entire www!💖
@MichelleHernandez-u7h2 ай бұрын
Ava Port
@trollbackkannadiga2 ай бұрын
❤jo waiting for next video please ❤
@trollbackkannadiga2 ай бұрын
Jo is reason to study ❤❤
@jassingh94173 ай бұрын
Is there a simulator for Sonicwall practice?
@tkb123413 ай бұрын
Excellent one. Can we create multiple tunnels to same destination remote IP ? If so, can please share the configs ?
@michaelknight28973 ай бұрын
I have sonicwaves and os7. I have followed this to create corporate and guest. However, how do I limit guest to internet only, and allow corporate to see the LAN subnet?
@jasonvickorg3 ай бұрын
5 option not appearing because it was never created, in this case for me. Where do you create the initial SSMK?
@olugbengaodeyemi69663 ай бұрын
Thank you guys. This worked for me on the FTG60F model Using your Serial number sample: FGT60FTK19031157 Do the following: Username to login: maintainer Password: bcpbFGT60FTK19031157 NB: bcpb was in front of your device Serial number (FGT60FTK19031157 all in UPPERCASE). A connection to the firewall should be established. To change the admin password, type the following: In a unit where VDOMs are not enabled: config system admin edit admin set password <new password> end In a unit where VDOMs are enabled: config global config system admin edit admin set password <new password> end Thank you ALL.
@findbrownie3 ай бұрын
Crisp
@Abiki87774 ай бұрын
Your vids are top mate. Keep it up
@siavashsabouritabatabaei65264 ай бұрын
perfect
@juninhoestopim4 ай бұрын
nice video! helps a lot!
@24mjohnson4 ай бұрын
tried this on mine and didnt work. Have a new TZ570. Just trying to block it for a specific IP address but nothing I do blocks it.
@WeekendMuse4 ай бұрын
Would be good to include the steps to check that emails are actually being received.
@technicalshayaz91074 ай бұрын
You are looking beautiful
@localsiobai8764 ай бұрын
What about access rule, do we need to create an access rule fro WAN to LAN
@RozzClips4 ай бұрын
Hi what if there's 4 IP address ranges behind the sonic wall? How can add multiple ranges?
@tdn30832 ай бұрын
Just need to add the rest of 3 subnets in remote addresses range and vice versa
@dabneyoffermein5955 ай бұрын
is the TZ270-W with 3-year Essential Protection Service Suite too outdated to put into a small business in mid-2024? Should I look at a different more advanced solution for today's Cyber Attacks? My application would be a 5-user small biz (5 humans in an office with 3 virtual servers (VM's) running on a Hypervisor (so just one physical Server Box). Each human has a laptop or desktop and a phone). This video is 3 years old, which means that the TZ270 is probably going on 4 to 4 1/2 years, which also means this is old technology. Can anyone chime in with their thoughts? I'd certainly appreciate it.
@kT2015N5 ай бұрын
Can you pls show the tunnel mode configurations as well
@Phoenix-ry8hq5 ай бұрын
this is ATTROCIOS - you are just clicking and reading the screen - i WANT knowledge, how about talk about all the different interface types - what they are for and how to use them in deployment ?
@teknolojigundemi5 ай бұрын
Good explanation.Every software update changes behaviour. I dont know it is similar today. There is a Tunnel Interface under WAN physical. What should its settings be like.
@Doogiehowsy6 ай бұрын
I'm more of Cisco Switch and Router guy but my current position uses SonicWall and these videos have helped a lot... My only question is the IPSec 2 (Phase 2), what's the purpose for that also if it must match on the other end is it expected that the Firewall on the other end also have a phase 2 regardless of the vendor ? I think I'm asking this because I see Phase one as something that necessary and wonder if phase 2 is needed at all
@keithharrisharris82667 күн бұрын
Phase 2 defines the encryption and authentication mechanisms for securing the actual data that passes through the tunnel. I think Phase 1 establishes the secure channel between two VPN peers (e.g., SonicWall to another device) by negotiating security parameters
@GrayKinney6 ай бұрын
Thank you! Very Helpful.
@somedayitsgonnamakesense6 ай бұрын
i have 2 private subnets in AWS. the first one have connection to the internet while the 2nd subnet cannot. what should i check in Fortigate GUI to solve this issue?
@PratikWaghmare-gz8hr6 ай бұрын
Hello Mam and Sir, i have wan to lan, wan to loopback policy my customer able access firewall remotely through WAN but coud'nt able to acess via LAN IP can you please guide me on this.
@AaronMichaelLong6 ай бұрын
This is not a route-based VPN, this is a policy-based VPN configuration. The fact that you're identifying specific phase 2 proxy-IDs/selectors is what makes it policy-based.
@swooshincentive2 ай бұрын
This was the comment I needed to get a proper VPN connection setup. Thank you!
@AaronMichaelLong2 ай бұрын
@@swooshincentive o7
@MorbidMarrow6 ай бұрын
Noice
@fischeredvberatung4697 ай бұрын
Nearly everey Router / Firewall can reserve static ips within dhcp scope, why isn't that possible at sophos?
@filmrolls31657 ай бұрын
This policy is only for outbound traffic right? Can somebody guide me policy for Inbound please? Even in this video i don't see you have any inbound policy set up on those firewall policy list or we don't need to create inbound policy but only outbound policy?
@angelmarrerojr70307 ай бұрын
This was very clear and concise. You were easy to follow as I navigate learning my TZ270. Thank you Johana! You should do more of these regarding SonicWall FWs.
@chokoloytv87767 ай бұрын
More tutorials pls.. like web filtering and application filtering.
@jkhaksaar7 ай бұрын
Can i install fortigate firewall like sophos on my intel hardware at my home lab?
@iphelper15748 ай бұрын
Misguided tutorial. Should have been named as policy-based VPN
@believeinheroes8 ай бұрын
Beware bridging WLAN to LAN, as it creates rule overlap. For example, say you create a WAN > LAN rule to allow https to a server. With LAN and WLAN bridged, the internal server is now on BOTH the LAN and WLAN. If you don't have a matching WAN > WLAN rule, and the SonicWALL intermittently reads the destination address as being on the WLAN, and therefore it blocks the traffic intermittently. If you don't realize this is what's happening, it can be a real bear to troubleshoot. Even when you do know, it's easy to forget the quirk that you need to duplicate every WAN > LAN rule under WAN > WLAN. So, while this config is not technically incorrect, it can become quite a nuisance in anything other than the most basic of networks. It's much easier and cleaner to just put the WLAN on a separate subnet to avoid this issue.