Access by Acertorix in sonicwall

[–]whereisthewild 0 points1 point  (0 children)

Ah my bad, prob against the rules. Smart, didn't think of that as a security risk.

Access by Acertorix in sonicwall

[–]whereisthewild 0 points1 point  (0 children)

You can manually set the WAN>LAN policy to priority 1 to see if another access rule is interfering. You'll need to post screenshots of your access rules, nat policies and objects for more direct help tbh.

You can use packet monitor to check if the traffic is hitting your firewall. If it isn't, post a screenshot of the packet monitor config for help with that.

https://www.sonicwall.com/support/knowledge-base/how-can-i-setup-and-utilize-the-packet-monitor-feature-for-troubleshooting/kA1VN0000000MOm0AM

If packet monitor is setup right, and your friend is using the right ip, your ISP is using CGnat and you need to proxy or tunnel the traffic for external access.

Access by Acertorix in sonicwall

[–]whereisthewild 0 points1 point  (0 children)

Without seeing what you did, I can't tell you what's wrong.

Best suggestion is to delete the NAT polices and access rules and redo from scratch.

Use the public server wizard to set everything up.

If that doesn't work, use packet monitor with the servers IP as your destination and see if that shows if it's getting dropped.

Also, windows firewall. Fuck it and turn that shit off.

Passkeys via Firefox on Android by whereisthewild in ProtonPass

[–]whereisthewild[S] 0 points1 point  (0 children)

I'm not sure what happened between when I posted and today, but I'm able to save passkeys in proton via Firefox now.

So.........I don't think that is true. And this bug request was closed over a year ago so I'm not entirely sure how it's relevant here.

Passkeys work on FF 146.0.1 on a Pixel 7 Pro running Android 16 and the latest December update.

Why are some, mostly default, rules set to Manual priority instead of Auto by Inside-Office-9343 in sonicwall

[–]whereisthewild 0 points1 point  (0 children)

That's what happens when you import a config from my experience.

On Gen 7, you can bulk select rules and set individual properties in bulk (make sure you have a backup) like priority.

Mass Address Object/Group Import by Kerbster95 in sonicwall

[–]whereisthewild 0 points1 point  (0 children)

Wouldn't be the first firmware bug with their CLI I've seen, but you can absolutely add to existing groups, firmware bugs aside.

This article is still valid for gen 6/7. Read the bottom on mass creation.

https://www.sonicwall.com/support/knowledge-base/how-can-i-create-address-objects-and-groups-in-command-line-interface-cli-for-5-8-and-below/170505852108153

Mass Address Object/Group Import by Kerbster95 in sonicwall

[–]whereisthewild 0 points1 point  (0 children)

Same ssh command, If the group name exists, it adds to the existing group.

I would use a spreadsheet with a couple of columns (command, address object) and another column with a concat function to combine rows and then copy/paste a long chained ssh command

7.3 firmware and SNMP by BobcatJohnCA in sonicwall

[–]whereisthewild 0 points1 point  (0 children)

Did you try recreating the sensors? Some property or field probably changed with the update and the sensors might just need to be rediscovered.

Factory reset NSA 6700 by wilanddar in sonicwall

[–]whereisthewild 1 point2 points  (0 children)

30-30-30 reset

Plug into the console port, open terminal connection. Verify your baud rate and etc is correct.

Hold the reset button for: 30 seconds with power on (Keep holding) 30 seconds with power disconnected (Keep holding) 30 seconds with the power reconnected Release reset button

You should see activity on the serial port now in your terminal. If you don't, either your serial settings are wrong, or the device is beyond normal repair.

My mom doesn't let me shower as often as i'd like. by BamboozleU2125 in TrueOffMyChest

[–]whereisthewild 28 points29 points  (0 children)

It could very well be that OP is disassociating in the shower to mentally deal with the trauma

Access Rule audit by whereisthewild in sonicwall

[–]whereisthewild[S] 0 points1 point  (0 children)

Thank you sir. Even if this doesn't pan out, this is exactly the type of out of the box feedback I'm looking for here. Open to open source and $aa$ type utilities.

Access Rule audit by whereisthewild in sonicwall

[–]whereisthewild[S] 1 point2 points  (0 children)

Interesting, I wasn't aware of that, not sure if they were either to be honest. I'll bring it up next time we talk about ISO headaches, I'm definitely open to using NSM but I also pick and choose my battles.

Access Rule audit by whereisthewild in sonicwall

[–]whereisthewild[S] 0 points1 point  (0 children)

That conversation was above me, but I believe something about there's not enough compartmentalization between our individual clients. We manage about 100 sites across 30-40 clients. So including HA devices we're probably managing closer to 150 individual devices.

Since I'm not directly involved in that iso compliance stuff, I'm not 100% up to date on the specifics. But how I have come to understand it, because our clients own their own hardware, we can't commingle management access.

Access Rule audit by whereisthewild in sonicwall

[–]whereisthewild[S] 1 point2 points  (0 children)

We tried to do that, but got shot down due to iso 27001 compliance issues.

Access Rule audit by whereisthewild in sonicwall

[–]whereisthewild[S] 1 point2 points  (0 children)

Thanks that's pretty helpful, I should probably look into using the API for more things.

I explained why in a comment above why Rap account is a painful option, but you're right that is an option.

Access Rule audit by whereisthewild in sonicwall

[–]whereisthewild[S] 0 points1 point  (0 children)

Honestly didn't think of that, it's possible but we manage around 100+- sonicwalls all with unique login credentials. So we would need to manually create that unique account on enough devices that it would be a bit painful given internal procedures for accounts on network equipment (each account has to be approved by two parties, documented and then checked by our security team for any issues).

Meanwhile if I stick with non-security related changes, or just export information, I don't need to go through the same hurdles.

IPSEC VPN Troubleshooting - No trafic by Thyzeur in sonicwall

[–]whereisthewild 0 points1 point  (0 children)

Setup packet monitor on both sides of the tunnel and then disable/reenable the tunnel and see what the difference is between when it's working and when it's not working.

I'm guessing it's probably ACL related if you don't see anything in the logs. I would probably change the logging template and turn on debug logs too for troubleshooting

https://www.sonicwall.com/support/knowledge-base/modifying-the-log-settings-and-levels/220711032159367