This is great! Last time I set one of these up I was going off of an antiquated walk-through. This clarifies many points of confusion and also utilizes the new SonicWALL interface, which is very helpful.
I have a small question. Why there's no Access rules created? How do you filter traffics from Branch to hub and vis versa? Thank you for the tutorial, I just started in new environnement containing exclusively Sonicwalls firewall and all your videos are helpfull for me! Wish all the best!
Thank you for your video. I was on a call with sonic wall support for over 6 hours yesterday attempting to set up a site to site vpn using two sonic walls and its still not configured correctly. Trying to learn to do it myself
Great tutorial, but im having an issue when i set up my vpn it doesnt create automatic rules to connect, also when i set up ping etc for X0 it doesnt create the ping rule. Any reason why the sonicwall wouldnt be creating rules automatically. and no i did not click supress automatic rule creation.
Great. My org has several site to site policies defined. I noticed on your Site A, you disabled the keep alive option on the advanced tab to help with excessive cpu usage. My question is: Have you had any issues reconnecting with your tunnel Site A, if Site B goes down for an inordinate amount of time? The Sonicwall site to site policies are configured with the keep alive on both sites, but I haven't noticed any performance issues on our Site A. I would like to justify disabling the Site A 'keep alive' with the dept head. Thanks
so if a user has a tz100 behind a ATT modem, how do you configure that site B? does the Modem ISP IP your Public IP ? and the IP of X0 of her Sonicwall the Local network? i have a NSA at office and tz100 in field , i can teamview into pc connected to tz, but cannot get a VPN site to site go green.
This is great! Last time I set one of these up I was going off of an antiquated walk-through. This clarifies many points of confusion and also utilizes the new SonicWALL interface, which is very helpful.
Thank you, between this video and my senior colleague at work I got it to chooch between a TZ205 and TZ300.
This is a good demo. And, the concepts are transferrable to other makes of VPN firewall routers.
I have a small question. Why there's no Access rules created? How do you filter traffics from Branch to hub and vis versa?
Thank you for the tutorial, I just started in new environnement containing exclusively Sonicwalls firewall and all your videos are helpfull for me!
Wish all the best!
This was great. So easy to follow and well instructed.Thank you!
If you have more than one subnet behind the remote site, how do you give access to the 2 remote subnets ? Do you have to to create a second tunnel ?
If we don't public ip then how to make vpn connection
Fantastic tutorial! Thank you again for this!
Thank you for your video. I was on a call with sonic wall support for over 6 hours yesterday attempting to set up a site to site vpn using two sonic walls and its still not configured correctly. Trying to learn to do it myself
Great tutorial, but im having an issue when i set up my vpn it doesnt create automatic rules to connect, also when i set up ping etc for X0 it doesnt create the ping rule. Any reason why the sonicwall wouldnt be creating rules automatically. and no i did not click supress automatic rule creation.
Great. My org has several site to site policies defined. I noticed on your Site A, you disabled the keep alive option on the advanced tab to help with excessive cpu usage. My question is:
Have you had any issues reconnecting with your tunnel Site A, if Site B goes down for an inordinate amount of time?
The Sonicwall site to site policies are configured with the keep alive on both sites, but I haven't noticed any performance issues on our Site A.
I would like to justify disabling the Site A 'keep alive' with the dept head.
Thanks
so if a user has a tz100 behind a ATT modem, how do you configure that site B? does the Modem ISP IP your Public IP ? and the IP of X0 of her Sonicwall the Local network? i have a NSA at office and tz100 in field , i can teamview into pc connected to tz, but cannot get a VPN site to site go green.
does not work two identical tz350 doing site to site on Local LAN with local NON MANAGED SWITCH ( for lab test)
does x3 Port on Site b should have a patch cable and connect it to the LAN ? or not necessary as long as it has a static ip?
How is a 10.x.x.x a public IP
looks like it's in a lab/test environment
It''s not but think it as a public IP, it's just an example.