Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

LAN & WAN Reviews

Firewall

By default, the TZ 190 locks down your network. All traffic from the Internet to the LAN is denied by the stateful packet inspection firewall unless an Access Rule is created to allow it. Opening ports on the firewall is relatively easy with the Public Server Wizard, which walks you through three simple steps for access to various services on your network. Using this wizard, I was able to easily open the firewall for SSH, VNC and Terminal Services access to servers on my network.

Once an Access Rule is added, either manually or with the wizard, a NAT policy is created. A NAT policy is the mapping of origination IP addresses and ports to destination IP addresses. The SonicWALL OS allows the creation of 512 different NAT policies. NAT policies are important to understand, as deleting a Firewall Access Rule requires you first delete the NAT policy.

The concepts of Zones and Address Objects are also key to understanding SonicWALL security. Zones are a nice way to control traffic between interfaces. Interfaces can be grouped into Zones, and then traffic types can be allowed or blocked between those Zones. For example, the default Zone configuration blocks wireless LAN clients from accessing clients or devices on the wired LAN. Enabling access from the WLAN to the LAN can be accomplished by changing the default Firewall Access Rule from Deny to Allow for traffic from the WLAN to the LAN; see below.

Zone Access Rules

Figure 14: Zone Access Rules

Address Objects are efficient configuration tools for the network administrator, allowing you to name key devices on your network and then select them in drop-down configuration lists throughout the SonicWALL OS. I set up an Address Object naming my VoIP Server as below, making Access Rule configurations more intuitive.

Address Object

Figure 15: Address Object setup

More LAN & WAN

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

I have been upset that the rt-ac56u was not included in the routers that would support Aimesh since it is very similar to the rt-ac68u and decided to ...
Is there a way to set up the guest network to use PiHole as its DNS when it is set to block Access to Intranet?I tried the following:LAN > DHCP Server...
Trying to work out how to install Mosquitto on a AsusWRT firmware / Asus RT-AC68U combo.I believe the Linux is based on Tomato and heavily modified, b...
So I have a bit of a issue with wifi clients connecting to a ASUS RT-AC86U in repeater mode. I will try to lay it out.So I have a Asus RT-AC88U as the...
Hi, I have a samba share mounted on a aimesh node. It can be accessed via the very insecure asus admin default account. Can I change the password on t...

Don't Miss These

  • 1
  • 2
  • 3