a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need. goodluck!
- If you need clarification, ask it in the comment box above.
- Better answers use proper spelling and grammar.
- Provide details, support with references or personal experience.
Tell us some more! Your answer needs to include more details to help people.You can't post answers that contain an email address.Please enter a valid email address.The email address entered is already associated to an account.Login to postPlease use English characters only.
Tip: The max point reward for answering a question is 15.
Port #1 on primary router <---> VPN server
Port #2 on primary router <--> Load Balancer
Load Balancer <--> web-server #1
Load Balancer <--> web-server #2
Load Balancer <--> web-server #3
VPN traffic enters your network, through the router to the VPN server, and then VPN-server back through the router to your internal servers. Web-traffic goes through the Load Balancer, for distribution to the collection of servers.
With most VPNs, as soon as the VPN connection is established, it will take precedence over all other network connections. Access to the Internet (other than to keep the VPN connection itself alive) will go via the VPN and the corporate network you are connected to, rather than the local ISP.Furthermore, access to the local network is temporarily disabled.
As a result, your local print server may not be accessible, you cannot use devices via the Network USB hub, or the USB ports on your router (if it has these), you may not even be able to access your local router's configuration page or ping the router or other machines in the local network.
This is done because of security reasons. When a computer is connected to a corporate network via a VPN, the administrator needs to make sure that that machine can not act as a some form of a gateway enabling other machines in the local network to access that corporate network in any way. For that reason, the machine connecting via the VPN must temporarily be isolated from the local network.
I will make a couple of assumptions on you setup. First, you have some type of highspeed internet. You have a retail type router/firewall plugged into your internet modem. You are using a VPN Client software installed on a PC or Laptop. By stating that when you connected using your Ethernet cable, you were plugged directly into the Internet modem.
Basically, what you have here is a configuration issue with your Router/Firewall. I use the Cisco VPN Client Software from home. This software uses UDP over TCP port 10000. Your VPN Client will use something along this line as well. So, you need to do one of two things here. Determine what Protocol and Port your VPN software uses. Login into you Router/Firewall and add that to your outbound allowed traffic. Or login into your Router/Firewall and configure it to allow all outbound traffic.
If you are not sure how to do this, the documentation that came with your Router should contain a Tech Support number to call. They can walk you through this in short order. Otherwise, post your EXACT make and model of your Router/Firewall and I will try to get the information for you.
It could be a missing route... are the file server and email server on the same subnet? If they are then it is possibly not a routing issue.
Also it would be worth checking the tunneling settings for the VPNs... if you have specifed either only the fileserver subnet or specifically the file server address, then this could be the reason they can get to nothing else.
Please find below is to configure what ever you want.
Setup Wizard - This wizard will help you quickly configure the SonicWALL to secure your Internet connection. Once completed, you can use the SonicWALL Web Management Interface for additional configuration.
Registration & License Wizard - This wizard will help you register you and your firewall with mysonicwall.com and obtain licenses for additional Security Services features.
PortShield Interface Wizard - Segment and configure the integrated managed LAN switch of the SonicWALL.
Public Server Wizard - Quickly configure your SonicWALL to provide public access to an internal server.
VPN Wizard - Create a new site-to-site VPN Policy or configure the WAN GroupVPN to accept connections from the SonicWALL Global VPN Client
Here's a real simple problem to your remote access problems. Go to: http://www.logmein.com Sign up for a free acct, download/install their free software on your Server. Now go over to your laptop, login to your new logmein acct. In the next page, you'll see your Server listed. Click on it - follow instructions to connect. This will tunnel through whatever stuff you have on your network! Trust me - esp. in your scenario, this is *by far* the *simplest remote connect you'll ever perform! And it just .... works! Everytime.
The Netgear FVS124-G is a superb combo VPN firewall DSL/Cable small business router. Loads of features and Dual Wan to boot. I highly recommend it's use in small businesses
Keeping the necessary firewall, you are missing another component in a properly segmented network, a VLAN switch. It is highly customizable and gives you the configurability and speed you are asking for.
Look at it's features here:
The normal network security plan is:
Internet -->Firewall-->Router (or Firewall/Router)-->VLan Switch-->Individual computers or VLan subnets.
Using these two components together makes a more configurable and MUCH easier to setup network than using, say, one Sonicwall, or one CISCO PIX-501-BUN-K9 (which doesn't do VLan and you have to know Pix commands)
You get FREE pre-sales and FREE post-sales support from Netgear, so call them on what makes sense for your situation.
Sales Support (408) 907-8000
Email at: email@example.com
"Beta tester of "0"s and "1's"
The key with any VPN solution is to make sure that the configurations on both ends match. I am not very familiar with this particular product, but it looks like you need to have the proper VPN licenses installed first.
There are two types of VPN you can do.
1) Site to Site - This is where the are two static boxes that you want to create an encrypted tunnel between
2) Remote User access - This is where mobile users connect to a central site over an encrypted tunnel from their home or on the road.
Next, take a looks at the User Guide PDF here:
Chapter 10 tells how to configure the VPN on the Firebox side. You would just duplicate your settings if your doing option #1.
Chapter 11 tells how to configure the VPN on the client side. This section would tell you how to configure the client software for option #2.
Hope this helps.