SonicWall Config

Connecting the SonicWall

In order to connect the SonicWall to the network:

  • Ensure the modem or other ISP provided equipment is in bridge mode. Anyone familiar with the local network setup will be able to assist with this.
  • Note: If the IP address is static, it will be necessary to load this information into the SonicWall.  
  • Connect the router to the modem provided by the ISP, ensuring that it is the only device connected. All other devices will connect to the router or a switch connected to the router.
  • In most cases the router can be accessed locally at 192.168.0.1 or 192.168.1.1.

Configuring Address Objects:

Address Objects allow IP addresses to be defined one time, and to be re-used in multiple instances throughout the SonicOS interface. The address object must be defined before the QoS can be configured.

  • Navigate to the Network Tab.
  • Click Address Objects.
  • Click Add.
  • Set the Name to Cytracom.
  • Set the Zone to WAN.
  • Set the Type to Range.

Set the Starting IP Address and Ending IP Address to the Register IP. (Old: 74.124.9.139-141  New: 209.105.249.232-252)

Configuring QoS

Once the Address Object for Cytracom has been set, proceed to configure QoS:

  • Navigate to the Firewall tab on the left.
  • Navigate to the Access Rules page.
  • Click the .. button.

Incoming Traffic & QoS

  • Set From Zone to WAN.
  • Set To Zone to LAN.
  • Set Service to Any.
  • Set Source to Cytracom.
  • Set Destination to Any.
  • Set Users Allowed to All.
  • Set Schedule to Always On.
  • Enable Logging should be checked.
  • Enable Geo-IP Filter should not be checked.
  • Enable Botnet Filter should not be checked.
  • Allow Fragmented Packets Should be checked.

Click  QOS 

  • Click the DSCP Marking Action to Explicit.
  • Set Explicit DSCP Value to 46 - Expedited Forwarding (EF).
  • Save

Outgoing Traffic & QOS

  • Set From Zone to Lan.
  • Set To Zone to WAN.
  • Set Service to Any.
  • Set Source to Any.
  • Set Destination to Cytracom.
  • Set Users Allowed to All.
  • Set Schedule to Always On.
  • Enable Logging should be checked.
  • Enable Seo-IP Filter should not be checked.
  • Enable Botnet Filter should not be checked.
  • Allow Fragmented Packets should be checked.

Click the QOS tab

  • Set DSCP Marking Action to Explicit.
  • Set Explicit DSCP Value to 46 - Expedited Forwarding (EF).
  • Save

Disabling SIP ALG

Commercial routers implement SIP ALG (application-level gateway), with this feature enabled by default. SIP ALG could help in solving NAT related problems, but many times SIP ALG implementations are wrong and break SIP. If SIP ALG is enabled on the SonicWall router, then the following will likely occur:

  • Registration failure
  • Call transfer issues
  • DTMF issues

Note: The above list is not comprehensive and SIP ALG can cause many other issues depending on the setup of the network.

To disable SIP ALG:

  • Log into the router.
  • Navigate to the VoIP on the top.
  • Check Enable Consistent NAT.
  • Uncheck Enable SIP Transformations.
  • Uncheck Enable H.323 Transformations.
  • Click Accept.

 

 

Was this article helpful?
4 out of 4 found this helpful
Have more questions? Submit a request