{"id":1608,"date":"2025-10-26T21:35:28","date_gmt":"2025-10-26T21:35:28","guid":{"rendered":"https:\/\/www.ultrexstaff.com\/?p=1608"},"modified":"2025-10-26T21:35:30","modified_gmt":"2025-10-26T21:35:30","slug":"sonicwall-whitelisting-ip-address-in-firewall","status":"publish","type":"post","link":"https:\/\/www.ultrexstaff.com\/?p=1608","title":{"rendered":"SonicWall Whitelisting IP Address in Firewall"},"content":{"rendered":"\n<p>Hello Jim,<\/p>\n\n\n\n<p>I spoke with Andrae and during the call we discussed the allow rule needed to be created. He mentioned it would be a penetration test-like event from the internet needing inbound access, but despite there being no inbound access rules existing for CISA he mentioned there was never any reports of the tests not working in the past.<\/p>\n\n\n\n<p>We created address objects for the CISA IPs listed and then added them to a group. We then created an inbound access rule to allow those IPs in the group access any zone with any port\/service. There was no NAT policy created since it doesn&#8217;t seem like they need access to a specific device at a specific private IP.<\/p>\n\n\n\n<p>To create these address objects, in the top menu select&nbsp;<strong>Object<\/strong><\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; On the left menu select&nbsp;<strong>Addresses<\/strong><\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; Click&nbsp;<strong>Add<\/strong>&nbsp;towards the right side of the&nbsp;<strong>Addresses menu<\/strong><\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; Put a unique name, because the IPs are on the internet select&nbsp;<strong>WAN zone,<\/strong>&nbsp;for the first IP select&nbsp;<strong>Host&nbsp;<\/strong>because it&#8217;s a \/32 (255.255.255.255)<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; For the other IPs, since they are a \/29 and \/28 network we chose&nbsp;<strong>Network&nbsp;<\/strong>and put the corresponding subnet masks under the network IP.<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; Click&nbsp;<strong>Save<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/ticketingitemsstoreeu.blob.core.windows.net\/emailinlineimages\/d14b2abe-80d8-4248-8216-e0eeba73ad5f_id_-2_638776111690646678.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>To create an address group, or add new objects to an existing group, click&nbsp;<strong>Address Groups&nbsp;<\/strong>at the top left of the Adress Object menu<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; To create a group Click&nbsp;<strong>Add<\/strong>, to edit an existing group search for the group name, hover over it and click the&nbsp;<strong>Pencil&nbsp;<\/strong><strong>icon&nbsp;<\/strong>to edit<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; Search for the address objects you want to add on the left side by the unique name<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; Select each address object by clicking on each or holding down left click while dragging the cursor over the group of Address objects you wish to select<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Click the<strong>&nbsp;right facing arrow<\/strong>&nbsp;in the middle to move the selected objects into the group<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; Click&nbsp;<strong>Save<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/ticketingitemsstoreeu.blob.core.windows.net\/emailinlineimages\/917a0924-5194-493f-b1b4-0b7373739c91_id_-2_638776111696816003.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>To create access rules, on the top menu navigate to&nbsp;<strong>Policy&nbsp;<\/strong>and on the left side menu select&nbsp;<strong>Access Rules<\/strong><\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; Click the&nbsp;<strong>+Add&nbsp;<\/strong>option on the bottom left to bring up the screen below.<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; Since we created an inbound access rule from the internet, we selected&nbsp;<strong>WAN<\/strong>&nbsp;for the&nbsp;<strong>Source Zone<\/strong><\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; For the Source Address we selected the group we created which contains the address objects we created.<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; This locks the rule down to only allow traffic with a source IP from the IP pool in the &#8220;G &#8211; CISA IPs&#8221; group<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;We left the Destination as Any to allow them open access to the network.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/ticketingitemsstoreeu.blob.core.windows.net\/emailinlineimages\/76679d4e-e17d-4a64-a186-e9b86a64b8c6_id_-2_638776111698691128.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/ticketingitemsstoreeu.blob.core.windows.net\/emailinlineimages\/b5661536-b816-4d0e-bd51-acf9ca1b4a4e_id_-2_638776111699628572.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>As discussed, I&#8217;ll close this ticket for you now but if you have any questions in the future feel free to reach out anytime.<\/p>\n\n\n\n<p>Thank you and have a great rest of your day!<\/p>\n\n\n\n<p>Kind Regards,<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td rowspan=\"5\"><img><\/td><td><strong>Josh Littaua&nbsp;&nbsp;&nbsp;&nbsp;<\/strong><\/td><\/tr><tr><td><strong>Western NRG, Inc.&nbsp;&nbsp;<\/strong><strong>|&nbsp;<\/strong><strong>Total Internet Security<\/strong><\/td><\/tr><tr><td><strong>(805) 658-0800&nbsp;<\/strong><strong>|&nbsp; Fax: (805) 465-8480<\/strong><\/td><\/tr><tr><td><strong><a>j.littaua@westernnrg.com<\/a>&nbsp;<\/strong><strong>|&nbsp;<\/strong><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.westernnrg.com\/\"><strong>www.WesternNRG.com<\/strong><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Hello Jim, I spoke with Andrae and during the call we discussed the allow rule needed to be created. He mentioned it would be a penetration test-like event from the internet needing inbound access, but despite there being no inbound access rules existing for CISA he mentioned there was never any reports of the tests [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[115],"tags":[],"class_list":["post-1608","post","type-post","status-publish","format-standard","hentry","category-sonicwall","post-preview"],"_links":{"self":[{"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/1608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1608"}],"version-history":[{"count":1,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/1608\/revisions"}],"predecessor-version":[{"id":1609,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/1608\/revisions\/1609"}],"wp:attachment":[{"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ultrexstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}