A few requirements to make this setup permanent, Make sure your printers or resources you would like to make available on the SonicWall for wireless printing and wireless access have a static IP address assigned, either manually or via DHCP reservation. In my specific case, I would like to make available these two Sharp printers with IP 192.168.1.98 and 192.168.1.166 for printing from WIFI connected devices. This will ensure that the wired printers do not change IP address latter on and that this wireless printing setup stops working Let's open the SonicWall web console and login with your SonicWall [...]
About KarelCubano en Los Angeles, California. Technology geek in charge of an IT company, follow me on my daily client meetings and routine to gain a grasp the life of an IT professional in LA. Cuban in Los Angeles, California, Dedicated to Information Technology, Science, and other small enterprises. Vlogging from California, USA just for the fun of it , share the life of a Caribbean immigrant on one of the world's biggest Megapolis where the world's cultures melt and fuse in a rich culture enviroment. I will be creating several channels to share my experiences, knowledge and life with whoever decides to watch and stay tuned.
Small Business SSL VPNs is one of the most used methods of allowing Remote Small Business Users to connect to the SonicWall (or other firewalls) and access internal network resources. Today I am going to show you how to setup and use a SSL VPN Connection and how to connect using NetExtender, the Small Business SSL VPN client. Sonicwall Small Business VPN firewalls come by default licensed for a maximum of 2 users connecting remotely over a SSL VPN and you can buy more licenses ,should you need more users connecting to your intranet resources. First, login to [...]
1 – Backup your data The most important and radical solution against crypto-locker , crypto viruses and ransomware is having a regularly updated backup. If you are attacked with ransomware you might find yourself with the alternative of losing your data or paying the criminals. Having an updated backup (less than 24 hours) will provide you with a third and best choice of recovering your data by restoring the latest backup. IMPORTANT: Keep in mind that Crypto Locker and other crypto malware will also encrypt files stored on any mapped drives accessible on the network and potentially any [...]