SonicOS 7 Switch Network
- SonicOS 7
- Overview
- Managing from a Firewall
- Adding a Switch to a Firewall with Zero-Touch
- Adding a Switch to a Firewall Manually
- Changing the Switch Configuration
- Upgrading Firmware
- Shutting Down the Switch
- Restarting the Switch
- Setting Up PoE
- Adding a VLAN
- Adding Static Routes
- Editing DNS
- Setting Up QoS
- Setting Up Users
- Setting Up 802.1X Authentication
- Daisy-Chaining Switches
- Connecting Access Points
- Modifying the MAC Address Table
- Checking Port Statistics
- Configuring Switch Topologies
- Configuring Basic Topologies
- Connecting the Switch Management Port to a Firewall
- Configuring a Common Uplink
- Configuring a Dedicated Uplink
- Configuring a Hybrid System with Common and Dedicated Uplinks
- Configuring Isolated Links for Management and Data Uplinks
- Configuring High Availability
- Configuring VLANs With Dedicated Uplinks
- Configuring a Link to SonicWall Access Points
- SonicWall Support
Before Adding a Switch
- Be sure to first register your Switch on MySonicWall.
- Consider the firewall/switch topology to be implemented. Refer to or the Switch Getting Started Guide available at https://www.sonicwall.com/support/technical-documentation
- When adding a Switch manually, first check that it is configured to factory defaults. This can be ensured by depressing the reset Switch for 10 seconds or from the Switch Local UI, or the Command Line Interface.
- When adding a management link to a Switch manually, ensure that the DHCP lease range supports default management IP address. Refer to Connecting the Switch Management Port to a Firewall.
- The firewall interface linking to the Switch interface must have the Enable Auto-Discovery of SonicWall Switches option enabled. Edit the firewall interface and enable this option on the Advanced screen of the Edit Interface dialog.
- The firewall interface linking to the Switch interface cannot be a PortShield host and no other firewall interface can be portshielded to it. The firewall interface linking to the Switch cannot be a PortShield group member, that is, it cannot be portshielded to another firewall interface.
- Switches may be added into daisy-chained configurations manually or by using Zero-Touch.
- For daisy chaining Switches, consider setting up a common link (management and data) with sufficient capacity and do not make further connections from firewall to parent switch without configuring them, Make any other connections from the firewall to the Switch when you add the Switch.
- If the management link between the switch and firewall is isolated from data traffic, the switch must configured at a static IP address.
- Make any changes in the Reserved VLAN range for the firewall interface before adding the SonicWall Switch. If the Reserved VLAN range changes after connecting the Switch, then the switch must be removed and re-added.
-
If adding Switches to a High Availability (HA) pair:
- Switches cannot be added to HA pairs with Zero-Touch.
- To use the Switch with HA, you must first create an HA pair, and then manually add the Switch.
Was This Article Helpful?
Help us to improve our support portal