SonicOS 7.1 System
- SonicOS 7.1
- About SonicOS
- Interfaces
- About Interfaces
- Interface Settings IPv4
- Adding Virtual Interfaces
- Configuring Routed Mode
- Enabling Bandwidth Management on an Interface
- Configuring Interfaces in Transparent IP Mode (Splice L3 Subnet)
- Configuring Wireless Interfaces
- Configuring WAN Interfaces
- Configuring Tunnel Interfaces
- Configuring VPN Tunnel Interfaces
- Configuring Link Aggregation and Port Redundancy
- Configuring One Arm Mode
- Configuring an IPS Sniffer Mode Appliance
- Configuring Security Services (Unified Threat Management)
- Configuring Wire and Tap Mode
- Layer 2 Bridged Mode
- Key Features of SonicOS Layer 2 Bridged Mode
- Key Concepts to Configuring L2 Bridged Mode and Transparent Mode
- Comparing L2 Bridged Mode to Transparent Mode
- Comparison of L2 Bridged Mode to Transparent Mode
- Benefits of Transparent Mode over L2 Bridged Mode
- ARP in Transparent Mode
- VLAN Support in Transparent Mode
- Multiple Subnets in Transparent Mode
- Non-IPv4 Traffic in Transparent Mode
- ARP in L2 Bridged Mode
- VLAN Support in L2 Bridged Mode
- L2 Bridge IP Packet Path
- Multiple Subnets in L2 Bridged Mode
- Non-IPv4 Traffic in L2 Bridged Mode
- L2 Bridge Path Determination
- L2 Bridge Interface Zone Selection
- Sample Topologies
- Configuring Network Interfaces and Activating L2B Mode
- Configuring Layer 2 Bridged Mode
- Asymmetric Routing
- Configuring Interfaces for IPv6
- 31-Bit Network Settings
- PPPoE Unnumbered Interface Support
- Failover & LB
- Neighbor Discovery
- ARP
- MAC IP Anti-Spoof
- Web Proxy
- PortShield Groups
- SonicOS Support of X-Series Switches
- About the X-Series Solution
- Performance Requirements
- Key Features Supported with X-Series Switches
- PortShield Functionality and X-Series Switches
- PoE/PoE+ and SFP/SFP+ Support
- X-Series Solution and SonicPoints
- Managing Extended Switches using GMS
- Extended Switch Global Parameters
- About Links
- Logging and Syslog Support
- Supported Topologies
- Port Graphics
- Port Configuration
- External Switch Configuration
- External Switch Diagnostics
- Configuring PortShield Groups
- SonicOS Support of X-Series Switches
- PoE Settings
- VLAN Translation
- IP Helper
- Dynamic Routing
- DHCP Server
- Configuring a DHCP Server
- Configuring Advanced Options
- Configuring DHCP Option Objects
- Configuring DHCP Option Groups
- Configuring a Trusted DHCP Relay Agent Address Group (IPv4 Only)
- Enabling Trusted DHCP Relay Agents
- Configuring IPv4 DHCP Servers for Dynamic Ranges
- Configuring IPv6 DHCP Servers for Dynamic Ranges
- Configuring IPv4 DHCP Static Ranges
- Configuring IPv6 DHCP Static Ranges
- Configuring DHCP Generic Options for DHCP Lease Scopes
- DHCP and IPv6
- Multicast
- Network Monitor
- AWS Configuration
- SonicWall Support
Configuring the Secondary Bridge Interface
This example uses X0 (automatically assigned to the LAN):
- Navigate to NETWORK | System > Interfaces.
- Click the Configure icon in the right column of the X0 (LAN) interface.
- From IP Assignment, select Layer 2 Bridged Mode.
- From Bridged to, select the X1 interface.
-
Choose one or more Management options for the interface: HTTPS, Ping (selected by default), SNMP, SSH.
Selecting HTTPS activates and selects Add rule to enable redirect from HTTP to HTTPS automatically. For more information about HTTP/HTTPS redirection, see HTTP/HTTPS Redirection.
- Choose User Login options: HTTP, HTTPS.
- To enable redirect to HTTPS from HTTP, select Add rule to enable redirect from HTTP to HTTPS. For more information about this option, see HTTP/HTTPS Redirection.
- You can optionally enable Block all non-IPv4 traffic to prevent the L2 bridge from passing non-IPv4 traffic.
-
To control VLAN traffic through the L2 bridge, click VLAN Filtering. By default, all VLANs are allowed:
- Select Block listed VLANs (blacklist) from the drop-down menu and add the VLANs you wish to block from the left pane to the right pane. All VLANs added to the right pane is blocked, and all VLANs remaining in the left pane are allowed.
- Select Allow listed VLANs (whitelist) from the drop-down menu and add the VLANs you wish to explicitly allow from the left pane to the right pane. All VLANs added to the right pane are allowed, and all VLANs remaining in the left pane are blocked.
- Click OK. The Interface Settings table displays the updated configuration:
You can now apply security services to the appropriate zones, as desired. In this example, they should be applied to the LAN, WAN, or both zones.
Was This Article Helpful?
Help us to improve our support portal