SonicOS 7 System
- SonicOS 7.0
- Overview
- Interfaces
- About Interfaces
- Interface Settings IPv4
- Adding Virtual Interfaces
- Configuring Routed Mode
- Enabling Bandwidth Management on an Interface
- Configuring Interfaces in Transparent IP Mode (Splice L3 Subnet)
- Configuring Wireless Interfaces
- Configuring WAN Interfaces
- Configuring Tunnel Interfaces
- Configuring VPN Tunnel Interfaces
- Configuring Link Aggregation and Port Redundancy
- Configuring One Arm Mode
- Configuring an IPS Sniffer Mode Appliance
- Configuring Security Services (Unified Threat Management)
- Configuring Wire and Tap Mode
- Layer 2 Bridged Mode
- Key Features of SonicOS Layer 2 Bridged Mode
- Key Concepts to Configuring L2 Bridged Mode and Transparent Mode
- Comparing L2 Bridged Mode to Transparent Mode
- Comparison of L2 Bridged Mode to Transparent Mode
- Benefits of Transparent Mode over L2 Bridged Mode
- ARP in Transparent Mode
- VLAN Support in Transparent Mode
- Multiple Subnets in Transparent Mode
- Non-IPv4 Traffic in Transparent Mode
- ARP in L2 Bridged Mode
- VLAN Support in L2 Bridged Mode
- L2 Bridge IP Packet Path
- Multiple Subnets in L2 Bridged Mode
- Non-IPv4 Traffic in L2 Bridged Mode
- L2 Bridge Path Determination
- L2 Bridge Interface Zone Selection
- Sample Topologies
- Configuring Network Interfaces and Activating L2B Mode
- Configuring Layer 2 Bridged Mode
- Asymmetric Routing
- Configuring Interfaces for IPv6
- 31-Bit Network Settings
- PPPoE Unnumbered Interface Support
- Failover & LB
- Neighbor Discovery
- ARP
- MAC IP Anti-Spoof
- Web Proxy
- PortShield Groups
- SonicOS Support of X-Series Switches
- About the X-Series Solution
- Performance Requirements
- Key Features Supported with X-Series Switches
- PortShield Functionality and X-Series Switches
- PoE/PoE+ and SFP/SFP+ Support
- X-Series Solution and SonicPoints
- Managing Extended Switches using GMS
- Extended Switch Global Parameters
- About Links
- Logging and Syslog Support
- Supported Topologies
- Port Graphics
- Port Configuration
- External Switch Configuration
- External Switch Diagnostics
- Configuring PortShield Groups
- SonicOS Support of X-Series Switches
- PoE Settings
- VLAN Translation
- IP Helper
- Dynamic Routing
- DHCP Server
- Configuring a DHCP Server
- Configuring Advanced Options
- Configuring DHCP Option Objects
- Configuring DHCP Option Groups
- Configuring a Trusted DHCP Relay Agent Address Group (IPv4 Only)
- Enabling Trusted DHCP Relay Agents
- Configuring IPv4 DHCP Servers for Dynamic Ranges
- Configuring IPv6 DHCP Servers for Dynamic Ranges
- Configuring IPv4 DHCP Static Ranges
- Configuring IPv6 DHCP Static Ranges
- Configuring DHCP Generic Options for DHCP Lease Scopes
- DHCP and IPv6
- Multicast
- Network Monitor
- AWS Configuration
- SonicWall Support
General Settings
To enable Dynamic Routing General Settings
-
Navigate to NETWORK | System > Dynamic Routing | Settings tab.
-
Enable and confirm Advanced Routing Mode. Click the OSPFv2 tab. Click the Edit OSPFv2 Configuration icon for the Interface Configuration with the relevant Routes or Networks to be distributed.
-
In the dialog that appears, set OSPFv2 to Enabled and input the following information: Dead Interval, Hello Interval, and OSPF Area. This information must match across all firewalls or the routes and networks are not distributed correctly.
- Click Save.
-
Each firewall must also have a unique Router ID, which is typically the interface IP address. However, you can set it to any local, unused IP address.
-
Navigate to NETWORK | System > Dynamic Routing and then click on the Settings icon in the top banner to enter all that information.
-
Set the ABR Type to Cisco.
-
Finally, select which, if any, of the relevant options will be redistributed: Static Routes, Connected Networks, RIP Routes, and Remote VPN Networks.
After the configuration is complete on all the area devices, you can set the metric for routes learned through the advanced routing protocols. To do so, edit the Apply the following metric to default routes received from Advanced Routing protocols field. The default value is 110.
After everything is configured, you will see OSPF Neighbor Status on NETWORK | System > Dynamic Routing | OSPFv2. A green bubble indicates that the neighbors are able to communicate, a red bubble indicates a failure. You can check the firewall's Logs under DEVICE | Log > Settings > Network > Advanced Routing for more information about failed peering.
Was This Article Helpful?
Help us to improve our support portal