SonicOS 7 NSv Getting Started Guide for AWS
- SonicOS NSv 7
- Introducing the NSv Series
- Installing SonicOS on the NSv Series
- Supported NSv Models
- Resizing NSv Virtual Machine
- Task List for NSv Instance Setup
- Deploying AWS from Console
- Deploying AWS from Cloud Template
- Accessing the SonicWall NSv Web Interface
- Forwarding Traffic to your NSv
- Configuring Internet/Public Access Through the NSv
- SonicWall Nsv Firewall on AWS GovCloud
- Troubleshooting Installation Configuration
- Licensing and Registering Your NSv
- SonicOS Management
- Using the Virtual Console and SafeMode
- SonicWall Support
Testing Traffic Through Your NSv
After configuring a route for forwarding traffic on your NSv, you can verify it with some test traffic. You can send traffic from any client machine or virtual machine on the same subnet as the route you configured. In our configuration, this is the LAN-X0 subnet, or 192.168.2.0/24
.
For example, you could create an Ubuntu virtual machine in Azure, using the same options as your NSv for the following settings:
-
Subscription
-
Resource group
-
Location
-
Virtual network
-
Subnet (such as LAN-X0 or
192.168.2.0/24
)
To send traffic through your NSv
-
On your client machine or virtual machine (Ubuntu, for example), open a console window. For an Ubuntu virtual machine on Azure, click Serial Console in the Virtual machine options.
-
Type
ping 192.168.2.4
on the command line.The pings should succeed.
-
Log into your NSv and navigate to the MONITOR | Appliance Health | Live Monitor page.
-
Scroll down to view the Connection Count chart. It should show a positive count, caused by the pings.
Other charts on the page also show activity. This verifies that traffic can be forwarded to the NSv.
Was This Article Helpful?
Help us to improve our support portal