I made an earlier post about Sonicwall wireless issues here, this is a bit of a follow up to that post (or follow on).
All Sonicwall firewalls come with a number of predefined security Zones that get applied to individual network interfaces on the box. Some of the standard zones are Trusted, Public and Wireless. Be aware that the Wireless zones is specific to Sonicwall wireless which encompasses both the built-in wireless on wireless models as well as Sonicpoint access points. It is NOT meant to be used as security zone for any other wireless devices. Traffic from any device that is NOT Sonicwall will be tagged as being from a “rogue” device and the firewall will eventually lockdown any network segments within the Wireless zone.
If you are going to hang another vendor’s access points behind a Sonicwall and you want to have the network segregated from the regular LAN by firewall rules then you will have to create a custom Zone and tag the interface that is the gateway for the AP’s with the custom zone. This way you get to apply the same tricks with the firewall and/or VLAN’s that you can with Sonicpoints and the Wireless zone but you won’t end up with a zone lockdown.
I had this happen at the customer where the Sonicpoints were ripped out and replaced with a pricey Cisco wireless controller and access points. The new AP set up worked brilliantly for a few hours then the whole network shutdown. I went around in a number of circles trying to figure it all out until I saw entries in the logs that indicated traffic from “non-Sonicwall” devices was being blocked on the network segment supporting the Cisco AP’s. Once I backed out everything and created a new zone things went back to being “perfect” on the Cisco wireless. And, yes, the Cisco AP’s (and the work performed by the company that installed the Cisco system) solved all of the issues we were having in the customer’s warehouse. In this case the customer definitely got what they paid for (the Cisco goodies were considerably more expensive than the Sonicwall wireless access points).
So, keep all of this in mind if you are going to build out a non-Sonicwall wireless infrastructure behind your Sonicwall firewall. A little up front work will save you a lot of grief.