scenario: I have 2 internet connections connected to SW, 
Fiber(X1) - Fiber provider A
Coax(X2) - Coax copper cable provider B
Fiber is having issues reaching Google/Gmail/etc
I will route anything bound to Google via 2nd Coax connection
check whats the interface for Coax (X2)
create Address objects for google (nslookup mail.google.com, nslookup calendar.google.com, nslookup www.google.com) - create a Address Group w these address objects
New Address Object (IPV4)
WAN, Network, 142.251.167.0/255.255.255.0 etc etc
create new Address Group "Google IPs Group"
create a new Route rule
Name: Google via Coax
Source: Any
Destination: "Google  IPs Group"
Service: Any (standard route)
Interface: X2
Gateway: X2 Default Gateway
Metric: 1
Comment: Temporary google via Coax
disable route when interface is connected
Create NAT rules to translate source and dest IPs
1. NAT Policies > Add 
	Name: "From Google"
	Original Source: "Google IP Group"
	Translated Src: Original
	Original Dest: Any
	Translated Dest: Original
	Original Svc: Any
	Translated Svc: Origin
	Inbound Interface: X2
	Outbound Interface: X2 
	IPV4 only
	enable NAT policy
 2. NAT Policies > Add
	Name: "To Google"
	Original Src: Any
	Translated Src: Original
	Original Dest: "Google IP Group"
	Translated Dest: Original
	Original Svc: Any
	Translated Svc: Original
	Inbound Interface: X2
	Outbound Interface: X2
	Comment: To Google, IPV4 only, enable NAT policy
packets outbound to Google services will flow over Coax connection (X2) and be masqueraded by Sonicwall
route all SSH connections to 2.2.2.2(unreachable by sonicwall) via 1.1.1.1 (reachable)
create Network > address objects, create 2.2.2.2 and 1.1.1.1 addr objects
click on Network > routing > add route